An Authentication Protocol for the Medical Internet of Things

被引:4
|
作者
El-Meniawy, Nagwa [1 ]
Rizk, Mohamed R. M. [2 ]
Ahmed, Magdy A. [3 ]
Saleh, Mohamed [4 ]
机构
[1] Pharos Univ, Dept Comp Engn, Alexandria 21649, Egypt
[2] Alexandria Univ, Dept Elect Engn, Alexandria 21544, Egypt
[3] Alexandria Univ, Dept Comp Engn, Alexandria 21544, Egypt
[4] Pharos Univ, Dept Elect Engn, Alexandria 21649, Egypt
来源
SYMMETRY-BASEL | 2022年 / 14卷 / 07期
关键词
authentication; body sensor networks; communication system security; cryptographic protocols; Internet of Things; KEY AGREEMENT SCHEME; HEALTH;
D O I
10.3390/sym14071483
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The progress in biomedical sensors, Internet of Things technologies, big data, cloud computing, and artificial intelligence is leading the development of e-health medical systems, offering a range of new and innovative services. One such service is remote patient monitoring, where medical professionals are able to collect and examine a patient's medical data remotely. Of course, in these systems, security and privacy are of utmost importance and we need to verify the identities of system users before granting them access to sensitive patient-related data. To this end, several authentication protocols have been recently designed specifically for e-health systems. We survey several of these protocols and report on flaws and shortcomings we discovered. Moreover, we propose an authentication protocol that enables a medical professional and the network of sensors used by a patient to authenticate each other and share a cryptographic key to be used for security in a communication session. The protocol also enables the dynamic assignment of patients to doctors in order to control access to patients' data. We perform a security analysis of the protocol both formally, using the ProVerif protocol analysis tool, and informally, demonstrating its security features. We show that our protocol achieves mutual authentication, secret key establishment, forward secrecy, and anonymity. In terms of performance, the protocol is computationally lightweight, as it relies on symmetric key cryptography. This is demonstrated by comparing the computational cost of our protocol (in terms of execution time) with that of other similar protocols.
引用
收藏
页数:21
相关论文
共 50 条
  • [41] An Efficient Device Authentication Protocol Without Certification Authority for Internet of Things
    Jang, Sunggyun
    Lim, Ducsun
    Kang, Jinyeong
    Joe, Inwhee
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (04) : 1681 - 1695
  • [42] LAP-IoHT: A Lightweight Authentication Protocol for the Internet of Health Things
    Chen, Chien-Ming
    Chen, Zhaoting
    Kumari, Saru
    Lin, Meng-Chang
    SENSORS, 2022, 22 (14)
  • [43] An Enhanced Multifactor Authentication and Key Agreement Protocol in Industrial Internet of Things
    Han, Yiran
    Guo, Hua
    Liu, Jianwei
    Ehui, Brou Bernard
    Wu, Yapeng
    Li, Sijia
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (09): : 16243 - 16254
  • [44] A Robust Device-to-Device Continuous Authentication Protocol for the Internet of Things
    Badhib, Arwa
    Alshehri, Suhair
    Cherif, Asma
    IEEE ACCESS, 2021, 9 : 124768 - 124792
  • [45] Passive secret disclosure attack on an ultralightweight authentication protocol for Internet of Things
    Safkhani, Masoumeh
    Bagheri, Nasour
    JOURNAL OF SUPERCOMPUTING, 2017, 73 (08): : 3579 - 3585
  • [46] Authentication and Authorization for the Internet of Things
    Kim, Hokeun
    Lee, Edward A.
    IT PROFESSIONAL, 2017, 19 (05) : 27 - 33
  • [47] Secure Authentication on the Internet of Things
    Griffin, Phillip H.
    SOUTHEASTCON 2017, 2017,
  • [48] An Optimal Authentication Scheme through Dual Signature for the Internet of Medical Things
    Jamroz, Zainab
    Ullah, Insaf
    Hassan, Bilal
    Ul Amin, Noor
    Khan, Muhammad Asghar
    Lorenz, Pascal
    Innab, Nisreen
    FUTURE INTERNET, 2023, 15 (08):
  • [49] User Authentication for the Internet of Things
    Stajano, Frank
    Lomas, Mark
    SECURITY PROTOCOLS XXVI, 2018, 11286 : 209 - 213
  • [50] On the Authentication of Devices in the Internet of Things
    Sharaf-Dabbagh, Yaman
    Saad, Walid
    2016 IEEE 17TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2016,