A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare


Creative Commons License

Chen C., Liu S., Chaudhry S. A., Chen Y., Khan M. A.

CMES - Computer Modeling in Engineering and Sciences, cilt.130, sa.3, ss.307-329, 2022 (SCI-Expanded, Scopus) identifier

  • Yayın Türü: Makale / Tam Makale
  • Cilt numarası: 130 Sayı: 3
  • Basım Tarihi: 2022
  • Doi Numarası: 10.32604/cmes.2022.018749
  • Dergi Adı: CMES - Computer Modeling in Engineering and Sciences
  • Derginin Tarandığı İndeksler: Science Citation Index Expanded (SCI-EXPANDED), Scopus, Aerospace Database, Communication Abstracts, Compendex, INSPEC, Metadex, zbMATH, Civil Engineering Abstracts
  • Sayfa Sayıları: ss.307-329
  • Anahtar Kelimeler: Intelligent medical, IoT, User authentication
  • Açık Arşiv Koleksiyonu: AVESİS Açık Erişim Koleksiyonu
  • İstanbul Gelişim Üniversitesi Adresli: Evet

Özet

© 2022 Tech Science Press. All rights reserved.With the rise of the Internet of Things (IoT), the word "intelligent medical care" has increasingly become a major vision. Intelligent medicine adopts the most advanced IoT technology to realize the interaction between patients and people, medical institutions, andmedical equipment. However, with the openness of network transmission, the security and privacy of information transmission have become a major problem. Recently, Masud et al. proposed a lightweight anonymous user authentication protocol for IoT medical treatment, claiming that their method can resist various attacks. However, through analysis of the protocol, we observed that their protocol cannot effectively resist privileged internal attacks, sensor node capture attacks, and stolen authentication attacks, and their protocol does not have perfect forward security. Therefore, we propose a new protocol to resolve the security vulnerabilities inMasud s protocol and remove some redundant parameters, so as tomake the protocol more compact and secure. In addition, we evaluate the security and performance of the new protocol and prove that the overall performance of the new protocol is better than that of other related protocols.