An anonymous device to device access control based on secure certificate for internet of medical things systems

被引:35
|
作者
Chaudhry, Shehzad Ashraf [1 ]
Irshad, Azeem [2 ]
Nebhen, Jamel [3 ]
Bashir, Ali Kashif [4 ,5 ]
Moustafa, Nour [6 ]
Al-Otaibi, Yasser D. [7 ]
Bin Zikria, Yousaf [8 ]
机构
[1] Istanbul Gelisim Univ, Dept Comp Engn, Fac Engn & Architecture, Istanbul, Turkey
[2] Int Islamic Univ, Dept Comp Sci, Islamabad, Pakistan
[3] Prince Sattam bin Abdulaziz Univ, Coll Comp Engn & Sci, POB 151, Alkharj 11942, Saudi Arabia
[4] Manchester Metropolitan Univ, Dept Comp & Math, Manchester M15 6BH, Lancs, England
[5] Natl Univ Sci & Technol NUST, Sch Elect Engn & Comp Sci, Islamabad, Pakistan
[6] Univ New South Wales, Canberra, ACT 2610, Australia
[7] King Abdulaziz Univ, Fac Comp & Informat Technol Rabigh, Dept Informat Syst, Jeddah 21589, Saudi Arabia
[8] Yeungnam Univ, Dept Informat & Commun Engn, Gyongsan 38541, South Korea
关键词
IoMT; Key establishment; Device access control; Certificate; Stolen IoMT device; KEY AGREEMENT SCHEME; CONTROL PROTOCOL; PROVABLY SECURE; AUTHENTICATION;
D O I
10.1016/j.scs.2021.103322
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The Internet of Medical Things (IoMT) is structured upon both the sensing and communication infrastructure and computation facilities. The IoMT provides the convenient and cheapest ways for healthcare by aiding the remote access to the patients' physiological data and using machine learning techniques for help in diagnosis. The communication delays in IoMT can be very harmful to healthcare. Device to device (D2D) secure communication is a vital area that can reduce communication delays; otherwise, caused due to the mediation of a third party. To substantiate a secure D2D communication framework, some schemes were recently proposed to secure D2D based communication infrastructure suitable for IoMT-based environments. However, the insecurities of some schemes against device physical capture attack and non-provision of anonymity along with related attacks are evident from the literature. This calls for a D2D secure access control system for realizing sustainable smart healthcare. In this article, using elliptic curve cryptography, a certificate based D2D access control scheme for IoMT systems (D2DAC-IoMT) is proposed. The security of the proposed D2DAC-IoMT is substantiated through formal and informal methods. Moreover, the performance analysis affirms that the proposed scheme provides a good trade-off between security and efficiency compared with some recent schemes.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] Emergence-Based Access Control New Approach to Secure the Internet of Things
    Abou El Kalam, Anas
    Outchakoucht, Aissam
    Es-Samaali, Hamza
    DTUC'18: PROCEEDINGS OF THE 1ST INTERNATIONAL CONFERENCE ON DIGITAL TOOLS & USES CONGRESS, 2018,
  • [22] Secure and dynamic access control for the Internet of Things (IoT) based traffic system
    Aftab, Muhammad Umar
    Oluwasanmi, Ariyo
    Alharbi, Abdullah
    Sohaib, Osama
    Nie, Xuyun
    Qin, Zhiguang
    Ngo, Son Tung
    PEERJ COMPUTER SCIENCE, 2021,
  • [23] BIoAC: A blockchain-based secure access control management for the Internet of Things
    Roy, Utsa
    Ghosh, Nirnay
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 87
  • [24] Secure and Dynamic Access Control for the Internet of Things (IoT) Based Traffic System
    Aftab M.U.
    Oluwasanmi A.
    Alharbi A.
    Sohaib O.
    Nie X.
    Qin Z.
    Ngo S.T.
    PeerJ Computer Science, 2021, 7 : 1 - 26
  • [25] Secure and Efficient CoAP Based Authentication and Access Control for Internet of Things (IoT)
    Tamboli, Mohsin B.
    Ambawade, Dayanand D.
    2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 1245 - 1250
  • [26] Cloud-based secure data storage and access control for internet of medical things using federated learning
    Bhansali, P. K.
    Hiran, D.
    Kothari, H.
    Gulati, K.
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2025, 21 (02) : 188 - 188
  • [27] Device controller design based on the Internet of Things
    Zhang, Yiwen
    Jia, Ji
    Li, JingMing
    Cheng, Jiaxing
    MECHATRONICS AND INTELLIGENT MATERIALS III, PTS 1-3, 2013, 706-708 : 781 - 784
  • [28] Risk Assessment and Classification of Medical Device Software for the Internet of Medical Things
    Brass, Irina
    Mkwashi, Andrew
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS 2022, IOT 2022, 2022, : 171 - 178
  • [29] Smart and Secure Cross-Device Apps for the Internet of Advanced Things
    Busold, Christoph
    Heuser, Stephan
    Rios, Jon
    Sadeghi, Ahmad-Reza
    Asokan, N.
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8975 : 272 - 290
  • [30] Novel Secure Validation Scheme to Assess Device Legitimacy in Internet of Things
    Ayasha
    Devi, M. Savitha
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (08) : 410 - 419