Securing communication by attribute-based authentication in HetNet used for medical applications

被引:0
|
作者
Tufail A. Lone
Aabid Rashid
Sumeet Gupta
Sachin Kumar Gupta
Duggirala Srinivasa Rao
Mohd Najim
Ashutosh Srivastava
Abhishek Kumar
Lokendra Singh Umrao
Achintya Singhal
机构
[1] Shri Mata Vaishno Devi University,School of Electronics & Communication Engineering
[2] JNTUH College of Engineering Hyderabad,Department of Electronics & Communication Engineering
[3] University of Jeddah,Department of Electrical and Electronic Engineering, College of Engineering
[4] IIT (BHU),Systems Engineering, Department of Electrical Engineering
[5] Banaras Hindu University,Department of Computer Science
[6] Feroze Gandhi Institute of Engineering and Technology,Department of Computer Science and Engineering
关键词
Heterogeneous networks; Authentication (ABE); Network layer; HLPSL; AVISPA;
D O I
暂无
中图分类号
学科分类号
摘要
One of the major applications of the Heterogeneous Network (HetNet) is in the healthcare system. Deploying HetNet in healthcare systems enables patients, physicians, and other stakeholders to communicate easily with each other. Due to the large growth in the network’s subscribers, the security of the stored health data became one of the major concerns because unauthorized access to this data may lead to very serious complications, and unreliable transmission of data may lead to fatal risks to the patient’s life. Therefore, taking data integrity into consideration, user authentication has become one of the main factors. However, significant research work has been performed at HetNet’s physical layer to secure communication, but the result of this leads to an increase in hardware components. The increasing hardware components not only costs money but also power consumption. Therefore, this paper presents an alternate way of securing communication in HetNet at the network layer. However, resolving security problems at the network layer increases computational complexity. Nevertheless, earlier, some encryption techniques like identity-based encryption (IBE), symmetric key encryption (SKE), and public-key encryption (PKE) have been utilized for securing data. Due to their own disadvantages, this paper utilizes an attribute-based encryption (ABE) authentication scheme for securing health data in medical applications. With the help of this method, access to the intruders is denied which results in reduced communication overhead. This authentication scheme helps protect the essential information against attacks by the intruders. It includes a third party server that helps to authenticate and store patient’s information. The whole security technique has been written in the form of HLPSL (high-level protocol specification language) codes, and the results are then validated with the help of AVISPA (automated validation of Internet security protocols and applications) tool.
引用
收藏
相关论文
共 50 条
  • [21] Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks
    Zeng, Yongbin
    Guang, Hui
    Li, Guangsong
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [22] Concepts and languages for privacy-preserving attribute-based authentication
    Camenisch, Jan
    Dubovitskaya, Maria
    Enderlein, Robert R.
    Lehmann, Anja
    Neven, Gregory
    Paquin, Christian
    Preiss, Franz-Stefan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 25 - 44
  • [23] Securing Smart Home IoT Systems with Attribute-Based Access Control
    Goyal, Gaurav
    Liu, Peng
    Sural, Shamik
    SAT-CPS'22: PROCEEDINGS OF THE 2022 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, 2022, : 37 - 46
  • [24] Improving Unlinkability of Attribute-based Authentication through Game Theory
    Zolotavkin, Yevhen
    Jeong, Jongkil Jay
    Kuchta, Veronika
    Slavnenko, Maksym
    Doss, Robin
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (02)
  • [25] An Authentication Scheme with Attribute-Based Encryption for Power Internet of Things
    Duan, Xiangjun
    Li, Yunshuo
    Xu, Yuanyuan
    Liu, Wei
    Zhang, Zhengkai
    Liu, Lei
    Li, Ying
    Xu, Mengyu
    PROCEEDINGS OF THE 2024 3RD INTERNATIONAL CONFERENCE ON NETWORKS, COMMUNICATIONS AND INFORMATION TECHNOLOGY, CNCIT 2024, 2024, : 161 - 165
  • [26] Attribute-Based Access Control using Combined Authentication Technologies
    Park, Hyun-A
    Lee, Dong Hoon
    Zhan, Justin
    2008 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2, 2008, : 518 - +
  • [27] Securing Mobile Cloud Data with Personalized Attribute-based Meta Information
    Zickau, Sebastian
    Beierle, Felix
    Denisow, Iwailo
    2015 3RD IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2015), 2015, : 205 - 210
  • [28] Efficient and Flexible Multiauthority Attribute-Based Authentication for IoT Devices
    Su, Ye
    Zhang, Xi
    Qin, Jing
    Ma, Jixin
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (15) : 13945 - 13958
  • [29] Attribute-based data dissemination for Internet applications
    Malan, GR
    Jahanian, F
    Subramanian, S
    JOURNAL OF HIGH SPEED NETWORKS, 1998, 7 (3-4) : 319 - 337
  • [30] An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees
    Yang, Huihui
    Oleshchuk, Vladimir A.
    SECURE IT SYSTEMS, NORDSEC 2015, 2015, 9417 : 123 - 135