| Literature DB >> 32272675 |
Ana Paula G Lopes1, Paulo R L Gondim1.
Abstract
The development of the Internet of Things (IoT) predicts several new applications, some of which are designed to be incorporated into e-health systems, and some technologies, like cloud computing and device-to-device communication (D2D), are promising for use in the support of resource-constrained devices employed in Mobile-health (m-health) and Telecare Medicine Information Systems (TMIS). In a scenario with billions of devices predicted for the IoT, it is essential to avoid performance and security problems, among others. Security is fundamental for the achievement of optimal performance regarding the sensibility of e-health shared data and, especially, the anonymity of patients and other entities, while it is also essential to consider the scarcity of bandwidth in wireless networks. This paper proposes a new mutual authentication protocol for m-health systems, which supports D2D communication, ensuring security and surpassing the performance and security of other authentication procedures reported in the literature.Entities:
Keywords: IoT; authentication; device-to-device; m-health; security
Mesh:
Year: 2020 PMID: 32272675 PMCID: PMC7181216 DOI: 10.3390/s20072072
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The architecture of the proposed scheme.
Comparison among some protocols.
| D2D Communication | m-Health/e-Health/TMIS | Type of Cryptography | Cloud Server | |
|---|---|---|---|---|
| Chiou et al. [ | No | Yes | Asymmetric | Yes |
| Mohit et al. [ | No | Yes | Asymmetric | Yes |
| Jiang and Lian [ | No | Yes | Symmetric | No |
| Li et al. [ | No | Yes | Asymmetric | No |
| Wang and Yan [ | Yes | No | Asymmetric | No |
| Hsu et al. [ | Yes | No | Asymmetric | No |
| Zhang et al. [ | Yes | Yes | Asymmetric | No |
| Our Protocol | Yes | Yes | Symmetric | Yes |
Notations used in the protocol.
| Symbol | Description |
|---|---|
| x, y | Entities: patient (P), health center (H), doctor (D), cloud server (C). |
|
| Real identity of entity x/ Temporary identity of entity x. |
|
| Random numbers generated in the registration phase. |
|
| k random number generated. |
| MACxy | Message Authentication Code generated from entity x to entity y. |
|
| Random number generated by entity x. |
|
| Random number generated by the cloud and sent to entity y. |
|
| Timestamp generated by entity x. |
|
| Session key generated by entities x and y. |
|
| Validator of the session key generated by x and y. |
|
| Encryption/Decryption operation that used the session key generated by x and y. |
|
| International Mobile Subscriber Identity of device x |
|
| Temporary identity generation hash function. |
|
| MAC generation hash function. |
|
| Session key generation hash function. |
|
| Session key verifier generation hash function. |
|
| Secure channel. |
|
| Insecure channel. |
Figure 2Message exchange in health center upload (HUP).
Figure 3Message exchange in patient upload (PUP) for direct access to 3GPP infrastructure.
Figure 4Message exchange in PUP when device-to-device (D2D) communication is adopted to reach the 3GPP infrastructure and the cloud server.
Figure 5Message exchange in treatment phase (TP).
Figure 6Message exchange in checkup phase (CP).
Comparison of security objectives among protocols.
| Security Objectives | Chiou et al. [ | Mohit et al. [ | Our Protocol |
|---|---|---|---|
| Mutual Authentication | Yes | Yes | Yes |
| Forward/Backward Secrecy | Yes | Yes | Yes |
| Confidentiality | No | Yes | Yes |
| Non-Repudiation | Yes | Yes | Yes |
| Anonymity | No | Yes | Yes |
| Patient’s Non-Traceability | No | Yes | Yes |
| Session Key Security | Yes | Yes | Yes |
| Resistance to patient’s mobile device loss/stealing | No | Yes | Yes |
| Resistance to Impersonation attack | Yes | Yes | Yes |
| Resistance to replay attack | Yes | Yes | Yes |
| Resistance to Denial of Service (DoS) | Yes | No | Yes |
| Resistance to man-in-the-middle attack | Yes | Yes | Yes |
Execution time of each operation considered.
| Symbol | Description | Cost (Seconds) |
|---|---|---|
| TS | Execute/Verify a Signature | 0.3317 s |
| TP | Bilinear Pairing | 0.0621 s |
| TE | Encrypt/Decrypt (Symmetric) | 0.0087 s |
| TH | One Way Hash Function | 0.0005 s |
Computational cost of protocols.
| Chiou et al. [ | Mohit et al. [ | Proposed Protocol | |
|---|---|---|---|
| HUP | nTS + 3nTP + 2nTE + 7nTH | nTS + 3nTE + 11nTH | 2nTE + 8nTH |
| PUP | nTS + 3nTP + 2nTE + 9nTH | 2nTS + 2nTE + 10nTH | 4nTE + 9nTH |
| TP | 2nTS + 3nTP + 2nTE + 8nTH | 2nTS + 2nTE + 9nTH | 4nTE + 8nTH |
| CP | nTS + 2nTP + 2nTE + 8nTH | nTS + 2nTE + 5nTH | 2nTE + 8nTH |
| TOTAL (s) | 5nTS + 11nTP + 8nTE + 32nTH = 2.43n | 4nTS + 9nTE + 35nTH = 1.42n | 12nTE + 33nTH = 0.21n |
Figure 7Computational cost comparison.
Cost of each parameter exchanged in bits.
| Parameter | Cost |
|---|---|
| Random Number/Identity/Timestamp | 48 bits |
| Bilinear Pairing/Hash | 160 bits |
| Symmetric Key | 128 bits |
| Signature (symmetric algorithm) | 512 bits |
Comparison of communication costs in bits.
| Chiou et al. [ | Mohit et al. [ | Proposed Protocol | |
|---|---|---|---|
| HUP | 704n | 592n | 736n |
| PUP | 1600n | 1744n | 736n + 736m + 208(m-1) |
| TP | 2112n | 1792n | 864n |
| CP | 1504n | 1184n | 736n |
| TOTAL | 6920n bits | 4832n bits | 3072n bits |
Figure 8Communication cost comparison.
Energy cost of protocols.
| Reference/Protocol→ | Chiou et al. [ | Mohit et al. [ | Proposed Protocol |
|---|---|---|---|
| TOTAL | (5nTS + 11nTP + 8nTE + 32nTH) * 10.88 = 26.43n mJ | (4nTS + 9nTE + 35nTH) * 10.88 = 15.45n mJ | (12nTE + 33nTH) * 10.88 = 2.93n mJ |
Figure 9Energy cost comparison.
Figure 10Role of D2D device Dpi in PUP phase.
Figure 11Role of the cloud server in PUP phase.
Figure 12On-the-Fly-Model-checker (OFMC) analysis result.
Figure 13Constraint Logic-based Attack Searcher (CL-AtSe) analysis result for PUP phase.