Abstract

Emerging technologies rapidly change the essential qualities of modern societies in terms of smart environments. To utilize the surrounding environment data, tiny sensing devices and smart gateways are highly involved. It has been used to collect and analyze the real-time data remotely in all Industrial Internet of Things (IIoT). Since the IIoT environment gathers and transmits the data over insecure public networks, a promising solution known as authentication and key agreement (AKA) is preferred to prevent illegal access. In the medical industry, the Internet of Medical Things (IoM) has become an expert application system. It is used to gather and analyze the physiological parameters of patients. To practically examine the medical sensor-nodes, which are imbedded in the patient’s body. It would in turn sense the patient medical information using smart portable devices. Since the patient information is so sensitive to reveal other than a medical professional, the security protection and privacy of medical data are becoming a challenging issue of the IoM. Thus, an anonymity-based user authentication protocol is preferred to resolve the privacy preservation issues in the IoM. In this paper, a Secure and Anonymous Biometric Based User Authentication Scheme (SAB-UAS) is proposed to ensure secure communication in healthcare applications. This paper also proves that an adversary cannot impersonate as a legitimate user to illegally access or revoke the smart handheld card. A formal analysis based on the random-oracle model and resource analysis is provided to show security and resource efficiencies in medical application systems. In addition, the proposed scheme takes a part of the performance analysis to show that it has high-security features to build smart healthcare application systems in the IoM. To this end, experimental analysis has been conducted for the analysis of network parameters using NS3 simulator. The collected results have shown superiority in terms of the packet delivery ratio, end-to-end delay, throughput rates, and routing overhead for the proposed SAB-UAS in comparison to other existing protocols.

Highlights

  • Internet of Things (IoT) composes of various physical sensors or devices/virtual objects that are interconnected to share information over the public networks

  • Wazid et al [36] developed a secure lightweight authentication for IoT networks. Their scheme uses biometric, smart card and password as a three-factor to comply with key agreement properties

  • This subsection uses Burrows Abadi Needham (BAN) logic [50] to demonstrate that the proposed secure-anonymous biometric-based user authentication scheme (SAB-UAS) scheme is completely valid and practically efficient to prevent known-key attacks in order to satisfy the security efficiency of e-healthcare systems

Read more

Summary

INTRODUCTION

Internet of Things (IoT) composes of various physical sensors or devices/virtual objects that are interconnected to share information over the public networks. The communication entities such as medical sensor and experts share a secret session key to establish secure communication As a result, it is addressing the issue of user authentication problem that becomes a significant research area in the field of wireless sensor networks (WSNs) [11]–[14]. In order to provide a defensive mechanism, the proposed SAB-UAS scheme introduces a fuzzy verifier, which can timely infer user’s smartcard depravity As a result, it can prevent an online-guessing attack to provide seemliness intractability addressed in [17]. This paper presents a secure-anonymous biometric-based user authentication scheme (SAB-UAS) to perform smart revocation/reissue, and to achieve better security efficiencies using a formal security model. The formal and the informal security analysis demonstrate that the proposed scheme can achieve better security and performance efficiencies to prove its significance for smart healthcare systems in comparison with other existing schemes [61]–[63]

PAPER ORGANIZATION This paper organizes the sections as follows
RELATED WORKS
ELLIPTIC-CURVE CRYPTOSYSTEM
No Smartcard Loss Attack
C.12 Forward - Secrecy
SYSTEM LOGIN AND AUTHENTICATION PHASE
SECURITY PROOF BASED BAN LOGIC
H SIDj my
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call