| Literature DB >> 33204211 |
B D Deebak1, Fadi Al-Turjman2, Anand Nayyar3,4.
Abstract
The challenge of COVID-19 has become more prevalent across the world. It is highly demanding an intelligent strategy to outline the precaution measures until the clinical trials find a successful vaccine. With technological advancement, Wireless Multimedia Sensor Networks (WMSNs) has extended its significant role in the development of remote medical point-of-care (RM-PoC). WMSN is generally located on a communication device to sense the vital signaling information that may periodically be transmitted to remote intelligent pouch This modern remote system finds a suitable professional system to inspect the environment condition remotely in order to facilitate the intelligent process. In the past, the RM-PoC has gained more attention for the exploitation of real-time monitoring, treatment follow-up, and action report generation. Even though it has additional advantages in comparison with conventional systems, issues such as security and privacy are seriously considered to protect the modern system information over insecure public networks. Therefore, this study presents a novel Single User Sign-In (SUSI) Mechanism that makes certain of privacy preservation to ensure better protection of multimedia data. It can be achieved over the negotiation of a shared session-key to perform encryption or decryption of sensitive data during the authentication phase. To comply with key agreement properties such as appropriate mutual authentication and secure session key-agreement, a proposed system design is incorporated into the chaotic-map. The above assumption claims that it can not only achieve better security efficiencies but also can moderate the computation, communication, and storage cost of some intelligent systems as compared to elliptic-curve cryptography or RSA. Importantly, in order to offer untraceability and user anonymity, the RM-PoC acquires dynamic identities from proposed SUSI. Moreover, the security efficiencies of proposed SUSI are demonstrated using informal and formal analysis of the real-or-random (RoR) model. Lastly, a simulation study using NS3 is extensively conducted to analyze the communication metrics such as transmission delay, throughput rate, and packet delivery ratio that demonstrates the significance of the proposed SUSI scheme. © Springer Science+Business Media, LLC, part of Springer Nature 2020.Entities:
Keywords: And key agreement; Authentication; Chaotic-map; Real-or-random; Remote point-of-care; Security and privacy
Year: 2020 PMID: 33204211 PMCID: PMC7659916 DOI: 10.1007/s11042-020-10134-x
Source DB: PubMed Journal: Multimed Tools Appl ISSN: 1380-7501 Impact factor: 2.757
Challenges of Existing Authentication Schemes
| Existing Scheme Based on Privacy Preservation | Key Agreement Properties | Security Attacks | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Liu et al. [ | |||||||||||||
| Jiang et al. [ | |||||||||||||
| Yu et al. [ | |||||||||||||
| Hu et al. [ | |||||||||||||
| Gunasinghe et al. [ | |||||||||||||
| Liu et al. [ | |||||||||||||
| Li et al. [ | |||||||||||||
| Deebak et al. [ | |||||||||||||
| Madhusudhan et al. [ | |||||||||||||
CH1 Property of Proper Mutual Authentication, CH2 Property of Secure Session-Key, CH3 Property of Known-Key Agreement, CH4 Property of User-Anonymity, CH5 User Friendliness, CH6 Property of Secret Key Disclosure, CH7 Property of Perfect Forward Secrecy, CH8 Resilient Stolen Smart Card Attack, CH9 Resilient to Password-Guessing Attack, CH10 Resilient to Stolen-Verifier Table Attack, CH11 Resilient to Privileged-Insider Attack, CH12 Resilient to Key-Impersonation Attack, CH13 Resilient to Sensor Node Capture Attack.
Fig. 1Proposed 5G Framework for Smart Medical Intelligence
Important Parameters Used in SUSI
| Parameters | Description |
|---|---|
| Adversary | |
| Medical Sensor | |
| Medical Device | |
| Remote Server | |
| Gateway Access | |
| Recurrence Relation | |
| q | Large Prime Integer |
| 〈x〉 | A Polynomial Element |
| secret session key with a string length | |
| public-key | |
| Device-Identity | |
| Identity of | |
| Password of | |
| Identity of | |
| One-way hash function i.e. | |
| One-way hash function i.e. | |
| Symmetric encryption /decryption with a string length | |
| Transmission messages |
Fig. 2Flow Structure of Proposed SUSI: Login and Authentication Phase
Comparison of Security Efficiencies
| Security Properties | Li et al. [ | Deebak et al. [ | Madhusudhan et al. [ | Srinivas et al [ | Proposed SUSI |
|---|---|---|---|---|---|
| √ | √ | √ | √ | √ | |
| √ | √ | √ | |||
| √ | √ | ||||
| √ | √ | √ | √ | ||
| √ | √ | √ | |||
| √ | √ | √ | √ | ||
| √ | √ | √ | √ | √ | |
| √ | √ | √ | |||
| √ | √ | ||||
| √ | √ | ||||
| √ | √ | √ | |||
| √ | |||||
| √ | √ | √ | |||
| √ | √ | ||||
| √ | √ | √ |
Performance Comparison of Proposed SUSI and Existing Authentication Schemes
| Performance Parameters | Li et al. [ | Deebak et al. [ | Madhusudhan et al. [ | Srinivas et al [ | Proposed SUSI | |
|---|---|---|---|---|---|---|
| Storage Space in Smart Device ( | 832 | 704 | 832 | 640 | 520 | |
| System Login and Authentication Phase (ms) | ( | 10 | 6 | 3 | 8 | 3 |
| ( | 1 | 9 | 1 | 4 | 8 | |
| ( | 4 | 7 | 2 | 4 | 6 | |
| Computation Cost ( | 5.888 | 1.004 | 1.993 | 1.663 | 1.334 | |
| Communication Cost (bits) | 4192 | 1216 | 2000 | 1504 | 1280 | |
| Formal Analysis | No | No | Yes | Yes | Yes | |
| Message Rounds | 4 | 4 | 5 | 4 | 4 | |
Simulation Parameters Used
| Network Parameter | Description |
|---|---|
| Operating System | Ubuntu 14.04 LTS |
| Network Simulator | NS-3.28 |
| Number of Communication Nodes | 〈2, 6, 2〉 |
| Number of Medical Sensor Nodes | 〈160〉 |
| Number of Remote Server | 〈3〉 |
| Packet Size | 〈144 |
| Gateway Location | 〈50 × 25 |
| Traffic Type | 〈 |
| Interval Time | 0.5 |
| Mobility Speed | 〈≈2 |
| Initialization of a Node Energy | 〈≈3600 |
| Transmission Power | 〈28 |
| Voltage supplied | 〈3 |
Fig. 3Transmission Delay (sec)
Fig. 4Throughput Rate (bps)
Fig. 5Packet Delivery Ratio 〈%〉