| Literature DB >> 35891080 |
Chien-Ming Chen1, Zhaoting Chen1, Saru Kumari2, Meng-Chang Lin3.
Abstract
The Internet of Health Things (IoHT), which is an extension of the Internet of Things (IoT) in healthcare, has provided a new type of telemedicine approach. In IoHT, wearable sensors are used to collect patient health data, and information is transmitted remotely to doctors who can develop accurate treatment plans and provide timely telemedicine services to patients. However, patient health data are transmitted over a public channel, which means that the privacy and medical data of patients are at significant risk of leakage and can be confronted by serious security problems. We proposed a lightweight authentication protocol known as LAP-IoHT for IoHT environments to overcome the various threats that are currently faced by IoHT. We verified the security of LAP-IoHT using a Real-or-Random model and demonstrated its significant performance advantage by conducting a comparative analysis with other similar protocols for a better adaptation to the IoHT environment.Entities:
Keywords: Internet of Health Things; authentication; network security
Mesh:
Year: 2022 PMID: 35891080 PMCID: PMC9320153 DOI: 10.3390/s22145401
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
A summary of the application of the Internet of Things in the medical industry.
| Protocols | Advantages | Limitations |
|---|---|---|
| Amin et al. [ | (1) Resist impersonation attack | (1) Cannot resist privileged insider attack |
| Challa et al. [ | (1) Provide user anonymity | (1) Cannot resist sensor node capture attack |
| Preeti et al. [ | (1) Provide mutual authentication | (1) Cannot provide perfect forward security |
| Aghili et al. [ | (1) Provide user untraceability | (1) Cannot provide perfect forward security |
| Amintoosi et al. [ | (1) Resist known-session-specific | – |
| Gupta et al. [ | (1) Provide perfect forward security | (1) Cannot resist privileged insider attack |
| Hajian et al. [ | (1) Resist replay attack | (1) Cannot provide perfect forward security |
| Kumar et al. [ | (1) Resist privileged insider attack | – |
| Yu et al. [ | (1) Provide user untraceability and anonymity | – |
Figure 1System model.
Notation definitions.
| Notations | Descriptions |
|---|---|
|
| |
|
| Identity of |
|
| Password of |
|
| Biometrics of |
|
| |
|
| Identity of |
|
| Gateway node |
|
| Private key of GWN |
|
| Public key of |
|
| Private key of |
|
| Session key |
|
| Time stamp, where |
|
| Temporary random number |
| ⊕ | XOR operation |
| ‖ | Concatenate operation |
| Hash function | |
| Fuzzy extractor/reproduction function | |
|
| Asymmetric encryption/decryption |
| → | The public channel |
| ⇒ | The secure channel |
|
| Adversary |
Figure 2User registration phase.
Figure 3Sensor registration phase.
Figure 4Login and authentication phase.
Comparisons of security.
| Protocols | A1 | A2 | A3 | A4 | A5 | A6 | A7 | A8 | A9 | A10 |
|---|---|---|---|---|---|---|---|---|---|---|
| Ours |
|
|
|
|
|
|
|
|
|
|
| Kumar et al. [ |
|
|
|
|
|
|
|
|
|
|
| Yu et al. [ |
|
|
|
|
|
|
|
|
|
|
| Amin et al. [ |
|
|
|
|
|
|
|
|
|
|
| Challa et al. [ |
|
|
|
|
|
|
|
|
|
|
| Preeti et al. [ |
|
|
|
|
|
|
|
|
|
|
| Aghili et al. [ |
|
|
|
|
|
|
|
|
|
|
Parameters of the devices.
| Devices | Model | Operating System | Memory | Processor |
|---|---|---|---|---|
| mobile phone | MI 8 | Android | 6 GB | Qualcomm Snapdragon 845 |
| laptop computer | DELL G15 5510 | Windows 10 | 16 GB | Intel(R) Core(TM)i7-10870H |
| desktop computer | LENOVO 90M2A0A6CD | Windows 10 | 8 GB | Intel(R) Core(TM)i5-9500 |
Execution time of operations.
| Operations | MI 8 | DELL G15 5510 | LENOVO 90M2A0A6CD |
|---|---|---|---|
|
| 20.7028 ms | 2.2823 ms | 1.6197 ms |
|
| 47.6405 ms | 5.2520 ms | 3.7272 ms |
|
| 0.00044 ms | 16 ms | 13 ms |
|
| 0.2009 ms | 0.1551 ms | 0.0879 ms |
|
| 0.02812 ms | 0.0031 ms | 0.0022 ms |
|
| 69 ms | 270 ms | 139 ms |
Comparison of time.
| Protocols |
|
|
| Total Computation |
|---|---|---|---|---|
| (ms) | ||||
| Ours |
|
|
| 24.77 |
| Kumar et al. [ |
|
|
| 370.19074 |
| Yu et al. [ |
|
|
| 20.99918 |
| Amin et al. [ |
|
|
| 71.7578 |
| Challa et al. [ |
|
|
| 36.9824 |
| Preeti et al. [ |
|
|
| 69.171 |
| Aghili et al. [ |
|
|
| 21.09864 |
Comparison of cost.
| Protocols |
|
|
| Total Communication Cost (bits) | Number of Messages |
|---|---|---|---|---|---|
| Ours | 480 | 1504 | 512 | 2496 | 4 |
| Kumar et al. [ | 1824 | 3424 | 1472 | 6720 | 4 |
| Yu et al. [ | 672 | 1216 | 672 | 2560 | 5 |
| Amin et al. [ | 960 | 1280 | 800 | 3040 | 4 |
| Challa et al. [ | 832 | 224 | 352 | 1408 | 3 |
| Preeti et al. [ | 832 | 1088 | 352 | 2272 | 4 |
| Aghili et al. [ | 800 | 864 | 4352 | 2016 | 4 |
Figure 5Running times.
Figure 6Communication costs.