Literature DB >> 33204211

Chaotic-map based authenticated security framework with privacy preservation for remote point-of-care.

B D Deebak1, Fadi Al-Turjman2, Anand Nayyar3,4.   

Abstract

The challenge of COVID-19 has become more prevalent across the world. It is highly demanding an intelligent strategy to outline the precaution measures until the clinical trials find a successful vaccine. With technological advancement, Wireless Multimedia Sensor Networks (WMSNs) has extended its significant role in the development of remote medical point-of-care (RM-PoC). WMSN is generally located on a communication device to sense the vital signaling information that may periodically be transmitted to remote intelligent pouch This modern remote system finds a suitable professional system to inspect the environment condition remotely in order to facilitate the intelligent process. In the past, the RM-PoC has gained more attention for the exploitation of real-time monitoring, treatment follow-up, and action report generation. Even though it has additional advantages in comparison with conventional systems, issues such as security and privacy are seriously considered to protect the modern system information over insecure public networks. Therefore, this study presents a novel Single User Sign-In (SUSI) Mechanism that makes certain of privacy preservation to ensure better protection of multimedia data. It can be achieved over the negotiation of a shared session-key to perform encryption or decryption of sensitive data during the authentication phase. To comply with key agreement properties such as appropriate mutual authentication and secure session key-agreement, a proposed system design is incorporated into the chaotic-map. The above assumption claims that it can not only achieve better security efficiencies but also can moderate the computation, communication, and storage cost of some intelligent systems as compared to elliptic-curve cryptography or RSA. Importantly, in order to offer untraceability and user anonymity, the RM-PoC acquires dynamic identities from proposed SUSI. Moreover, the security efficiencies of proposed SUSI are demonstrated using informal and formal analysis of the real-or-random (RoR) model. Lastly, a simulation study using NS3 is extensively conducted to analyze the communication metrics such as transmission delay, throughput rate, and packet delivery ratio that demonstrates the significance of the proposed SUSI scheme. © Springer Science+Business Media, LLC, part of Springer Nature 2020.

Entities:  

Keywords:  And key agreement; Authentication; Chaotic-map; Real-or-random; Remote point-of-care; Security and privacy

Year:  2020        PMID: 33204211      PMCID: PMC7659916          DOI: 10.1007/s11042-020-10134-x

Source DB:  PubMed          Journal:  Multimed Tools Appl        ISSN: 1380-7501            Impact factor:   2.757


Introduction

The spread of novel coronavirus known as COVID-19 has escalated drastically across the globe as a pandemic in early March 2020. It has become an outbreak of a global health emergency that searches a new technology to tackle the pandemic situation of the COVID-19. Of the information age, the digital applications have highly been recommended for the coordination effects of government and people. It includes early surveillance to perform effective contact tracing, testing, and strict quarantine. Most of the countries integrate the policies and healthcare in the digital technologies to facilitate pandemic planning including government coordination, treatments, hospital infrastructures, clinical management, medical supplies, screening, and containment zones. It uses big data and artificial intelligence as the effective tools to monitor and control the infection and mortality rate. To track the movement of the common people, a tool known as a migration map is utilized. It has been enabled in the smartphone, payment applications, and social media to infer the people location. It may periodically collect the data movements of the people to forecast the regional transmissions. It can also be more useful to guide the border checkup and surveillance. In addition, few countries have developed a dedicated application such as Aarogya Setu, Stopp Corona, COVIDSafe, Alipay, and smittestop that reports the data volume of active and discharge COVID-19 patients, staffing, protection equipment, and other information resources.

Implication of PoC

PoC is widely used as a diagnostic device to acquire the medical data of the patient. It has limited-resource settings to offer a clinical procedure that demands high-end instruments to perform results interpretation surgical clearance, and medical diagnosis. Since it demands a lot of improvements to meet the objectives of the healthcare systems, the practical use is still at the beginning phase. The PoC testing is still effective to obtain the clinical information that quickly performs the test procurement to treat the patients at the earliest. It may ultimately reduce turn-around time between the registration process to the report generation. Most of the developed countries apply the PoC test that changes the diagnostic process ranging from intensive care to personal care. However, the medical facilities draw the attention to the complex scenario to accommodate the diverse population across the globe. Despite the global advancements in diagnostic technologies, developing countries such as India, Thailand, and UAE face a major issue of automation. In the past, a remote point-of-care (PoC) has attracted research attention for its simplicity and convenience. In contrast to the conventional medical system, the PoC has several benefits such as assistive technology to the senior people, superior tractability for private healthcare bid organization providing maximum resource utilization [34]. In general, the PoC applications are associated with a series of interconnectivity devices, namely medical sensors, smartphones, and smart home-based gateway. The implantable curative sensors are positioned on the victim’s body to read and gather the functional data comprising heart bit-rate, temperature, sugar-value, etc. The sensing information is collected through a smartphone and transmitted to a remote server or terminal through the wireless gateway. Through the act of PoC healthcare applications, remote monitoring is having the abilities of several high-quality services such as emergency service and medical treatment. The PoC application may provide a novel approach for the diagnosis of rare medical treatment and the patient’s summary report generation. Due to its inherent capacity, the PoC has gained more application benefits for commercial enterprises. Since the biological data is extremely sensitive, privacy preservation is becoming a challenging issue in PoC. To maintain a patient’s privacy, the biological data should be well restrained i.e. from the endurance of malicious activities [35]. Generally speaking, it is classified into three system components such as sensor, network, and computing. These elements are used to sense, actuate, and monitor the environmental behavior that forms a heterogeneous network to communicate with the mobile terminals. Later, the network configuration transmits the data to offer application services to remote PoC. Of late, IoT-based remote PoC has been considered as an intelligent unit for telematics services. Due to serious health hazards in chronic and cardiovascular diseases, the demand for remote PoC has gained the researches attention and medical institutes. This provides a supplementary access to the medical institute, where the medical doctors collect and examine the physiological data of patients to monitor periodically.

Research motivation

Big data and AI play a crucial role to facilitate the preparedness of COVID-19 including screening, tracing, testing, treating. It uses a dedicated framework including migration map, smartphones, electronic payments, and social media to monitor the activities of the people. It may also allow tracking the people movement to forecast the transmission regions. Moreover, the integrated framework provides a privilege to infer the travel histories of the common people. In modern healthcare, the potential use of AI technique accelerates the process of intelligent and autonomous to regulate the system compliance requirements. Significant computing considers the learning process to investigate the structured datasets such as genetic and imaging data. It uses machine learning to build an investigation algorithm to collect the data features. However, the investigation techniques are still vulnerable to potential threats to critical application systems such as digital forensic and biometric. Therefore, a well-established protocol called authentication and key-agreement (AKA) [10] is highly necessitated to attain the basic security requirements of AKA namely user untraceability, forward/backward secrecy [27] and user anonymity [46]. Lamport introduced the initial key authentication mechanism [23] in 1981. In 1991, Frank et al. [43] presented a key agreement protocol that completely relies on HTTP. Conversely, Yang et al. [41] presented that Frank et al. were uncertain to withstand the vulnerabilities such as redirection, replay attack, and man-in-the-middle. Yang et al. constructed a competent user authentication, which resolves the key issues of Frank et al. Of late, several authentication mechanisms, namely two-factor [41], three-factor [11], identity-based [8], etc. have been constructed using pairing-based, factoring and discrete logarithm, elliptic-curve (EC) cryptography [22], and chaotic-map [40]. Though, these protocols experience a serious security limitation. The extensive investigation shows that most of the authentication mechanisms do not have proper cryptographic primitives or have a design defect to meet the security goals. Awasthi et al. [3] determined that Shen et al. [36] is easily susceptible to key-impersonation attack. To deal with the issues of Shen et al., Awasthi et al. constructed a novel timestamp-based authentication protocol. Though, their protocol discloses the information of the smart devices and its related parameter details to the adversaries. Additionally, Huang et al. [19] exhibited that Awasthi et al. cannot be resilient to user impersonation attacks and failed to maintain the secret-key /password update phase. Also, they introduced an improved timestamp-based authentication mechanism to resist various potential threats such as redirection, replay, password guessing, etc. Amin et al. [2] pointed out that Huang et al. cannot withstand key impersonation, password-guessing (online/offline) and privilege-insider. To solve security issues and inefficiency of the password update phase, Amin et al. presented a secure authentication based on the RSA cryptosystem. Computing devices and network technologies have developed various Internet of Things (IoT) application systems such as sustainable smart systems. It creates a real-world that seamlessly integrates the physical objects to communicate autonomously over the Internet. Numerous authentication and key agreement mechanisms [16, 27] have been introduced for resource-constrained electronic healthcare application systems. It may apply several cryptographic operations including Rivest-Shamir-Adleman (RSA) cryptosystem (i.e. an exponential operation), Chebyshev polynomial (i.e. chaotic one-way hashing operation), etc. A security protocol based on chaotic-map shows better performance efficiencies in comparison with conventional cryptosystem namely RSA and public-key cryptography. In most cases, ECC and RSA based authentication protocols consume more computation overhead because of excessive operators such as point multiplicative or modular exponential. It is evident that the secret key size of the Chebyshev Chaotic - Map is more modest as compared to ECC and RSA. Hence, it is widely identified to be chaotic-map based authentication schemes to achieve less computation and communication efficiencies than ECC or RSA-based authentication protocol. Many chaotic-map based authentication protocols are susceptible to desynchronization [41] and denial-of-service (DoS) attack [11]. Moreover, their schemes cannot offer client anonymity [46] and revocation mechanism for stolen or lost smartcard [11]. Additionally, the existing authentication schemes do not concentrate on real-time scenarios to examine ephemeral or temporary leakage that may cause a serious threat to security design. The above key issues propose to incorporate less computation and lightweight authentication based on a chaotic-map in RM-PoC. It can achieve better security efficiencies as compared to other existing schemes. As a result, the proposed scheme introduces single user sign-in to prevent the susceptibilities, such as password-guessing (online/offline), key-impersonation etc. However, a smartcard verifier attack i.e. lost/stolen is still challenging to address. Also, Srinivas et.al. [37] considered a symmetric authentication for WMSN. However, their protocol utilizes only less computation operations to attain lightweight key attributes that are formally analyzed to validate the threats such as man-in-the-middle and replay. Correspondingly, [4, 28] influenced security testing using AVISPA i.e. Automated Validation of Internet Security Protocols and Applications to validate the network threats. The recent published researches [1, 12] preferred to utilize efficient user authentication schemes that verify the performance of the Internet of Things (IoT). Turkanovic et al. [38] suggested a novel key agreement scheme for a distributed environment. Inopportunely, their authentication scheme has several security weaknesses, which are motivated to uncategorized cryptographic attacks. Farash et al. [14] resolved the security weaknesses of Turkanovic et al. Also, they suggested an enhanced authentication mechanism. The major research contributions are as follows: The proposed SUSI permits remote-user to strongly exchange a session key to any available medical-sensor node. It employs a privacy-preservation mechanism, where proper mutual authentication can be ensured between the real-time entities. It practices only simple hashing and X-OR computation to reduce the computation cost and introduces formal analysis to prove the efficiency of the proposed SUSI. In this study, Chebyshev Chaotic-Map operations, namely multiplication and addition are applied to achieve the secret key authentication. In order to reduce the computational overhead, a Chebyshev Chaotic-Map based authentication substitutes two-point multiplication into one modular-inversion and point-multiplication, whereby Chebyshev Chaotic-Map operations is claimed to be faster than the traditional operations [40]. Lastly, a security analysis including formal using RoR is conducted to show the major significance of the proposed SUSI scheme that demonstrates the security protection against the potential attacks required in RM-PoC. Section 2 discusses the related works and intelligent architecture using a cloud of things. Section 3 explains the Chebyshev Chaotic-Map and adversarial model. Section 4 proposes a single user sign-in (SUSI) mechanism using Chebyshev Chaotic-Map to describe the significance of system protection. Section 5 shows the security and performance analysis of the proposed SUSI and existing authentication schemes. Section 6 demonstrates the network simulation to analyze the quality metrics such as transmission delay, throughput rate, and packet delivery ratio. Section 7 concludes the research work.

Background

This section discusses the related works and intelligent architecture using a cloud of things to signify the challenging issues of existing authentication schemes.

Related works

Most of the countries prefer to use the web and cloud-based applications to support effective screening to the individuals. It adopts a high-performance camera to capture the people’s thermal images that measure their body temperatures at public transport, hotels workplace, and shopping malls. The collection of data is utilized to identify the hotspots and infection clusters that make conform to the testing and treatment process. Lately, researchers and business experts have been attracted to a protuberant solicitation of Wireless Medical Sensor Networks (WMSNs). It is encompassed of numerous lightweight smart devices with limited storage space, less computation power and bandwidth. Some investigation groups and schemes have concentrated their studies on smart patient monitoring. It uses wireless sensor networks (WSNs) to perform a live patient healthcare monitoring [5]. In structural design, medical sensors are firstly located on the victim physical structure to sense and gather the physiological data of patients, such as heart rate, human body temperature. In general, sensing data are conglomerated over real-time using smart devices by medical specialists. Conversely, the outflow of detecting data may impinge a victim’s data privacy and the interruption has the prospect to induct data alteration. It can give rise to the wrong diagnosis. Unlike traditional sensor network systems, the detected and collected victim’s data are very delicate. Therefore, the insecure communication over a wireless channel is exceptionally essential [35]. Numerous authentication protocols [32] have common security weaknesses, such as proper mutual authentication, data freshness, sensing data forgery, data disclosure, privileged-insider and key-impersonations attack. To address the security issues, the existing authentication schemes such as Chen et al. [6] and Le et al. [24] were enhanced. Conversely, their scheme cannot resist the security threats such as key-impersonation and replay, whereas Le et al. cannot offer the property of proper mutual authentication [7]. In this work, to support the security issues for WMSN further, an IEEE standard of 21,451–2 [15, 20] is preferred. The integration component known as Application Programming Interface (API) methods is useful, which uses an access controller to sense the records accurately in any intelligent system via WMSN. Likewise, an enhanced remote authentication using smart devices was offered to claim that their scheme can prevent password-guessing attacks i.e. online/offline [39]. Additionally, their scheme holds client anonymity to prevent information outflow. On the other hand, their scheme cannot resist the property of user anonymity; and thus does not prevent offline password guessing, information outflow and stolen-verifier [33]. Odelu et al. [33] introduced an authentication protocol based on ECC that shows the formal and informal security analysis to prove the security efficiency. However, their scheme cannot prevent offline password-guessing, and stolen-verifier attack. Moreover, they were failed to examine the performance overhead including computation and communication. Importantly, their algorithm did not use the hash properties explicitly. An efficient and adaptive mutual authentication framework was proposed [24] to suit real-time heterogeneous applications. In their mechanism, the phases such as system initialization; dynamic key sharing and establishment; revocation; and addition of new communication node are contrived. Liu et al. [29] presented a privacy-preserving authentication with shared authority that addresses the privacy of cloud-storage. Jiang et al. [21] developed a three-factor privacy preservation for e-Health cloud that incorporates a user revocation phase to improve the security efficiencies. Yu et al. [44] proposed an ID-based authentication with remote server integrity that reduces the system complexity and computation cost. Hu et al. [18] improved the privacy preservation scheme to examine the processing capacity and bandwidth consumption. Gunasinghe et al. [17] proposed a privacy-preserving biometric-based authentication for smart devices. Liu et al. [30] aimed to design a cooperative privacy preservation that considers space-ware and time-aware contexts. Li et al. [26] improved the mutual authentication and privacy preservation protocol that protects the privacy of the medical data to guarantee system reliability. Deebak et al. [12] developed an authentic-aware privacy preservation for the smart e-Health system. Madhusudhan et al. [31] designed an efficient authentication protocol to secure the roaming networks. However, most of the existing authentication schemes [12, 17, 18, 26, 30, 31, 44] could not provide better security and performance efficiencies to prevent potential attacks. Table 1 reviews the challenges of existing authentication schemes.
Table 1

Challenges of Existing Authentication Schemes

Existing Scheme Based on Privacy PreservationKey Agreement PropertiesSecurity Attacks
CH1CH2CH3CH4CH5CH6CH7CH8CH9CH10CH11CH12CH13
Liu et al. [29], 2014NoNoNoNoNoNoNoNoNoNoNoNoNo
Jiang et al. [21], 2016YesNoNoYesNoNoYesNoYesYesYesNoNo
Yu et al. [44], 2016NoNoNoNoNoNoNoNoNoNoNoNoNo
Hu et al. [18], 2017NoYesNoNoNoNoNoNoNoNoNoNoNo
Gunasinghe et al. [17], 2017NoNoNoNoNoNoNoNoNoNoNoNoNo
Liu et al. [30], 2018YesNoNoNoNoNoYesNoNoNoNoNoNo
Li et al. [26], 2018YesNoNoYesNoNoNoNoNoNoNoNoNo
Deebak et al. [12], 2019YesYesNoYesYesNoNoYesNoYesNoNoYes
Madhusudhan et al. [31], 2020YesNoNoYesYesNoYesNoYesNoYesYesNo

CH1 Property of Proper Mutual Authentication, CH2 Property of Secure Session-Key, CH3 Property of Known-Key Agreement, CH4 Property of User-Anonymity, CH5 User Friendliness, CH6 Property of Secret Key Disclosure, CH7 Property of Perfect Forward Secrecy, CH8 Resilient Stolen Smart Card Attack, CH9 Resilient to Password-Guessing Attack, CH10 Resilient to Stolen-Verifier Table Attack, CH11 Resilient to Privileged-Insider Attack, CH12 Resilient to Key-Impersonation Attack, CH13 Resilient to Sensor Node Capture Attack.

Challenges of Existing Authentication Schemes CH1 Property of Proper Mutual Authentication, CH2 Property of Secure Session-Key, CH3 Property of Known-Key Agreement, CH4 Property of User-Anonymity, CH5 User Friendliness, CH6 Property of Secret Key Disclosure, CH7 Property of Perfect Forward Secrecy, CH8 Resilient Stolen Smart Card Attack, CH9 Resilient to Password-Guessing Attack, CH10 Resilient to Stolen-Verifier Table Attack, CH11 Resilient to Privileged-Insider Attack, CH12 Resilient to Key-Impersonation Attack, CH13 Resilient to Sensor Node Capture Attack.

Proposed 5G framework

Figures 1 illustrates a proposed 5G framework for smart medical intelligence. The proposed 5G framework incorporates various real-time components such as medical information systems, 5G network, cloud service, and wearable sensors to understand the functional performance of healthcare systems. Each component has its own significance to monitor and analyze the potential threats. Wearable sensors collect and store the clinical data of the patient in medical information systems. The medical systems apply the smart intelligence on the technical data to detect the symptoms caused in terms of threat and non-threat. Cloud service includes policy certification and authentication access that interconnects the infrastructure over the Internet to upload the real-time data. It can observe the threat data to perform the following actions: 1. Infer the patient’s condition, 2. Generate a prediction result, 3. Communicate the result with medical experts, and 4. Provide a storage space for treatment follow-up. It includes a smart intelligence system using 5G that integrates wearable sensors, smartphones, and medical information systems in healthcare services. It utilizes low cost and low-power wireless devices such as Bluetooth, ZigBee, WiFi, and 6LoWPAN to provide connectivity between wearable sensors and smartphones. In another view, 5G is widely deployed to associate smartphones with cloud services and dedicated medical information systems to collect and analyze the sensing data of the patients. In healthcare, the biological sensors estimate the physiological conditions of the patient that feed the patient’s information. to the smart intelligence system whereby the data are analyzed through the knowledge of healthcare service providers. It can infer the data in the form of threat or non-threat over public Internet access to gain the information services. It has a dedicated data storage server to store and analyze the protected health information (PHI) of patients that grant the policies and service authentication governed by the Upon the successful authentication, the server utilizes the data blocks consisting of patient info, media-expert, authentic server over TMIS [42].
Fig. 1

Proposed 5G Framework for Smart Medical Intelligence

Proposed 5G Framework for Smart Medical Intelligence In the healthcare system, the medical patients obtain the PHI to screen the patient’s health condition, which is very much useful to provide a medical prescription [25]. In an emergency, a smart intelligent service can be initiated to offer medical treatments to the casualties before he/she undergoes any standard operating procedure. Importantly, the research and development process intensively analyzes the sensor input/output to foresee the network threats and its countermeasures. The practical key properties of WMSN [27, 37] are enumerated as follows: Proper Mutual Authentication: The experts agree to ensure a proper authentication between the expert, authentic-gateway, and sensor-node to approve the service access. Secret Session-Key Agreement: Segments the key parameters to generate a unique session-key among the communication entities to protect the system over an insecure network. Known-Key: A wishes to interfere with the secure session-key of any user, then he/she cannot easily infer a proper computation to compromise the session-key of the legal entities. Client Anonymity: User identities, such as an expert/device and remote-server may be concealed to prevent authorized access over public networks. Stolen Smartcard Attack: A modifies the user password upon the inference of old password and user identity in the session-key update phase to validate whether the entries are valid to change the secret-key or not. To address the aforestated issues, an ECC-based authentication was constructed for the WSNs [22]. Since they have more computation and storage complexity, it cannot be suitable for any intelligent systems [12]. Generally, users may usually desire to practice laidback to-recollect the system parameters, such as key characteristics and secret-key to gain the system access [1]; and thus client anonymity cannot be offered [46]. In the analysis, the anonymous based authentication protocols are vulnerable to user anonymity, password-guessing i.e. offline and de-synchronization attacks [46]. In order to provide reliable security and privacy, this paper proposes a SUSI Mechanism that secures the intelligence systems.

Preliminaries

This section discourses the Chebyshev Chaotic-Map and adversarial model to explain its major importance in any wireless communication system. The important key parameters of the proposed single user sign-in (SUSI) are illustrated in Table 2.
Table 2

Important Parameters Used in SUSI

ParametersDescription
AdvAdversary
MSMedical Sensor
MDMedical Device
RSRemote Server
GWAGateway Access
Tn(x)Recurrence Relation
qLarge Prime Integer
〈x〉A Polynomial Element
SSksecret session key with a string length k
PKSpublic-key
IdDevice-Identity
IDMSIdentity of MS
PWDMSPassword of MS
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ {ID}_{R_S} $$\end{document}IDRSIdentity of RS
h(.)One-way hash function i.e. \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ h:{\left\{0,1\right\}}^{\ast}\to {\left\{0,1\right\}}^{l_g} $$\end{document}h:0101lg
H(.)One-way hash function i.e. \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ H:{\left\{1,-1\right\}}^{\ast}\to {\left\{0,1\right\}}^{l_g} $$\end{document}H:1101lg
EK(.), DK(.)Symmetric encryption /decryption with a string length K
MSG1 To MSG4Transmission messages
Important Parameters Used in SUSI

Mathematical assumption of Chebyshev chaotic-map

This assumption defines the Chebyshev chaotic-map that represents a Chebyshev polynomial T(x), where 〈x〉 is a degree of 〈n〉. It can be defined as: T(x) = cos nθ, where x = cos θ. This assumption also defines the recurrence relation T(x), which can be expressed as: T(x) = 2xT(x) − T(x), for any n ≥ 2 with the assumption of T0(x) = 1 and T1(x) = x This assumption also defines the semi-group property of Chebyshev polynomial to satisfy the given expression: T(T (x) ) = T(x) = T(T (x) ), for s, r ∈ Ζ+ This assumption also defines the chaotic property of Chebyshev polynomial, where n > 1 represents a polynomial map T : [−1, 1] → [−1, 1] for the degree 〈n〉 with its relevant invariant density: , for an exponent of Lyapunov i.e. lnn > 0 [45] Dharminder et al. [13] improved the authentication protocol using Chebyshev chaotic-map to prevent the security weakness demonstrated by the existing protocols [26, 30]. To reinforce the security strategies, the Nergamo et al. extended the Chebyshev polynomial to satisfy the properties of semi-group and commutative i.e. in the interval of 〈−∞, ∞〉. The expression is as follows: Where n ≥ 2, ∀ x ∈ 〈−∞, ∞〉 and q is a large prime integer. It can be further defined as: This improved Chebyshev chaotic-map shows the assumptions of discrete logarithm and Diffie Hellman [22, 40]. The assumption problems are:

Extended Chebyshev chaotic-map based discrete-logarithm problem (DLP)

Assume that x, y and p are the integers to determine the parameter 〈r〉 that is much helpful to satisfy y = T(x) mod p i.e. computationally infeasible. The major advantage is that the adversary may try to resolve the extended Chebyshev chaotic-map based DLP i.e. computationally insignificant.

Extended Chebyshev chaotic-map based computational Diffie Hellman problem (CDHP)

Assume that T (x), T (x), T(.), x and p where r, s ≥ 2, x ∈ 〈−∞, ∞〉 and p is a large prime integer to calculate: T(x) ≡ T(T (x) ) ≡ T(T (x) ) mod p, which is computationally infeasible to solve the extended Chebyshev chaotic-map based Computational Diffie Hellman problem, denoted as . Hence, it is considered to be insignificant.

Extended Chebyshev chaotic-map based decisional Diffie Hellman problem (DDHP)

Assume that the parameters such as T (x), T (x), T(.), x and p are considered to decide: T(x) ≡ T(x) mod p, which is considered to be hold or computationally infeasible. The advantage is that an adversary can solve the extended Chebyshev chaotic-map based decisional Diffie Hellman problem, denoted as . Therefore, it is computationally negligible.

Attacker model

Most of the e-Health systems preserve the patient medical information from the outside environment that ensures the safety of the human being. To provide a timely diagnosis, the communication entities namely a patient and doctors are nowadays utilizing smart devices. The prime objective is to implant the medical sensors on a patient’s body that monitor and analyze the health status over a wireless channel. Since medical devices are highly exposed to network threats, an unauthorized user may try to steal sensitive data. Due to the physical stimuli, the global opportunists including media, insurance companies, etc. are seeking an opportunity to gain information access. As referred to in [12], an adversary A is assumed to have the following abilities to test the scenario i..e. formal and informal. A may try to overhear or eavesdrop the data transmission over public channel access i.e. between the legal user and remote server under the three-factor system environment. A may wish to steal the user’s particulars e.g. smartcard or mobile-device in order to retrieve the confidential information from the stolen device. A cannot infer the confidential parameters such as random integer, hash function and private secret-key s from the remote server R within the execution of polynomial time. It is presumed that the above computation could at least achieve a minimum-security length. A may deduce the communication parameters such as secret password and user identity from the two finite sets. Therefore, A has the possibility to perceive the above information in the given polynomial time. A may try to deceive the remote server R to know the confidential information i.e. specifically to enact or behave as a genuine user. A may try to perceive or guess a low entropy i.e. identity or password apart from others. However, the rules of the polynomial equation may not be violated to reveal the confidential data i.e. identity or secret password at the same execution time. Assume that the user identity length and secret password has n for each parameter to derive the probability 1/26 i.e. for n character long-string. To achieve the property of forward secrecy demonstrated in [46], A may try to collect the long-term information including user identity, secret password, storage data and a remote server. Though A perceives the above confidential data, he/she cannot compute the previous session. Thus, this proposed mechanism satisfies the property of forward secrecy.

Proposed single user sign-in (SUSI) mechanism

This section presents a proposed SUSI mechanism that is completely constructed using extended Chebyshev chaotic-map. As secret session-key is constructed using CDHP, none of adversary A can precompute the secret session-key. In other words, as the proposed scheme is based on Chebyshev’s chaotic-map, a malicious adversary may not compute a shared session-key to establish a communication between the user and remote server to forge a valid request message or impersonate as an authorized user. Moreover, in the phase of the secret-key update of SUSI, the random identities always guarantee the data freshness to authorize the data from the access of remote-server. Thus, the proposed SUSI can prevent the user privileged access to resist the susceptibilities, such as redirection, replay, and denial-of-service (DoS) attack. This proposed scheme comprises of: initialization, registration, login and key authentication, and secret-key update. The initialization phase uses Chebyshev chaotic-map to invoke a parameter of 〈x〉 on the given interval (−∞, ∞) that wants a large prime integer 〈p〉 to perform a modular arithmetic operation in order to maintain secrecy during the system initialization phase. Assume G, g and q be the defined parameters of the group. In addition, a secret session key SS, (Conjugate of SS) and registration server R (Which maintains SS with a random string length k) are chosen. Assume H : {0, 1}∗ → {0, 1} defines a hash function which resists the target collision and defines a pseudo-random function key. In addition, we define a hash (conjugate) function H′ : {0, 1}∗ → {0, 1} to preserve the identities of the users. In SUSI scheme, SS is assumed to be a derivative key by the H′(SS).

System initialization phase

Remote-server R builds a system communication parameters to perform the following execution steps: R generates a random prime number q and selects a polynomial element 〈x〉 for Chebyshev polynomial T(x) R chooses a random one-way hash H(.) to perform symmetric encryption and decryption i.e. E(.)/D(.) R chooses a secret session key SS ∈ 〈1, q + 1〉 to compute the public-key PK = T(x) mod q R publishes the system parameters i.e. {q, x, PK, H(.), E(.), D(.)}

System registration phase

R issues a secure gateway to the medical sensor M to ensure string security and privacy over a secure channel. M wishes to exchange SS to register with R. M sends a device-identity I along with user identity ID to R. R verifies whether Mis already registered or not. Otherwise, M computes X = H(I ∥ ID ∥ SS) and stores the system parameters {q, x, X, SS, H(.), E(.), D(.)} in R. It delivers the parameters to GW over a secure channel. GW receives the significant parameters from M to gain the server access R. GW collects the M inputs such as ID and PWDto compute G = H(ID ∥ PWD ∥ I) ⨁ X; and M = H(ID ∥ I ∥ X). Lastly, it stores the system parameters {q, x, G, M, H(.), E(.), D(.)} in the storage device.

System login and key-authentication phase

User namely M enters a secret session-key to access the private information of patient. A secure gateway retrieves the value of the secret session-key to perform the following computation [as shown in Fig. 2]:
Fig. 2

Flow Structure of Proposed SUSI: Login and Authentication Phase

M connects the medical device M that considers the device inputs such as ID, and PWD. G computes: Flow Structure of Proposed SUSI: Login and Authentication Phase ; When M is not equaled to , GW aborts the service session. Otherwise, GW chooses any random value SS ∈ 〈1, q + 1〉 to compute ; ; Y = H(ID ∥ I ∥ PK ∥ X); and . Finally, M sends the transmission message MSG1 = {Z, PK} to GW. Upon receiving the message MSG1 from M, GW connects with R to access the input parameters such as and . Then, it computes: ; When is not equaled to , GW aborts the service session. Otherwise, GW chooses any random value SS ∈ 〈1, q + 1〉 to compute ; ; ; ; and ; and . Then, it sends the transmission message to R. Upon receiving the message MSG2 from GW, R involves the following computation: ; ; ; . Then, R verifies whether Z is equaled to . If the verification does not hold, then R aborts the service session. Also, GW computes: ; ; ; . Then, GW verifies whether is equaled to . If the verification does not hold, then GW aborts the service session. Also, GW verifies: ;; ; and . Lastly, GW sends the transmission message to M and R. After receiving the message MSG3from GW, M involves the following computation: If Zis not equaled to , then MS aborts the service session. MS computes: ; If is not equaled to , then M aborts the service session. Otherwise, M sets as a session key. M computes . M sends the transmission message to R. After receiving the message MSG4from M, R computes ; . If is not equaled to , then R aborts the service session. R computes . If is not equaled to , R aborts the service session. Otherwise, R sets as a session key.

System key update phase

The execution steps are as follows: M connects GW that collects the inputs such as ID, and PWD to compute X = G ⨁ H(ID ∥ PWD ∥ I); and M = H(ID ∥ I ∥ X) to verify whether M and are identical. Otherwise, GW terminates the service session. Step2: R connects GW to render a new to compute and . Eventually, GW changes the parameters 〈G, M〉 into .

Analysis model

This section demonstrates the analysis model using the RoR model [3] to strengthen the efficiency of the proposed SUSI scheme. Moreover, the security analysis including formal and informal proves that the proposed SUSI may prevent several potential vulnerabilities to enhance the security competences.

Formal analysis

The formal analysis shows that the assumptions of Chebyshev chaotic-map are employed to prove the mathematical numerals are inflexible. Two random-oracle is enforced to prove the importance of secret-key [22, 40], which can be preserved from the adversaries. The proofs of execution are:

Reveal (1)

RoR model may yield a secret session-key SS to perform the executed output to validate the authentication request.

Reveal (2)

This RoR model uses two system parameters λ and Q1 to yield the users’s context-identity Q1 = T(x) mod p and λ = T(T(x) ) mod p

Theorem 1

Consider that the proposed SUSI is officially protected to defend the common secret session-key Q2 of gateway-node and device/sensor, if the proper statement of Chebyshev chaotic-map is provably intractable.

Proof

An adversary A who tries to generate a secret session-key of the authorized user SS and device identity M during the login and authentication phase. In case of Reveal (1) and Reveal (2), the system authentication phase is accessed to perform and deduce common session-key. To demonstrate the possibility of success proportion , where an extended Chebyshev chaotic-map based DLP is a oracle model secret key, is defined to experiment , where the probability of maximum success rate is measured over A act through the execution time t1 and demands P and Q to disclose the RoR model Reveal (1) and Reveal (2). The proposed SUSI scheme is legitimately identified to be protected as compared to adversary Ad particularly to guard the mutual secret session-key SSk between M/R and GW, if , to some extent ε > 0. With the experimental statement of , an adversary A can gather the identifications of expert, such as to make it in his / her game, if he / she has the ability to resolve the problem of extended Chebyshev chaotic-map based discrete-logarithm problem to control a numerical integer R, where . Conversely, this assumption is computationally unpractical owing to the difficulties defined As the computational step of adversary is commonly limited on and , the adversary has , for any insufficiency ε > 0. Therefore, this SUSI scheme can adhere to the security properties namely proper mutual authentication and secret session-key agreement in contrast to any Ad.

Theorem 2

Consider that the proposed SUSI scheme is rightfully safeguarded to keep the system parameter Q2 of theM/R and GW, even if the expert M or smart device M is stolen. Building an adversary A, who ought to derive the record of expert M to disclose. This aforesaid statement assumes that M′s is stolen. As referred to in [36], A applies the approach of power-analysis to infer the storage information of M, such as; . Upon the Inference of user information, Ad executes to recognize the common SS of the authorized user. This possibility utilizes the Reveal (2) of RoR model to rate the success probabilities and can be defined as to inspect the success rate of adversary Ad as separately, where the probability of maximum success rate is measured over A. It disclose the RoR model Reveal (2). This SUSI scheme is officially known to be safe against Ad particularly to shield the common SS of M and GW, if , for any insufficiency ε > 0. Considering the probability that A wishes to extract the legitimate information of the user i.e. from the stolen medical device M. Upon the successful extraction of the medical data, such as ID, and SS from the GW, A causes to infer the common SSk of the M and GW. Conversely, it is computationally infeasible to compute . Hence, the proposed SUSI not only achieves a property of user anonymity but also resists the potential attack i.e. the stolen smart device M.

Informal analysis

This analysis shows the security efficiencies of the proposed SUSI. They are as follows: Property of Proper Mutual Authentication: The proposed SUSI makes the authorized transmission messages, such as ; ; ; ; and ; and to dispatch to GW. The specific parameters such as Z, PK are utilized to prove user legitimacy. Therefore, the proposed SUSI adheres to the property of proper mutual authentication. Property of Session-Key Agreement: The proposed SUSI uses M and R to define a key SSk over the extraction of ; thus this proposed SUSI could generate a valid secret session-key during the execution of the authentication phase. Hence, the proposed SUSI adheres to the property of the session-key agreement. Property of Known-Key Security: is often modified to establish a secure session in a real-time environment. Therefore, A cannot regulate a valid SSk to interfere with the secret information. Therefore, the proposed SUSI adheres to the property of known-key security. Property of User-Anonymity: The user identities integrate with ; and thus Ad cannot infer the sensitive information of the expert without GW key. Therefore, the proposed SUSI achieves the security feature of user anonymity. Irrepressible to Stolen Smart Device Attack: The storage information of M does not share the system parameters such as for any user. Thus, Ad cannot access the database of M and GW to authenticate as a legitimate user. Hence, the proposed SUSI is irrepressible to the stolen smart device attack. User Friendliness: The proposed SUSI uses M to infer his/her own identities, namely ID, I, and Y. Besides, the secret-key of M i.e.I cannot be altered with proper mutual authentication. Thus, the proposed SUSI offers better user-friendliness to ease the system features. Irrepressible to Replay Attack: A may intervene in the message transmission to break the communication between the authentic clients. Conversely, using ID and , the real-time entities, namely M, and GW control the threat activities of A. Hence, the proposed SUSI scheme can be irrepressible to replay attack. Irrepressible to Password-Guessing Attack: Assume that A stole the smartcard of a legitimate user to extract the user information of smartcard, such as { G, M} using side-channel attack [19], where G = H(ID ∥ PWD ∥ I) ⨁ X; and M = H(ID ∥ I ∥ X). However, A cannot guess a secret key SS to compute ; to validate whether is not equaled to . Otherwise, M aborts the service session; thus A cannot verify the legal conformity without the freshness of (ID, I, X). Hence, the proposed SUSI may resist the password-guessing attack. Irrepressible to Stolen Verifier Table Attack: As the proposed SUSI scheme does not apply the verification table, A cannot infer the confidential data of real-time entities. Thus, it can be resilient to a stolen-verifier table attack. Irrepressible to Privileged-Insider Attack: As M always refers the user credentials, such as {ID, PWD, I, X} to GW over an insecure channel, A cannot exploit the privileged-insider to infer the user information M without random integer x. Thus, the proposed SUSI can be resilient to privileged-insider attack. Irrepressible to Man-in-the-Middle Attack: The aforesaid analysis proves that the SUSI scheme can offer better authentication between M, GW, and R. Thus, the proposed SUSI can be resilient to the man-in-the-middle attack. Irrepressible to Key Impersonation Attack: To personate as M for GW, Ad wishes to create a legal message transmission ; to check whether is not equaled to . Otherwise, GW aborts the service session. However, A cannot compute the to derive the system parameters. Thus, without extraction of smartcard information, A cannot make a valid message transmission. Hence, the proposed SUSI can provide resiliency against key impersonation attack. Secret-Key Disclosure: Consider that A may wish to overhear the transmission message in the authentication and key update phase. Conversely, without the determination of ; ; ; ; and ; and , A cannot infer secret-key SS of M to verify whether the expression is equal or not. Hence, the SUSI scheme achieves secret-key disclosure. Perfect Forward Secrecy: The authentication and key update uses Chebyshev Chaotic-Map assumption to contribute a session key SS between to guarantee perfect secrecy i.e. forward. To launch a secret session key, M and GW use diverse parameters to create a secure communication i.e. each session, and thus they are dissimilar as compared to the previous values verifying with Y = H(ID ∥ I ∥ PK ∥ X) to embrace with transmission delay. Consequently, the previous session-key SS of M and GW cannot disclose to any A, whereby a proper session-key cannot be computed to establish a secure between M and GW without {Z, PK}. Hence, the SUSI scheme guarantees perfect forward secrecy between the communication entities such as M, R and GW.

Resilient to sensor node capture attack

In this attack, M tries to compromise the confidential information of users to detect the non-compromised sensors and related legitimate users. To evaluate the implications, the deployed sensor node captures the system label as M′. Using M′, A captures the sensitive information of M that includes SS, R and its associated former secret session-key SS. As the system is not prepared with tamper-resistant, the sensitive information cannot be inferred to share the user information. The proposed SUSI uses secret session-key to generate and verify with to examine whether the computation is equal or not. If the computed values are not identical, then M dismisses the session establishment. Moreover, the establishment of secret session-key SS can be more discrete and computationally impracticable to gather the system parameters, which is non-invertibility determining one-way hash function. Thus, none of the sensitive information regarding M can be exposed to offer the resiliency against sensor-node capture attack. SP1: Property of Proper Mutual Authentication; SP2: Property of Session-Key Agreement; SP3: Property of Known-Key Security; SP4: Property of User-Anonymity; SP5: Resilient to Stolen Smart Card Attack; SP6: User Friendliness; SP7: Irrepressible to Replay Attack; SP8: Irrepressible to Password-Guessing Attack; SP9: Spirited to Stolen-Verifier Table Attack; SP10: Irrepressible to Privileged-Insider Attack; SP10: Irrepressible to Man-in-the-Middle Attack; SP11: Irrepressible to Key-Impersonation Attack; SP12: Secret key disclosure; SP13:Perfect Forward Secrecy; SP14:Irrepressible to Sensor Node Capture Attack; and SP15: Efficient Secret-Key Exchange.

Efficient secret-key exchange

The existing schemes [12, 26, 31, 37] ought to have a lack of input authentication, where a secret key update phase does not tolerate the legal use to login to the system server using a smart device. On the other hand, the legitimate user may not gain the server access, when he/she incorrectly passes the secret session-key during the key update phase. Since the proposed SUSI declares the new value to verify with the previous one, it may not allow any fabricated values in the key update phase. Hence, the proposed SUSI achieves better secret-key exchange as compared to other existing schemes [12, 26, 31, 37]. Table 3 demonstrates the comparison of security efficiencies for proposed SUSI and existing schemes [12, 26, 31, 37]. From Table 3, it is observed that the SUSI scheme delivers a more competent and operative solution to preserve the entities, such as M, S and GW close to various possible attacks illustrated in Table 3. Moreover, the proposed SUSI scheme proves better security efficiencies than other existing schemes [12, 26, 31, 37].
Table 3

Comparison of Security Efficiencies

Security PropertiesLi et al. [26]Deebak et al. [12]Madhusudhan et al. [31]Srinivas et al [37]Proposed SUSI
SP1
SP2××
SP3×××
SP4×
SP5××
SP6×
SP7
SP8××
SP9×××
SP10×××
SP11××
SP12××××
SP13××
SP14×××
SP15××
Comparison of Security Efficiencies

Performance comparison

Table 4 shows the assessment of performance analysis for proposed SUSI and existing schemes [12, 26, 31, 37]. As referred in [9], the time consumption of one-way hash function T, signature T and symmetric key encryption/decryption T are considered as 0.0004 s, 0.1303 s, and 0.3317 s respectively. The proposed SUSI scheme considers the above values to analyze the communication overhead of the login and authentication phase. From Table 1, the transmission length of real-time entities such as M, R and GW is defined as 160 bits. The comparative analysis is as follows:
Table 4

Performance Comparison of Proposed SUSI and Existing Authentication Schemes

Performance ParametersLi et al. [26]Deebak et al. [12]Madhusudhan et al. [31]Srinivas et al [37]Proposed SUSI
Storage Space in Smart Device (MD)832704832640520
System Login and Authentication Phase (ms)(MS)10TH + 4TE/D + 2TS6TH + 1TE/D3TH + 2TE/D8TH + 2TE/D3TH + 1TE/D
(GWA)1TS + 3TE/D + 11TH9TH + 2TE/D1TH + 2TE/D4TH + 1TE/D8TH + 1TE/D
(RS)4TS + 8TE/D + 16TH7TH2TH + 2TE/D4TH + 2TE/D6TH + 2TE/D
Computation Cost (s)5.8881.0041.9931.6631.334
Communication Cost (bits)41921216200015041280
Formal AnalysisNoNoYesYesYes
Message Rounds44544
Performance Comparison of Proposed SUSI and Existing Authentication Schemes The proposed SUSI consumes less time during the system registration phase than other existing schemes [12, 26, 31, 37]. At GW, the proposed SUSI demonstrates less time consumption as compared to other authentication schemes [12, 26, 31, 37]. At M, the proposed SUSI scheme records less time consumption to improve the transmission efficiency and data analysis as compared to other schemes [12, 26, 31, 37]. At R, the proposed SUSI scheme consumes less execution time than Li et al. [26], however, it consumes more execution time than other authentication schemes [12, 31, 37]. The communication cost of proposed SUSI scheme is recorded into 〈1280 bits〉, which is comparatively more than Deebak et al. [12] but less than the other existing schemes [26, 31, 37]. The proposed SUSI previously demonstrates its safety measures in both formal and informal analysis; and thus the major weaknesses of existing schemes can be dealt with successfully [12, 26, 31, 37]. The computation of proposed SUSI records less calculation cost with other schemes [12, 26, 31, 37], as it operates with minimum cost to establish a secure message transmission between the real-time entities. While probing the operation cost of the login and authentication phase, most of the authentication schemes report fewer transmission rounds between the communication entities as compared to Madhusudhan et al. [31]. Most importantly, the SUSI scheme is verified to be well secure over the potential threats depicted in Table 2 in comparison with other schemes [12, 26, 31, 37].

Practical analysis

This section demonstrates the practical examination using NS3 to examine the communication metrics such as Transmission Delay 〈T〉 and Throughput Rate 〈T〉. To realize the network simulation, an extensive NS3 version i.e. NS-3.28 has been installed in Ubuntu 14.04 LTS. Table 5 defines the important simulation parameters that include network coverage i.e. 100 × 100 m2 to examine transmission scenario between M, GW, and R with a node distance of 25 m to 50 m, studied in [12]. A wireless standard i.e. IEEE 802.15.4 is chosen as a media access control (MAC) to simulate the network ≈1800 sec i.e. 30 min. To realize the transmission scenario, an optimized link-state routing protocol 〈OLSR〉 is preferred that provides dynamic routing to uphold the importance of distributed routing among the communication entities such as M, GW, and R. (Table 5)
Table 5

Simulation Parameters Used

Network ParameterDescription
Operating SystemUbuntu 14.04 LTS
Network SimulatorNS-3.28
Number of Communication Nodes〈2, 6, 2〉
Number of Medical Sensor Nodes〈160〉
Number of Remote Server〈3〉
Packet Size〈144 bits〉,〈80 bits〉,〈64 bits
Gateway Location〈50 × 25 m2
Traffic TypeTCP/UDP
Interval Time0.5 s
Mobility Speed〈≈2 to 50 m/s
Initialization of a Node Energy〈≈3600 J
Transmission Power〈28 dBm
Voltage supplied〈3 V
Simulation Parameters Used To investigate the communication metrics, M nodes are distributed in rectangular form. In the simulation, 〈20〉 sensors are administered in a row that may subsequently incur more number of rows in the execution scenario, constructively not more than 〈8〉 rows. To investigate the network, two gateway nodes GW, six medical sensors M and 2 remote servers R are deployed. This is a note that GW is regularly inspected to examine the transmission scenario, which includes four transmission messages such as MSG1 = {Z, PK}, , , and . The above transmission messages are periodically invoked with the given packet size to examine the quality metrics such as 〈T〉, and 〈T〉. Each smart device M initiates the message transmission for the interval of 0.5 s.

Analysis 1: Transmission delay 〈T〉

T is generally defined as the expected time-taken by the data packets to the sink node from the source node. The overall computation is as follows: , where N is the number of transmitted data packets; are the data packets initiated by the sender and receiver for the given network scenario. From Fig. 3, it is found that the proposed SUSI reports less transmission delay than other existing schemes [26, 31, 37] except for Deebak et al. [12]. The average transmission delays of proposed SUSI and other existing schemes are recorded as follows:0.216 s, 0.146 s, 0.174 s, 0.167 s, and 0.153 s respectively. From the simulation, it is also noted that the transmission delay soars up when the number of packet transmission increases proportionally by the communication nodes. However, the proposed SUSI keeps the delay within the restricted limit in the use of less message rounds between the communication entities such as M, GW, and R than the other existing schemes [26, 31, 37] excluding Deebak et al. [12].
Fig. 3

Transmission Delay (sec)

Transmission Delay (sec)

Analysis 2: Throughput rate 〈T〉

T is generally defined as the number of successfully transmitted bits per execution time. The overall computation can be expressed as follows: , where TN is the total number of data packets received successfully, P is the transmission packet; and T is the total transmission time. From Fig. 4, it is noticed that the proposed SUSI achieves a better throughput rate than other existing schemes [26, 31, 37] excluding Deebak et al. [12]. The simulation study shows that the execution time was considered to analyze the successful transmission packets i.e. for proposed SUSI and other authentication schemes [12, 26, 31, 37]. The average successful transmission bits of proposed SUSI and other existing schemes are recorded as follows:675 bits, 850 bits, 1025 bits, 640 bits, and 1165 bitsrespectively. This is to note that the proposed SUSI has a slight deviation at 560 s to 960 s due to more number of transmission packets among the communication nodes.
Fig. 4

Throughput Rate (bps)

Throughput Rate (bps)

Analysis 3: Packet delivery ratio 〈P〉

P investigates the strength of the transmission link in terms of reliability to evaluate the delivery ratio of the transmitted packets. Since the evaluation result fixes the link reliability ≈90%, the simulation is not performing packet retransmission to validate the proof of delivery ratio. Figure 5 shows the packet delivery ratio 〈%〉 versus the simulation time 〈sec〉 with link reliability ≈90%. Since the proposed SUSI handles the random identities efficiently, it guarantees the data freshness to authorize the data from the remote server access. Moreover, the proposed SUSI utilizes fewer computation operators to process the data forwarding; thereby the energy consumption of the node is minimized. However, the other existing schemes neglect the important factors of the transmission link resulting in packet loss. Most importantly, the proposed SUSI evaluates transmission messages with limited message rounds to eliminate the traffic congestion and to improve the delivery ratio of the transmitted packets. The examination result reveals that the proposed SUSI achieves a better delivery ratio ≈of 11.8 % , 10.25 % , 16.15 % , and 16.35% than other existing schemes [12, 26, 31, 37] to improve the routing efficiencies of the network.
Fig. 5

Packet Delivery Ratio 〈%〉

Packet Delivery Ratio 〈%〉

Conclusions

The major divergence among the nations is the protection of citizen data to meet the global constraint of user privacy. It has limited data access for the healthcare authorities and researchers, which deal with a large amount of medical data to analyze the challenges of privacy protection. Since the data are immeasurable to the medical experts, most of the researchers may work harder on confidential data of the patient to regulate the risks of non-compliance. Therefore, in this paper, a Single User Sign-In (SUSI) has been proposed for RM-PoC using WMSN. The proposed SUSI utilized remote user to strongly exchange a session key to any available sensor node that employs a privacy-preservation strategy to achieve a proper mutual authentication between the communication entities. From the security analysis, the proposed SUSI scheme proves that it cannot only achieve the security properties of AKA protocol, such as proper mutual authentication, secret session-key agreement, etc., but also be resilient to a stolen smart device, privileged-insider and password-guessing attack. As the proposed SUSI satisfies the security goals of WMSN, it can be well suited for the healthcare application systems using WMSN. The proposed SUSI uses an extended Chebyshev Chaotic-Map to preserve user anonymity to prevent information leakage. Using security and performance analysis, the proposed SISI claims the improved efficiencies in comparison with other existing schemes [12, 26, 31, 37]. Moreover, the simulation results show that the computation of proposed SUSI has less transmission costs to operate the message transmission between the real-time entities to prove its better efficiencies in terms of transmission delay, throughput rate, and packet delivery ratio. In the future, a possible remote registration will be incorporated to investigate the practical and computation difficulties.
  1 in total

1.  Blockchain and IPFS Integrated Framework in Bilevel Fog-Cloud Network for Security and Privacy of IoMT Devices.

Authors:  Abolfazl Mehbodniya; Rahul Neware; Sonali Vyas; M Ranjith Kumar; Peter Ngulube; Samrat Ray
Journal:  Comput Math Methods Med       Date:  2021-12-07       Impact factor: 2.238

  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.