Literature DB >> 36164325

Lightweight Two-Factor-Based User Authentication Protocol for IoT-Enabled Healthcare Ecosystem in Quantum Computing.

Alawi A Al-Saggaf1, Tarek Sheltami2, Hoda Alkhzaimi3, Gamil Ahmed2.   

Abstract

The healthcare ecosystem is migrating from legacy systems to the Internet of Things (IoT), resulting in a digital environment. This transformation has increased importance on demanding both secure and usable user authentication methods. Recently, a post-quantum fuzzy commitment scheme (PQFC) has been constructed as a reliable and efficient method of biometric template protection. This paper presents a new two-factor-based user authentication protocol for the IoT-enabled healthcare ecosystem in post-quantum computing environments using the PQFC scheme. The proposed protocol is proved to be secure using random oracle model. Furthermore, the functionality and security of the proposed protocol are analyzed, showing that memoryless-effortless, user anonymity, mutual authentication, and resistance to biometric templates tampering and stolen attacks, stolen smart card attack, privileged interior attack are fulfilled. The costs of storage requirement, computation, communication and storage are estimated. The results demonstrate that the proposed protocol is more efficient than Mukherjee et al., Chaudhary et al., and Gupta et al. protocols. © King Fahd University of Petroleum & Minerals 2022, Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Entities:  

Keywords:  Biometric; Internet of Things; IoT-enabled healthcare; Lightweight authentication protocols; Post-quantum cryptography; User authentication

Year:  2022        PMID: 36164325      PMCID: PMC9493171          DOI: 10.1007/s13369-022-07235-0

Source DB:  PubMed          Journal:  Arab J Sci Eng        ISSN: 2191-4281            Impact factor:   2.807


Introduction

The healthcare ecosystem is undergoing modernization is known as a digital transformation. The Internet of Things (IoT) offers many benefits for the healthcare sector. The IoT-enabled healthcare makes healthcare practical for an aging population, chronic diseases, automate patient care, health records assortment and analysis. The IoT-enabled healthcare provided a better environment for both physician and patient during the outbreak of COVID-19. The IoT-enabled healthcare ecosystem refers to the interconnection of smart devices and applications via the Internet. The IoT-enabled healthcare ecosystem enables the collection, monitoring, and analyzing patients’ condition measurements, remotely [1, 2]. Figure 1 illustrates a typical IoT-enabled healthcare ecosystem, where a remote user (for instance, physicians and patient family) collect and monitor the patient’s biomedical conditions for further processing. The wearable or implantable IoT medical devices are deployed in the patient's body, which is measures and collects the patient biomedical conditions. These biomedical conditions transfer to a smartphone connected to the IoT medical devices via an app. Then, the smartphone sends the biomedical conditions to the healthcare server for further analysis and decision.
Fig. 1

A typical IoT-enabled healthcare ecosystem architecture

A typical IoT-enabled healthcare ecosystem architecture Unlike the social and fiscal identities, the heath records such as genetic, conditions, or biometrics data cannot be revoked once it is compromised. The most significant threats that IoT-enabled healthcare poses are data security and privacy. Cybercriminals can misuse the patient’s health records to claim in the patient’s name, for instance, create fake IDs to buy drugs and medical equipment or file fraudulent Insurance. The IoT-enabled healthcare security is mainly for secure health records, communication, and user authentication. User authentication is a keystone in IoT-enabled healthcare security, which plays a crucial role in establishing trust between IoT healthcare users and devices and preventing attacks [3]. Nowadays, knowledge-based authentication such as passwords and PINs plays a central role in IoT-based healthcare. With the exponential increase in using online services based on the traditional authentication method such as passwords, passwords become not only frustrating for users but also costly to maintain. According to the 2020 Verizon Data Breach Investigation Report, more than 80% of data breaches due to passwords phishing and authentication systems’ security vulnerabilities [4]. Additionally, users will hold an increasing number of accounts with the average user memorizing 191 passwords, according to the LastPass report 2016. Due to its advantages over traditional authentication methods, biometrics considered is a promising authentication method in the IoT era [5]. However, there are serious concerns about the security and privacy of the stored biometric template [6]. In the last decade, many researchers combined techniques from the areas of cryptography and error-correcting codes to secure the stored biometric template known as biometric template protection schemes [7-10]. However, error-correcting code is essential in the design of the traditional biometric template protection schemes, which degrade the security and performance of these schemes [11-13]. Currently, IoT systems rely on conventional cryptography algorithms based on integer factorization and discrete logarithm, for instance, Rivest–Shamir–Adleman (RSA) and elliptic curve cryptography (ECC). However, conventional cryptographic algorithms are no longer secure by upcoming quantum computing [14]. Furthermore, these conventional cryptographic algorithms are inadequate for IoT devices because of their complex computation requirements [2]. Therefore, post-quantum cryptography primitives are a promising technique for securing communications between IoT users and devices. Due to its predominant features, such as resistance to quantum attacks, performance efficiency, work in classical computing, lattice-based cryptography becomes ahead in the post-quantum techniques [15]. Recently, a post-quantum fuzzy commitment scheme (PQFC) [16] has been ensuring both security and accuracy efficiencies for biometric template protection. To tackle issues with IoT-enabled healthcare ecosystems, we propose a new lightweight two-factor user authentication protocol for the IoT-enabled healthcare ecosystem based on the security of PQFC scheme. The proposed protocol using biometrics and smartcard for authentication. The following are the main findings of the work: A new lightweight two-factor user authentication protocol for the IoT-enabled healthcare ecosystem using a post-quantum fuzzy commitment scheme. Formal theoretical analysis shows that the proposed protocol is secure against upcoming quantum threats using random oracle models. Our protocol is quantum-safe protocol. The biometric template safeguarded the biometric matching performed indirectly Our protocol is a memoryless-based user authentication protocol. Our protocol achieves important security and privacy properties, such as resistance to tampering and stolen of stored biometric template, stolen smart card, and privileged interior attacks. Our protocol provides good functionality features, such as memoryless-effortless, user anonymity, mutual authentication, renewable biometric, and lightweight protocol. The computational, communication, and storage costs of the proposed scheme are evaluated and compared with existing related protocols. The security and performance analysis shows that the proposed protocol is suitable for application in an IoT-enabled healthcare environment in comparison with the other existing competitive protocols. The rest of the paper is organized as follows: Sects. 2 and 3 contain related work and preliminaries, respectively. The biometric-based PQFC authentication system is described in Sect. 4. The presented lightweight two-factor authentication protocol for IoT-enabled healthcare and corresponding formal security analysis is presented in Sects. 5 and 6, respectively. Section 7 discusses the security and functionality analysis of the proposed protocol. The performance evaluation is done in Sect. 8. Section 9 presents the conclusions.

Related Work

Recently, many authentication protocols for secure communication between IoT users and devices in IoT environments have been proposed. Some of them use traditional public-key cryptography like Rivest–Shamir–Adleman (RSA) and elliptic curve cryptography (ECC). [17-19]. However, these protocols are inadequate for IoT devices because of their complex computation operations. Furthermore, these approaches are no longer secure by upcoming quantum computing [14]. There are also less efficient and secure authentication protocols [20-23], which are based on traditional biometric template protection. However, error-correcting code is essential in the design of these traditional biometric template protection schemes, which cause a downgrade of the security and performance of the system. Lattice-based cryptography techniques attracted many researchers to secure applications in IoT environments due to their security and functionality efficiencies [15]. Of late, several authentication protocols for IoT sectors have been proposed in the literature. Nan et al. [24] proposed a lattice-based public-key encryption based on Needham and Schroeder scheme [25] and then used to construct a lightweight authentication protocol for smart city environment. They claimed their protocol is secure against different attacks using informal security analysis. The protocol was implemented in Contiki platform and evaluated using Cooja-based emulation environment and Texas Instruments CC2538 hardware platform. Cao et al. [26] presented an access authentication and data distribution scheme for the 5G narrowband Internet of Things systems. The security of their protocol is based on the lattice-based homomorphic encryption. To demonstrate the security of their protocol, they used BAN logic and Scyther tools. Zhou and Wang proposed an anonymous NTRU-based authentication scheme for mobile users in roaming service in ubiquitous networks [27]. Mukherjee et al. designed a lattice-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks [28]. They showed that their protocol ensures the message integrity, authentication and privacy preservation using ROM model. Chaudhary et al. [29] proposed a lattice-based cryptosystem for smart healthcare in future smart cities. Then, they combined their cryptosystem with bilinear Diffie–Hellman to construct an authentication protocol for healthcare. However, the protocol is not lightweight because of using exponential operations and hence it’s not suitable for IoT applications. Sahu et al. [30] presented a lightweight multi-party authentication and key-establishment protocol in IoT-based e-Healthcare service access net-work using lattice identity-based encryption. They tested the security of their protocol using Scyther tool. Gupta et al. [31] presented a lattice-based authentication and access control protocol for IoT-based healthcare. The security assumption of their based on the hardness of the LWE problem. They measured the protocol’s performance in terms of storage requirement and computational and communication costs and then compared with the existing related protocols. All the aforementioned authentication protocols for IoT environments are relying solely on the password, which is falling apart if the password is not kept secure. However, passwords can be easily shared, stolen, forgotten, or phishing. Therefore, the rapid development of emerging technologies such as IoT, cloud computing, blockchain, quantum computing, and e-services makes the current research on user authentication protocols based on post-quantum cryptography urgent. Recently, a post-quantum fuzzy commitment scheme (PQFC) [16] guaranteeing the security and accuracy efficiencies for biometrics template protection. The author provides a theoretical and experimental analysis of PQFC scheme, showing that the PQFC scheme is a promising technique to provide secure and usable method for users in IoT-Enabled healthcare ecosystems.

Preliminaries

This section provides a mathematical preliminary which are essential for describing and analysis the proposed protocol.

Statistical Distance

Let and be two probability distributions over a common measurable sample space . Suppose further, the non-negative function is negligible if, for all polynomials we have that for sufficiently large . The statistical distance between and is given by:

Collision Resistance Hash Function

A function is called a collision resistant hash function [32] if the following properties hold: (1) compression: maps an input of arbitrary finite bit length to an output of fixed bit length . (2) easy to compute: Given and an input as , is easy to compute, (3) pre-image resistance: For all specified output , it is computationally infeasible to find any input such that , (4) collision resistant: it is computationally infeasible to find any two distinct inputs , and have the same hash valued, i.e., .

Lattice

Definition 1

A basis is defined as a set of linearly independent vectors of Euclidian vector space that spans the full space.

Definition 2

A lattice is a discrete additive subgroup of whose elements generated by the integer linear combinations of the basis .

lattice Computational Complexities

We now give definitions of well-known lattice computational problems used to construct lattice-based cryptography primitives. LP1: Shortest Vector Problem (SVP): the shortest vector problem has three variants [33]: P1) Find the length of the shortest nonzero vector in the lattice . P2) Find the shortest nonzero vector such that . P3) Find the basis in in which is the smallest possible up to a polynomial factor. LP2: Approximation Shortest Vector Problem () Given a basis of the lattice of n- dimensional lattice , find a nonzero vector such that , for approximation factor taken as a polynomial of n [34]. LP3: Closet Vector Problem (CVP) [35]: Given a basis of the lattice of n- dimensional lattice and a vector u (not necessarily in the lattice), find a nonzero vector that close to u. LP4: Short Integer Solution (SIS) [36]: Given a matrix whose columns are uniformly random vector in , find a nonzero vector . LP5: Decisional Approximate SVP : Given a basis of an n- dimensional lattice and a number . In YES instance or No instance . LP6: Shortest Independent Vectors Problem [36]: Given a basis of an n- dimensional lattice . The goal is to output a set of linearly independent lattice vectors of length at most . LP7: Learn with Error (LWE) problem: We briefly describe the Learn with Error (LWE) that used to construct an efficient lattice-based cryptography. Regev [36] introduced a reduction from worst-case lattice problems such as GAPSVP and SIVP to a learning with error problems. The author proved that the solution to the LWE problem implies that there is a quantum algorithm to GAPSVP and SIVP. LWE distribution: For some integer , let m, n = poly(k), and q (prime) are positive integers and let be a distribution on . The LWE distribution is sampled using the vector called secret and the matrix whose columns are vectors uniformly chosen random, , for i = 1,2,…,k, choosing e and the output is: for all i = 1,2,…,n.

The Biometric-Based PQFC Authentication System

In this section, we briefly describe the biometric-based PQFC authentication system [16], which is relies on the worst-case hardness shortest vector problem (SVP) of lattice cryptography. Let us now describe the construction of the biometric-based PQFC authentication system which consists of two main stages: enrollment and verification. The process of the system is described below:

Setup Stage

Positive integers m, n, and p (prime number) are chosen randomly. Then, generate the matrix whose columns are vectors in the lattice .

Enrollment Stage

First, the user chooses a vector randomly and generates a biometric reference template using a specific software. The vector and the template are input to the PQFC function to generate the biometric reference commitment :where applies matrix multiplication modulo and applies vector addition modulo q and the result goes through modulo 2.

Verification stage

The user generates his/her biometric query template and then computes the biometric query commitment as follows: The biometric query commitment is matched against the stored using, e.g., Hamming distance. If the matching score is within the system threshold, then the user is authenticated.

Lightweight Two-Factor User Authentication protocol for the IoT-Enabled Healthcare

The proposed protocol comprises four phases, namely the registration phase, the login phase, the authentication phase, and the biometric renewable phase. The protocol consists of three entities, namely (1) a user , which is for instance physician, nurse, pharmacologist, or patient’s family member, (2) a medical server MS, and (3) a patient . The must register and authenticate herself/himself with the medical server MS to access the patient’s medical data. It is worth noting that the patient’s medical data are collected and measured using smart devices implanted with the body of the patient. Then, these medical data transfer to the medical server MS. Details of the steps of these phases are described below.

Setup Phase

The main purpose of this phase is to generate the public parameter .; that is, MS takes a unary as input and executes the following steps: S1: MS chooses a prime number and two positive integers and . S2: MS generates randomly a matrix , which consists of linearly independent vector of the lattice And then chooses a cryptographic hash function . S3: MS chooses randomly a master key vector and computes public key . S4: MS publishes the public parameters of the system and keeping as a secret.

Registration Phase

When the user needs to register with the medical server MS, she/he performs the following steps: R1: selects her/his unique identity . R2: uses specific software to generate cryptographic key and generates a random number N, then computes . R3: presents her/his personal biometric data on biometric reader and the biometric reference template extracted such that . Then, chooses randomly and computes the following: R4: sends the registration message to the medical server MS. R5: MS computes and loads on smart card, then sends the smart card to the user . R6: Upon receiving the smart card, the user stores the random number N and in her/his smart card.

Login Phase

Whenever the user wants to access the health profile of the patient , she/he must log in to the medical serer MS by performing the following steps: L1: inserts her/his smart card into the card reader and keys her/his identity . L2: The smart card sends the login message request to the medical server MS. L3: Upon receiving the login request, the medical server MS computes and sends to the user via a public channel. L4: Upon receiving , the user presents her/his biometric data on biometric reader and a biometric query template extracted. The smart card calculates and verifies . L5: If the above biometrics verification fails, the session will be terminated; otherwise, the smart card extracts and computes , and then the smart card verifies . L6: If the above key verification fails, the session will be terminated; otherwise, the smart card continued computing the following: , , , , , and . L7: The smart card sends the message to the medical server for authentication.

Authentication Phase

When MS received the message , the medical server MS and the user perform the following steps to authenticate each other. A1: MS computes and . A2: MS checks the format of . If is valid, MS computes and verifies , if it does not hold, MS rejects the login request and terminates the session. Otherwise, MS accepts the user log in and stores in the database system to resist the reply and man-in-the-middle attacks. A3: MS computes , , , then MS sends to the user . A4: computes and verifies . If it does not hold, terminates the session. Otherwise, the medical server MS is authenticated by the user . Finally, the user and the medical server computes respectively, which is taken as the session key .

Biometric Revocation Phase

To re-register her/his same biometric , performs a biometric revocation phase as follows: V1: inserts her/his smart card, keys identity , and presents her/his biometrics in the biometric reader, which generates a biometric template that will be used for a biometric verification approach as described in steps L2–L5 in the login phase. the cryptographic key is retrieved, and the user will generate a new cryptographic key . V2: If this verification fails, the session will be terminated. Otherwise, the smart card computes , , , , ,, , and . V3: Finally, , , , , and are stored in smart card.

Security Analysis

In this section, a formal security analysis of the proposed protocol is given using the random oracle model (ROM). Theorem 1 shows that the adversary can breaches the proposed protocol by learn the biometric reference template and the cryptographic key from only with negligible probability. Theorem 2 proves that the adversary is able to breach the proposal protocol if he/she is able to invert the one-way hash function. To this end, we simulate two random oracle model.

Quantum Random Oracle Model

This model specifies as a game that a probabilistic polynomial-time algorithm (possibly quantum) adversary plays with a challenger. The game works as follows: The challenger takes unary and generates vectors and , and sends it to the adversary as input. The adversary takes and as input to the function and is allowed to make queries to the challenger. The adversary outputs a value , which is sent to the challenger. The challenger then looks at , , and the queries made by the adversary . Finally, the challenger outputs 1 or 0.

Classical Random Oracle Model

This model specifies as a game that a probabilistic polynomial-time algorithm adversary plays with a challenger. The game works as follows: The challenger takes unary and generates a value and sends it to the adversary as its input. The adversary takes as input to the hash function and is allowed to make queries to the challenger. The adversary then outputs a value , which it sends to the challenger. The challenger then looks at and and the queries made by the adversary . Finally, the challenger outputs 1 or 0.

Theorem 1

Assume that and are two distributions of outputs of a probabilistic polynomial-time algorithm adversary . The first distribution for the oracle of chosen matrix and the second distribution is taken over the true oracles with quantum oracle queries. Then, the distributions and are statistically close (at most ).

Proof of Theorem 1

Let be a random oracle, and are two random oracle distributions taken over sample space , which are the output of possible quantum adversary . For and being positive integers , which are polynomial of the security parameter , let be a prime number. For and chosen randomly, we define the statistical distance between the two distributions as follows:where and . Fix such that for some , and then the following probability can be computed as follows:where is the set of all preimages of the function . We defined the size of as the number of quantum queries . Now, we are computing the probability of the distribution: Then, we are ready to estimate the probability between the two distributions. □

Theorem 2

Suppose that for , , and are generated randomly. If a probabilistic polynomial-time algorithm (classical) adversary breaches the security of the proposed protocol, then the adversary is able to invert the one-way hash function on a random input in polynomial time with a non-negligible probability

Proof of Theorem 2

Assume that runs a random oracle algorithm to retrieve user cryptographic key from the one-way hash function with a number of queries . We define the adversary advantages as the probability . This advantage is determined by the number of queries for the classical random oracle model. Then, the advantage probability is computed as follows:

Security and Functionality Features

In this section, we discuss the security and functionality features of our proposed protocol and compare with the related lattice-based authentication protocols [28, 29, 31] as shown in Table 1.
Table 1

Comparisons of security and functionality features of the proposed protocol with the related protocols

ProtocolSecurity and functionality features
F1F2F3F4F5F6F7F8F9F10
[29]
[28]
[31]
Our protocol

■: Satisfied, □: Not satisfied, ▬: Not elaborated

F1: Quantum attack resistant: The IoT is encountering security and privacy threats. However, with quantum computing, these security and privacy threats will increase more and more. The security of the proposed protocol is based on PQFC scheme, which is provable secure against quantum attacks. F2: Tampering with stored biometric templates attack: This property applies when an attacker gets access to the system database or the token, temporarily or permanently cannot modify the template in the system database/token to gain server authentication. In the proposed protocol, the attacker needs to break the SVP problem to obtain the biometric reference template. F3: Biometric template thefts resistant: This property applies to an attacker that gets access to the database system or token and obtain the user’s biometric template; she/he can use it for other purposes. In our protocol, the user’s biometric template is protected using PQFC scheme. Hence, there is no clear stored template to be stolen. F4: Privileged insider attack resistant: Insider attacker with privileged access to the database server can pose a serious threat to the server database. One of the breaches can lead to stealing/tampering with the stored biometric templates in the database. The proposed protocol offers an opportunity for the user to hide her/his biometric template from privileged insiders in the registration phase by allowing her/him to send it to authentication server in encrypted format, which will prevent an inside attacker from getting it. F5: Smart card/token attack resistant: Assume that the user’s smart card is lost or stolen. An attacker having the smart card has no way to obtain secret information stored in the smartcard. If the attacker retrieves the information , the attacker has to find by solving lattice SVP problem to gain information, which is contradiction to shortest vector problem (SVP). F6: Man-in-the-Middle attack resistant: In the man-in-the-middle attack, the attacker sits in the middle and negotiates the cryptographic parameters with the user and server to gain access as a legitimate. In the registration phase of the proposed protocol, the user sends request to the authentication server. The server replies by sending the message including the matrix ; assume the man-in-the-middle attacker intercepts the server message and replaces the matrix by ; the user will compute and send to the server. Then, the man-in-the-middle attacker cannot learn the biometric template from , only if she/he solves the LWE lattice problem. F7: Renewable biometric template: Unlike passwords, biometrics are limited and once it compromised cannot be revoked. A biometric is the principle means of authentication in our protocol. If the biometric template is compromised by any attacks, it can be used again with new registration parameters. F8: Memoryless-effortless: An authentication protocol that does not require any users to remember any secret per service called memoryless-effortless. By this definition, the proposed authentication protocol is memoryless-effortless F9: User anonymity: An important security property of authentication protocol for IoT applications is the confidentiality of the user’s identity. It is desirable to keep user’s identity hiding from attackers. In the proposed protocol, the plaintext user's identity is neither stored in the user's smart card nor sent in the login and authentication messages over secure or insecure channels. If the attacker is able to retrieve the values and from the user's smart card, it is obvious that an attacker is determining which is equivalent to find the collision in the hash function . F10: Lightweight: A protocol with less computational and communication complexities is called a lightweight protocol. Comparisons of security and functionality features of the proposed protocol with the related protocols ■: Satisfied, □: Not satisfied, ▬: Not elaborated

Performance Analysis

In this section, we evaluate the performance of our protocol based on the following metrics: the storage requirements, communication costs, and computational complexities. Furthermore, we have compared the proposed protocol with the recent related protocols for IoT systems [28, 31]. Table 2 shows the computational costs comparison between the proposed protocol and the protocols in [28, 31]. Let , , , and denote the operation time required to execute the matrix multiplication modulo , vector multiplication modulo , vector addition modulo , and one-way hash function, respectively. The total computational time cost of our protocol is . Furthermore, we have estimated the execution time of the above mentioned operations as , , , and . The tasks are executed using MATLAB 2020b on PC workstation with Intel(R) Core(TM) i7-10,700 CPU @ 2.90 GHz 2.90 GHz RAM 16.0 GB. Thus, the total execution time for the proposed protocol is 20.0437 ms.
Table 2

Comparisons of computational costs of our protocol with the related protocols

Protocol[28][31]Our protocol
Initialization phase\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_{{{\text{Mp}}}}$$\end{document}TMp\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_{{{\text{Mp}}}}$$\end{document}TMp\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_{{{\text{Mp}}}}$$\end{document}TMp
Registration phase\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$4T_{h}$$\end{document}4Th\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2T_{{{\text{Mp}}}} + T_{{{\text{add}}}} + 5T_{h}$$\end{document}2TMp+Tadd+5Th
Login phase\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2T_{{{\text{Mp}}}} + 2T_{{{\text{Vp}}}} + 2T_{{{\text{add}}}} + 3T_{h}$$\end{document}2TMp+2TVp+2Tadd+3Th\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_{{{\text{Mp}}}} + T_{{{\text{Vp}}}} + 5T_{h}$$\end{document}TMp+TVp+5Th\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_{{{\text{Mp}}}} + T_{{{\text{add}}}} + 5T_{h}$$\end{document}TMp+Tadd+5Th
Authentication phase\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$1T_{{{\text{Mp}}}} + 2T_{{{\text{Vp}}}} + 2T_{{{\text{add}}}} + T_{h}$$\end{document}1TMp+2TVp+2Tadd+Th\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T_{{{\text{Vp}}}} + 16T_{h}$$\end{document}TVp+16Th\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$9T_{h}$$\end{document}9Th
Total cost\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$4{\varvec{T}}_{{{\mathbf{Mp}}}} + 4{\varvec{T}}_{{{\mathbf{Vp}}}} + 4{\varvec{T}}_{{{\mathbf{add}}}} + 4{\varvec{T}}_{{\varvec{h}}}$$\end{document}4TMp+4TVp+4Tadd+4Th\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2{\varvec{T}}_{{{\mathbf{Mp}}}} + 2{\varvec{T}}_{{{\mathbf{Vp}}}} + 25{\varvec{T}}_{{\varvec{h}}}$$\end{document}2TMp+2TVp+25Th\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$4{\varvec{T}}_{{{\mathbf{Mp}}}} + 2{\varvec{T}}_{{{\mathbf{add}}}} + 19{\varvec{T}}_{{\varvec{h}}}$$\end{document}4TMp+2Tadd+19Th
Total time cost (ms)28.009210.057520.0437
Comparisons of computational costs of our protocol with the related protocols For computational complexity comparison, we followed the parameters reported in [31] as follows: assume that , and . The computational complexity for the operations: matrix multiplication modulo , vector multiplication modulo , and vector addition modulo is , , and , respectively. Thus, the total computational complexity of the proposed protocol is . Table 3 shows the comparison result of our protocol with the related protocols.
Table 3

Comparisons of computational complexities of our protocol with the related protocols

ProtocolPrimitiveComplexity overheadComputational Cost
[28]\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$PUB, sk, R,S, ANS$$\end{document}PUB,sk,R,S,ANS\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O\left( {mn \left| {p^{2} } \right|} \right)$$\end{document}Omnp2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$16 k \log^{2} \left( k \right)\left( {4k \log^{2} \left( k \right) + 2\log \left( k \right) + 1} \right)$$\end{document}16klog2k4klog2k+2logk+1
[31]\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$PU, t_{i} , v_{i} , v_{i}^{^{\prime}}$$\end{document}PU,ti,vi,vi\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O\left( {mn \left| {p^{2} } \right|} \right)$$\end{document}Omnp2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$16k \log^{3} \left( k \right)\left( {2k \log \left( k \right) + 1} \right)$$\end{document}16klog3k2klogk+1
Our protocol\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$pk, F_{r} , w_{i} , Z_{i} , w_{i}^{^{\prime}}$$\end{document}pk,Fr,wi,Zi,wi\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O\left( {mn \left| {p^{2} } \right|} \right)$$\end{document}Omnp2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$8k \log^{2} \left( k \right)\left( {8k \log^{2} \left( k \right) + 1} \right)$$\end{document}8klog2k8klog2k+1
Comparisons of computational complexities of our protocol with the related protocols Furthermore, the storage requirement and the communication cost comparisons between the proposed protocol and the related protocols [28, 31] are evaluated and shown in Table 4. In the evaluation, we consider the login and authentication phases in the comparison. Note that the registration phase is not performed frequently. In all protocols, we assume the length of the identity, output size of the hash function, and number in are . Thus, the total communication cost of our protocol sending messages , , and is . The storage requirements of our protocol and the related protocols [28, 31] are computed. The total storage cost for storing master key , matrix , public key , and seven hash value is .
Table 4

Comparisons of storage and communication costs of our protocol with the related protocols

ProtocolData storage/exchangeData length
[28]Communication\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\left\{ {M_{i} , ANS_{i} , R_{i} , S_{i} } \right\}$$\end{document}Mi,ANSi,Ri,Si\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2\log k\left( {6k\log \left( k \right) + 1} \right)$$\end{document}2logk6klogk+1
Storage\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$d \in Z_{p}^{1 \times n}$$\end{document}dZp1×n, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$A \in Z_{p}^{m \times n}$$\end{document}AZpm×n, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$PUB \in Z_{p}^{1 \times m}$$\end{document}PUBZp1×m, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$sk_{i} \in Z_{p}^{1 \times n}$$\end{document}skiZp1×n, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$4h\left( . \right)$$\end{document}4h.\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2\log k\left( {4k^{2} \log^{2} k + 6k\log k + 4} \right)$$\end{document}2logk4k2log2k+6klogk+4
[31]Communication\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\left\{ {t_{i} ,\varphi_{i} } \right\}$$\end{document}ti,φi, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\left\{ {\pi_{i} ,ID_{i} } \right\}$$\end{document}πi,IDi, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\left\{ {R_{i} } \right\}$$\end{document}Ri \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\left\{ {ID_{i} ,b_{i} } \right\}$$\end{document}IDi,bi,\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\left\{ {C_{ij} } \right\}$$\end{document}Cij\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2\log k\left( {2k\log \left( k \right) + 7} \right)$$\end{document}2logk2klogk+7
Storage\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$d \in Z_{p}^{1 \times n}$$\end{document}dZp1×n, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$X \in Z_{p}^{m \times n}$$\end{document}XZpm×n, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$PU \in Z_{p}^{1 \times m}$$\end{document}PUZp1×m,\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$6h\left( . \right)$$\end{document}6h.\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2\log k\left( {4k^{2} \log^{2} k + 4k\log k + 6} \right)$$\end{document}2logk4k2log2k+4klogk+6
Our protocolCommunication\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\left\{ {ID_{i} ,Z_{i} ,\beta_{i} ,r_{i} } \right\}$$\end{document}IDi,Zi,βi,ri, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\left\{ {w^{\prime}_{i} } \right\}$$\end{document}wi, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\left\{ {\theta_{1} ,\theta_{2} ,\theta_{4} ,\theta_{5} ,\theta_{6} } \right\}$$\end{document}θ1,θ2,θ4,θ5,θ6\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2\log k\left( {2k\log \left( k \right) + 11} \right)$$\end{document}2logk2klogk+11
Storage\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$mk \in Z_{p}^{1 \times n}$$\end{document}mkZp1×n, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$A \in Z_{p}^{m \times n}$$\end{document}AZpm×n, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$pk \in Z_{p}^{1 \times m}$$\end{document}pkZp1×m, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$7h\left( . \right)$$\end{document}7h.\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2\log k\left( {4k^{2} \log^{2} k + 4k\log k + 7} \right)$$\end{document}2logk4k2log2k+4klogk+7
Comparisons of storage and communication costs of our protocol with the related protocols

Conclusion

This paper proposed a new lightweight two-factor-based user authentication protocol for the IoT-enabled healthcare ecosystem. We evaluated the security of the proposed protocol through the formal security analysis using random oracle model (ROM), showing that our protocol is secure against today and upcoming quantum attacks. The proposed protocol achieved the following functionality and security properties: memoryless-effortless, user anonymity, mutual authentication, and resistance to tampering and stolen of biometric template, stolen smart card, privileged interior attacks. The proposed protocol was evaluated in terms of the performance metrics: storage requirement, computation and communication. The results demonstrated that our protocol is more efficient than Mukherjee et al., Chaudhary et al., and Gupta et al. protocols. The overhead of the computational costs of our protocol becomes larger naturally since the proposed protocol exploits these computations to provide several significant security and functionality properties. The overall performance demonstrates that the proposed protocol is suitable for the Internet of Things applications.
  2 in total

1.  An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system.

Authors:  Preeti Soni; Arup Kumar Pal; Sk Hafizul Islam
Journal:  Comput Methods Programs Biomed       Date:  2019-08-28       Impact factor: 5.428

2.  A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography.

Authors:  Guosheng Xu; Shuming Qiu; Haseeb Ahmad; Guoai Xu; Yanhui Guo; Miao Zhang; Hong Xu
Journal:  Sensors (Basel)       Date:  2018-07-23       Impact factor: 3.576

  2 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.