Abstract
The Internet of Things is gaining popularity throughout the world. With the growth of digital communication, healthcare 4.0 are being implemented by many businesses industry in order to establish a more resilient, competent, and intelligent smart healthcare system. Healthcare monitoring services are the part of smart healthcare system. These types of monitoring systems are mainly based on the Internet of Things (IoT). IoT helps to integrate multiple sensors and objects that can directly communicate with each other without human intervention. This type of IoT based systems are vulnerable to different adversarial threats such as cloning attack, impersonation attack etc. Hence medical IoT device authentication is essential in smart healthcare to verify user legitimacy. One way to verify user legitimacy is using physical unclonable function (PUF). The PUF protects sensor nodes from tampering, cloning attack. In this paper, we have proposed a lightweight PUF based authentication mechanism for embedded IoT devices in e-healthcare system. The proposed authentication technique helps to authenticate IoT sensor nodes which are responsible for transmitting sensitive health data in a health monitoring system. The performance comparison shows that the protocol is efficient with high through put and low computational load. The security analysis of the authentication scheme shows it would resist different types of network attacks. The proposed authentication provides a facility that no one except that the primary users can have access to the raw challenge response pair of integrated PUF circuits so that adversary will unable to build another same PUF model. Also the success probability is \(2^{-76}\) for recovering the transformed 128 bit challenge and responses.
Similar content being viewed by others
Data availability
NA.
References
Xue K, Ma X, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316– 323, 2013. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1084804512001403
Nikooghadam M, Amintoosi H (2020) An improved secure authentication and key agreement scheme for healthcare applications in, (2020) 25th International Computer Conference, Computer Society of Iran (CSICC). IEEE 2020:1–7
Binu P, Thomas K, Varghese NP (2017) Highly secure and efficient architectural model for iot based health care systems in 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE 2017 pp. 487–493
Abdussami M, Amin R, Vollala S (2023) Provably secured lightweight authenticated key agreement protocol for modern health industry Ad Hoc Networks p. 103094
Lin H, Garg S, Hu J, Wang X, Piran MJ, Hossain MS (2020) Privacy-enhanced data fusion for covid-19 applications in intelligent internet of medical things. IEEE Internet of Things Journal 8(21):15683–15693
Hossain MS (2015) Cloud-supported cyber-physical localization framework for patients monitoring. IEEE Systems Journal 11(1):118–127
Gaba GS, Kumar G, Monga H, Kim TH, Kumar P (2020) Robust and lightweight mutual authentication scheme in distributed smart environments. IEEE Access 8(69):722–733
Braeken A (2018) Puf based authentication protocol for iot. Symmetry 10(8):352
Ahmed MI, Kannan G (2021) Cloud-based remote rfid authentication for security of smart internet of things applications. Journal of Information & Knowledge Management 20(supp01):2140004
Quadir SE, Chandy JA (2019) Low pass filter puf: Authentication of printed circuit boards based on resistor and capacitor variations in High Performance Logic And Circuits For High-speed Electronic Systems. World Scientific pp. 113–127
Sajid A, Abbas H, Saleem K (2016) Cloud-assisted iot-based scada systems security: A review of the state of the art and future challenges. IEEE Access 4:1375–1384
Lim D (2004) Extracting secret keys from integrated circuits in master thesis. Massachusetts Institute of Technology
Mahalat MH, Saha S, Mondal A, Sen B (2018) A puf based light weight protocol for secure wifi authentication of IOT devices. In 8th International symposium on embedded computing and system design (ISED) IEEE 183–187
Yao J, Pang L, Su Y, Zhang Z, Yang W, Fu A, Gao Y (2022) Design and evaluate recomposited or-and-xor-puf. IEEE Transactions on Emerging Topics in Computing 10(2):662–677
Majzoobi M, Koushanfar F, Potkonjak M (2008) Lightweight secure pufs. In 2008 IEEE/ACM International Conference on Computer-Aided Design. IEEE pp. 670–673
Sahoo DP, Mukhopadhyay D, Chakraborty RS, Nguyen PH (2017) A multiplexer-based arbiter puf composition with enhanced reliability and security. IEEE Transactions on Computers 67(3):403–417
Nguyen PH, Sahoo DP, Jin C, Mahmood K, Rührmair U, van Dijk M (2018) The interpose puf: Secure puf design against state-of-the-art machine learning attacks Cryptology ePrint Archive
Qureshi MA, Munir A (2020) Puf-ipa: A puf-based identity preserving protocol for internet of things authentication in (2020). IEEE 17th annual consumer communications & networking conference (CCNC) IEEE 2020:1–7
Barbareschi M, De Benedictis A, La Montagna E, Mazzeo A, Mazzocca N (2019) A puf-based mutual authentication scheme for cloud-edges iot systems. Future Generation Computer Systems 101:246–261
Muhal MA, Luo X, Mahmood Z, Ullah A (2018) Physical unclonable function based authentication scheme for smart devices in internet of things in 2018 IEEE International Conference on Smart Internet of Things (SmartIoT). IEEE 2018 pp. 160–165
Zalivaka SS, Ivaniuk AA, Chang C-H (2018) Reliable and modeling attack resistant authentication of arbiter puf in fpga implementation with trinary quadruple response. IEEE Transactions on Information Forensics and Security 14(4):1109–1123
Mustapa M, Niamat MY, Nath APD, Alam M (2016) Hardware-oriented authentication for advanced metering infrastructure. IEEE Transactions on Smart Grid 9(2):1261–1270
Gao Y, Ma H, Al-Sarawi SF, Abbott D, Ranasinghe DC (2017) Puf-fsm: a controlled strong puf. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 37(5):1104–1108
Chatterjee U, Govindan V, Sadhukhan R, Mukhopadhyay D, Chakraborty RS, Mahata D, Prabhu MM (2018) Building puf based authentication and key exchange protocol for iot without explicit crps in verifier database. IEEE transactions on dependable and secure computing 16(3):424–437
Zerrouki F, Ouchani S, Bouarfa H (2022) Puf-based mutual authentication and session key establishment protocol for IoT devices. J Amb Intell Human Comput pp. 1–19
Santikellur P, Bhattacharyay A, Chakraborty RS (2019) Deep learning based model building attacks on arbiter puf compositions. Cryptology ePrint Archive
Chaterjee U, Mukhopadhyay D, Chakraborty RS (2020) 3paa: A private puf protocol for anonymous authentication. IEEE Transactions on Information Forensics and Security 16:756–769
Chatterjee U, Chakraborty RS, Mukhopadhyay D (2017) A puf-based secure communication protocol for iot. ACM Transactions on Embedded Computing Systems (TECS) 16(3):1–25
Sadhu P, Yanambaka VP, Abdelgawad A, Yelamarthi K (2022) Nahap: Puf-based three factor authentication system for internet of medical things. IEEE Consumer Electronics Magazine
Gope P, Millwood O, Sikdar B (2021) A scalable protocol level approach to prevent machine learning attacks on physically unclonable function based authentication mechanisms for internet of medical things. IEEE Transactions on Industrial Informatics 18(3):1971–1980
Dubrova E, Näslund O, Degen B, Gawell A, Yu Y (2019) Crc-puf: A machine learning attack resistant lightweight puf construction in 2019 IEEE European symposium on security and privacy workshops (EuroS & PW). IEEE pp. 264–271
Byun JW (2019) An efficient multi-factor authenticated key exchange with physically unclonable function in 2019 International Conference on Electronics, Information, and Communication (ICEIC). IEEE pp. 1–4
Masud M, Gaba GS, Alqahtani S, Muhammad G, Gupta B, Kumar P, Ghoneim A (2020) A lightweight and robust secure key establishment protocol for internet of medical things in covid-19 patients care. IEEE Int Things J 8(21):15694–15703
Canetti R, Jain A, Scafuro A (2014) Practical UC security with a global random oracle. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security pp. 597–608
Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inform Theory 29(2):198–208
Author information
Authors and Affiliations
Contributions
KC Writing-original draft preparation, methodology, conceptualization, analysis and interpretation of results. RRC Visualization, coding and implementation.
Corresponding author
Ethics declarations
Consent for publication
NA
Conflicts of interest
The authors declare that they have no conflict of Interest
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kumar Chaudhary, R.R., Chatterjee, K. A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System. Peer-to-Peer Netw. Appl. 16, 1975–1992 (2023). https://doi.org/10.1007/s12083-023-01509-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-023-01509-6