Abstract
The development of 5G communication and cloud computing and big data technology has promoted the rapid rise of the Internet of medical things (IoMT). IoMT is gradually entering all aspects of people’s lives and providing more intelligent services for people. Similarly, this brings many opportunities to the field of health care. However, in open and complex scenarios, IoMT, is still in its infancy. Before popularization and application, it must stand the test of clinical verification, data security, and privacy protection. In order to meet the challenges of data security and privacy protection faced by IoMT and ensure secure communication in open and complex scenarios, based on the principle of challenge authentication handshake protocol, we propose a new security authentication scheme suitable for IoMT. The scheme meets the security authentication, negotiates the session key for the communication between the intelligent sensor and the medical server embedded in the environment, ensures the session security, and supports dynamic management. Security and performance analysis show that the protocol is safe and efficient.
Supported by organization x.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shen, J., Zhou, T., Cao, Z.: Protection methods for cloud data security. J. Comput. Res. Dev. 58(10), 2079–2098 (2021)
Shen, J., Zhou, T., He, D., Zhang, Y., Sun, X., Xiang, Y.: Block design-based key agreement for group data sharing in cloud computing. IEEE Trans. Dependable Secure Comput. 16(6), 996–1010 (2017)
Amin, R., Biswas, G.: Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment. Wirel. Pers. Commun. 84(1), 439–462 (2015). https://doi.org/10.1007/s11277-015-2616-7
Chandrakar, P., Om, H.: Cryptanalysis and improvement of a biometric based remote user authentication protocol usable in a multiserver environment. Trans. Emerg. Telecommun. Technol. 28(12), e3200 (2017)
He, D., Wang, D.: Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst. J. 9(3), 816–823 (2014)
Wang, C., Zhang, X., Zheng, Z.: Cryptanalysis and improvement of a biometric-based multi-server authentication and key agreement scheme. Plos One, 11(2) (2016)
Yang, Li., Zheng, Z.: Cryptanalysis and improvement of a biometrics-based authentication and key agreement scheme for multi-server environments. Plos One, 13(3) (2018)
Li, C., Lee, C., Weng, C., Chen, S.: A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems. J. Med. Syst. 40(11), 1–10 (2016). https://doi.org/10.1007/s10916-016-0586-2
Madhusudhan, R., Nayak, C.S.: A robust authentication scheme for telecare medical information systems. Multimedia Tools Appl. 78(11), 15255–15273 (2018). https://doi.org/10.1007/s11042-018-6884-6
Qiu, S., Xu, G., Ahmad, H., Wang, L.: A robust mutual authentication scheme based on elliptic curve cryptography for telecare medical information systems. IEEE Access 6, 7452–7463 (2017)
Kumari, S., Renuka, K.: Design of a password authentication and key agreement scheme to access e-healthcare services. Wireless Pers. Commun. 117(1), 27–45 (2021). https://doi.org/10.1007/s11277-019-06755-7
Fan, K., Jiang, W., Li, H., Yang, Y.: Lightweight RFID protocol for medical privacy protection in IoT. IEEE Trans. Industr. Inf. 14(4), 1656–1665 (2018)
Chen, X., Geng, D., Zhai, J., Liu, W., Zhang, H., Zhu, T.: Security analysis and enhancement of the most recent RFID protocol for telecare medicine information system. Wireless Pers. Commun. 114(2), 1371–1387 (2020). https://doi.org/10.1007/s11277-020-07424-w
Ravanbakhsh, N., Nazari, M.: An efficient improvement remote user mutual authentication and session key agreement scheme for e-health care systems. Multimedia Tools Appl. 77(1), 55–88 (2018). https://doi.org/10.1007/s11042-016-4208-2
Ostad-Sharif, A., Abbasinezhad-Mood, D., Nikooghadam, M.: An enhanced anonymous and unlinkable user authentication and key agreement protocol for tmis by utilization of ECC. Int. J. Commun. Syst. 32(5) (2019)
Sahoo, S.S., Mohanty, S., Majhi, B.: A secure three factor based authentication scheme for health care systems using IoT enabled devices. J. Ambient. Intell. Humaniz. Comput. 12(1), 1419–1434 (2020). https://doi.org/10.1007/s12652-020-02213-6
Jia, X., He, D., Kumar, N., Choo, K.-K.R.: Authenticated key agreement scheme for fog-driven IoT healthcare system. Wireless Netw. 25(8), 4737–4750 (2018). https://doi.org/10.1007/s11276-018-1759-3
Wang, C., Huang, R., Shen, J., et al.: A novel lightweight authentication protocol for emergency vehicle avoidance in VANETs. IEEE Internet Things J. 8(18), 14248–14257 (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhou, Y., Tan, H., Iroshan, K.C.A.A. (2022). A Secure and Privacy-Preserving Authentication Scheme in IoMT. In: Chen, X., Huang, X., Kutyłowski, M. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2022. Communications in Computer and Information Science, vol 1663. Springer, Singapore. https://doi.org/10.1007/978-981-19-7242-3_11
Download citation
DOI: https://doi.org/10.1007/978-981-19-7242-3_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-7241-6
Online ISBN: 978-981-19-7242-3
eBook Packages: Computer ScienceComputer Science (R0)