Skip to main content
Log in

A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

The Internet of Things is gaining popularity throughout the world. With the growth of digital communication, healthcare 4.0 are being implemented by many businesses industry in order to establish a more resilient, competent, and intelligent smart healthcare system. Healthcare monitoring services are the part of smart healthcare system. These types of monitoring systems are mainly based on the Internet of Things (IoT). IoT helps to integrate multiple sensors and objects that can directly communicate with each other without human intervention. This type of IoT based systems are vulnerable to different adversarial threats such as cloning attack, impersonation attack etc. Hence medical IoT device authentication is essential in smart healthcare to verify user legitimacy. One way to verify user legitimacy is using physical unclonable function (PUF). The PUF protects sensor nodes from tampering, cloning attack. In this paper, we have proposed a lightweight PUF based authentication mechanism for embedded IoT devices in e-healthcare system. The proposed authentication technique helps to authenticate IoT sensor nodes which are responsible for transmitting sensitive health data in a health monitoring system. The performance comparison shows that the protocol is efficient with high through put and low computational load. The security analysis of the authentication scheme shows it would resist different types of network attacks. The proposed authentication provides a facility that no one except that the primary users can have access to the raw challenge response pair of integrated PUF circuits so that adversary will unable to build another same PUF model. Also the success probability is \(2^{-76}\) for recovering the transformed 128 bit challenge and responses.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

NA.

References

  1. Xue K, Ma X, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316– 323, 2013. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1084804512001403

  2. Nikooghadam M, Amintoosi H (2020) An improved secure authentication and key agreement scheme for healthcare applications in, (2020) 25th International Computer Conference, Computer Society of Iran (CSICC). IEEE 2020:1–7

  3. Binu P, Thomas K, Varghese NP (2017) Highly secure and efficient architectural model for iot based health care systems in 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE 2017 pp. 487–493

  4. Abdussami M, Amin R, Vollala S (2023) Provably secured lightweight authenticated key agreement protocol for modern health industry Ad Hoc Networks p. 103094

  5. Lin H, Garg S, Hu J, Wang X, Piran MJ, Hossain MS (2020) Privacy-enhanced data fusion for covid-19 applications in intelligent internet of medical things. IEEE Internet of Things Journal 8(21):15683–15693

    Article  Google Scholar 

  6. Hossain MS (2015) Cloud-supported cyber-physical localization framework for patients monitoring. IEEE Systems Journal 11(1):118–127

    Article  Google Scholar 

  7. Gaba GS, Kumar G, Monga H, Kim TH, Kumar P (2020) Robust and lightweight mutual authentication scheme in distributed smart environments. IEEE Access 8(69):722–733

  8. Braeken A (2018) Puf based authentication protocol for iot. Symmetry 10(8):352

    Article  Google Scholar 

  9. Ahmed MI, Kannan G (2021) Cloud-based remote rfid authentication for security of smart internet of things applications. Journal of Information & Knowledge Management 20(supp01):2140004

    Article  Google Scholar 

  10. Quadir SE, Chandy JA (2019) Low pass filter puf: Authentication of printed circuit boards based on resistor and capacitor variations in High Performance Logic And Circuits For High-speed Electronic Systems. World Scientific pp. 113–127

  11. Sajid A, Abbas H, Saleem K (2016) Cloud-assisted iot-based scada systems security: A review of the state of the art and future challenges. IEEE Access 4:1375–1384

    Article  Google Scholar 

  12. Lim D (2004) Extracting secret keys from integrated circuits in master thesis. Massachusetts Institute of Technology

  13. Mahalat MH, Saha S, Mondal A, Sen B (2018) A puf based light weight protocol for secure wifi authentication of IOT devices. In 8th International symposium on embedded computing and system design (ISED) IEEE 183–187

  14. Yao J, Pang L, Su Y, Zhang Z, Yang W, Fu A, Gao Y (2022) Design and evaluate recomposited or-and-xor-puf. IEEE Transactions on Emerging Topics in Computing 10(2):662–677

    Google Scholar 

  15. Majzoobi M, Koushanfar F, Potkonjak M (2008) Lightweight secure pufs. In 2008 IEEE/ACM International Conference on Computer-Aided Design. IEEE pp. 670–673

  16. Sahoo DP, Mukhopadhyay D, Chakraborty RS, Nguyen PH (2017) A multiplexer-based arbiter puf composition with enhanced reliability and security. IEEE Transactions on Computers 67(3):403–417

    Article  MathSciNet  MATH  Google Scholar 

  17. Nguyen PH, Sahoo DP, Jin C, Mahmood K, Rührmair U, van Dijk M (2018) The interpose puf: Secure puf design against state-of-the-art machine learning attacks Cryptology ePrint Archive

  18. Qureshi MA, Munir A (2020) Puf-ipa: A puf-based identity preserving protocol for internet of things authentication in (2020). IEEE 17th annual consumer communications & networking conference (CCNC) IEEE 2020:1–7

  19. Barbareschi M, De Benedictis A, La Montagna E, Mazzeo A, Mazzocca N (2019) A puf-based mutual authentication scheme for cloud-edges iot systems. Future Generation Computer Systems 101:246–261

    Article  Google Scholar 

  20. Muhal MA, Luo X, Mahmood Z, Ullah A (2018) Physical unclonable function based authentication scheme for smart devices in internet of things in 2018 IEEE International Conference on Smart Internet of Things (SmartIoT). IEEE 2018 pp. 160–165

  21. Zalivaka SS, Ivaniuk AA, Chang C-H (2018) Reliable and modeling attack resistant authentication of arbiter puf in fpga implementation with trinary quadruple response. IEEE Transactions on Information Forensics and Security 14(4):1109–1123

    Article  Google Scholar 

  22. Mustapa M, Niamat MY, Nath APD, Alam M (2016) Hardware-oriented authentication for advanced metering infrastructure. IEEE Transactions on Smart Grid 9(2):1261–1270

    Article  Google Scholar 

  23. Gao Y, Ma H, Al-Sarawi SF, Abbott D, Ranasinghe DC (2017) Puf-fsm: a controlled strong puf. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 37(5):1104–1108

    Google Scholar 

  24. Chatterjee U, Govindan V, Sadhukhan R, Mukhopadhyay D, Chakraborty RS, Mahata D, Prabhu MM (2018) Building puf based authentication and key exchange protocol for iot without explicit crps in verifier database. IEEE transactions on dependable and secure computing 16(3):424–437

    Article  Google Scholar 

  25. Zerrouki F, Ouchani S, Bouarfa H (2022) Puf-based mutual authentication and session key establishment protocol for IoT devices. J Amb Intell Human Comput pp. 1–19

  26. Santikellur P, Bhattacharyay A, Chakraborty RS (2019) Deep learning based model building attacks on arbiter puf compositions. Cryptology ePrint Archive

  27. Chaterjee U, Mukhopadhyay D, Chakraborty RS (2020) 3paa: A private puf protocol for anonymous authentication. IEEE Transactions on Information Forensics and Security 16:756–769

    Article  Google Scholar 

  28. Chatterjee U, Chakraborty RS, Mukhopadhyay D (2017) A puf-based secure communication protocol for iot. ACM Transactions on Embedded Computing Systems (TECS) 16(3):1–25

    Article  Google Scholar 

  29. Sadhu P, Yanambaka VP, Abdelgawad A, Yelamarthi K (2022) Nahap: Puf-based three factor authentication system for internet of medical things. IEEE Consumer Electronics Magazine

  30. Gope P, Millwood O, Sikdar B (2021) A scalable protocol level approach to prevent machine learning attacks on physically unclonable function based authentication mechanisms for internet of medical things. IEEE Transactions on Industrial Informatics 18(3):1971–1980

    Article  Google Scholar 

  31. Dubrova E, Näslund O, Degen B, Gawell A, Yu Y (2019) Crc-puf: A machine learning attack resistant lightweight puf construction in 2019 IEEE European symposium on security and privacy workshops (EuroS & PW). IEEE pp. 264–271

  32. Byun JW (2019) An efficient multi-factor authenticated key exchange with physically unclonable function in 2019 International Conference on Electronics, Information, and Communication (ICEIC). IEEE pp. 1–4

  33. Masud M, Gaba GS, Alqahtani S, Muhammad G, Gupta B, Kumar P, Ghoneim A (2020) A lightweight and robust secure key establishment protocol for internet of medical things in covid-19 patients care. IEEE Int Things J 8(21):15694–15703

  34. Canetti R, Jain A, Scafuro A (2014) Practical UC security with a global random oracle. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security pp. 597–608

  35. Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inform Theory 29(2):198–208

Download references

Author information

Authors and Affiliations

Authors

Contributions

KC Writing-original draft preparation, methodology, conceptualization, analysis and interpretation of results. RRC Visualization, coding and implementation.

Corresponding author

Correspondence to Kakali Chatterjee.

Ethics declarations

Consent for publication

NA

Conflicts of interest

The authors declare that they have no conflict of Interest

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar Chaudhary, R.R., Chatterjee, K. A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System. Peer-to-Peer Netw. Appl. 16, 1975–1992 (2023). https://doi.org/10.1007/s12083-023-01509-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-023-01509-6

Keywords

Navigation