Securing communication by attribute-based authentication in HetNet used for medical applications

被引:0
|
作者
Tufail A. Lone
Aabid Rashid
Sumeet Gupta
Sachin Kumar Gupta
Duggirala Srinivasa Rao
Mohd Najim
Ashutosh Srivastava
Abhishek Kumar
Lokendra Singh Umrao
Achintya Singhal
机构
[1] Shri Mata Vaishno Devi University,School of Electronics & Communication Engineering
[2] JNTUH College of Engineering Hyderabad,Department of Electronics & Communication Engineering
[3] University of Jeddah,Department of Electrical and Electronic Engineering, College of Engineering
[4] IIT (BHU),Systems Engineering, Department of Electrical Engineering
[5] Banaras Hindu University,Department of Computer Science
[6] Feroze Gandhi Institute of Engineering and Technology,Department of Computer Science and Engineering
关键词
Heterogeneous networks; Authentication (ABE); Network layer; HLPSL; AVISPA;
D O I
暂无
中图分类号
学科分类号
摘要
One of the major applications of the Heterogeneous Network (HetNet) is in the healthcare system. Deploying HetNet in healthcare systems enables patients, physicians, and other stakeholders to communicate easily with each other. Due to the large growth in the network’s subscribers, the security of the stored health data became one of the major concerns because unauthorized access to this data may lead to very serious complications, and unreliable transmission of data may lead to fatal risks to the patient’s life. Therefore, taking data integrity into consideration, user authentication has become one of the main factors. However, significant research work has been performed at HetNet’s physical layer to secure communication, but the result of this leads to an increase in hardware components. The increasing hardware components not only costs money but also power consumption. Therefore, this paper presents an alternate way of securing communication in HetNet at the network layer. However, resolving security problems at the network layer increases computational complexity. Nevertheless, earlier, some encryption techniques like identity-based encryption (IBE), symmetric key encryption (SKE), and public-key encryption (PKE) have been utilized for securing data. Due to their own disadvantages, this paper utilizes an attribute-based encryption (ABE) authentication scheme for securing health data in medical applications. With the help of this method, access to the intruders is denied which results in reduced communication overhead. This authentication scheme helps protect the essential information against attacks by the intruders. It includes a third party server that helps to authenticate and store patient’s information. The whole security technique has been written in the form of HLPSL (high-level protocol specification language) codes, and the results are then validated with the help of AVISPA (automated validation of Internet security protocols and applications) tool.
引用
收藏
相关论文
共 50 条
  • [41] Authentication-enabled attribute-based access control for smart homes
    Melike Burakgazi Bilgen
    Osman Abul
    Kemal Bicakci
    International Journal of Information Security, 2023, 22 : 479 - 495
  • [42] A Fuzzy Attribute-Based Authentication Scheme on the Basis of Lagrange Polynomial Interpolation
    Zhu, Shuhua
    Zhan, Li
    Qiang, Hengchang
    Fu, Danlong
    Sun, Wei
    Tang, Yong
    HUMAN CENTERED COMPUTING, HCC 2014, 2015, 8944 : 685 - 692
  • [43] A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing
    Huang, Chanying
    Wei, Songjie
    Yan, Kedong
    Zhang, Gongxuan
    Fu, Anmin
    2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 260 - 265
  • [44] Attribute-Based Pseudonymity for Privacy-Preserving Authentication in Cloud Services
    Sucasas, Victor
    Mantas, Georgios
    Papaioannou, Maria
    Rodriguez, Jonathan
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 168 - 184
  • [45] Attribute-based authentication for multi-agent systems with dynamic groups
    Zhang, Qi
    Mu, Yi
    Zhang, Minjie
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 436 - 446
  • [46] Supporting attribute-based access control in authorization and authentication infrastructures with ontologies
    Priebe, Torsten
    Dobmeier, Wolfgang
    Schläger, Christian
    Kamprath, Nora
    Journal of Software, 2007, 2 (01) : 27 - 38
  • [47] Server-aided anonymous attribute-based authentication in cloud computing
    Liu, Zhusong
    Yan, Hongyang
    Li, Zhike
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 52 : 61 - 66
  • [48] Verifiable Attribute-based Timed Signatures and Its Applications
    Hou H.-Y.
    Ning J.-T.
    Huang X.-Y.
    Zhao Y.-L.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (05): : 2465 - 2481
  • [49] Attribute-Based Authorization Tickets for Car-to-X Communication
    Buettner, Carsten
    Huss, Sorin A.
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 234 - 242
  • [50] ABEL - A Domain Specific Framework for Programming with Attribute-Based Communication
    De Nicola, Rocco
    Duong, Tan
    Loreti, Michele
    COORDINATION MODELS AND LANGUAGES, COORDINATION 2019, 2019, 11533 : 111 - 128