Secure and Efficient Cloud-based IoT Authenticated Key Agreement scheme for e-Health Wireless Sensor Networks

  • PDF / 2,374,707 Bytes
  • 16 Pages / 595.276 x 790.866 pts Page_size
  • 19 Downloads / 248 Views

DOWNLOAD

REPORT


RESEARCH ARTICLE-COMPUTER ENGINEERING AND COMPUTER SCIENCE

Secure and Efficient Cloud‑based IoT Authenticated Key Agreement scheme for e‑Health Wireless Sensor Networks Bander A. Alzahrani1  Received: 10 April 2020 / Accepted: 19 August 2020 © King Fahd University of Petroleum & Minerals 2020

Abstract With the advancement and innovations in mobile and wireless communication technologies including cloud computing and Internet of Things, the paradigms of dispensing heath-based services have massively transformed. The telecare medical information system (TMIS) or wireless body area networks technology frameworks facilitate patients to remotely receive medical treatment from physicians through the Internet without paying a visit to the hospital. In order to ensure the medical privacy of the patients and the verification of authenticity of all entities in TMIS-based system before exchange of sensitive credentials and diagnosis reports, many TMIS-based authentication protocols have been presented so far; however, there is a still need of more efficient and secure key agreements. Recently, Karthegaveni et al. demonstrated a remote health care monitoring protocol with the use of elliptic curve cryptography crypto-primitives. However, we discover many drawbacks in their protocol including replay attack, denial of service attack, lacking mutual authenticity between the client and server. Moreover, the scheme has several technical limitations. We propose an efficient and secure TMIS-based protocol employing lightweight symmetric key operations. The contributed model is proven by rigorous formal security analysis, while its security features are also validated under automated ProVerif tool. The proposed scheme supports 38% more security features on average than compared schemes. The performance evaluation also depicts that the demonstrated and comparative findings are in the favour of the proposed model. Keywords  Patient health care · Cryptography · Authentication · Smart card · TMIS · Session key

1 Introduction The mushrooming growth of Internet of Things (IoT)-based network applications such as smart home, smart grid, vehicle to grid, wireless body area networks, automobile applications, smart industrial applications, e-government office and departments, etc., has revolutionized every aspect of human activity and interaction. The cloud-based IoT application enables the objects to provide smooth connectivity among the inter-networked devices, for collecting and sharing data over a common channel. These booming applications of IoT represent the increasing trend of wireless sensor networks (WSN) [1–4]. The critical data of clients need to be gathered in an anonymous way upon the attainment of mutual authentication procedure between legal participants. * Bander A. Alzahrani [email protected] 1



Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia

The e-health care-based patient remote monitoring system (ePMS) is gaining more interest lately due to the growing number of pat