Abstract

IoMT has been gradually gaining traction in the healthcare industry and holds up the prospect of a time when it will not only be common but also fully expanded outside the confines of clinics and hospitals. IoMT deployment in real life calls for improved responsiveness and healthcare quality while reducing patient care expenses. But the cybercriminals try every computer, every hospital, every day several times. Consequently, shoddy security is one of the biggest problems of IoT in healthcare. IoMT demands more stringent security since medical data is sensitive and its contents are essential. IoMT devices are accessible for attackers to acquire control of, and once they do, they can start modifying the course of treatment possibly leading to patient fatalities. To satisfy the security requirements, this research suggests a group-based efficient authentication and key agreement (GBEAKA) protocol, which is suitable for low-power IoMT devices. The suggested protocol meets security objectives like authentication & key agreement between the devices, privacy of subscribers, unlinkability, key confirmation, and perfect forward/backward key secrecy between the sessions. More conclusive AVISPA tool and BAN logic has been used to analyze the security claims of the suggested protocol, and the findings show that it is secure against various cryptographic attacks. According to a mathematical study of the protocol, the suggested protocol is also compatible with low-power IoMT (LPIoMT) devices since it accomplishes its goals with the least amount of signaling overhead, bandwidth consumption, and computational cost.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call