Abstract
Unattended Wireless Sensor Networks (U-WSNs) use a non-stationary objects so-called sink node (SN) or mobile sink (MS) to perform a few data computation processes including collection and analysis. This network has a wide range of medical applications to exploit the key features of primary sensing units associated with their computing devices such as blood pressure, pulse oximeter and insulin pump to play a crucial role in stimulating the monitoring systems remotely (hostile environment). In traditional WSNs, the sensing units report the observed data to SN/MS via dedicated network, whereas in U-WSNs, the sensing units gather and keep the observed data in their local cache. At a later time, SN/MS accesses the network throughout the time interval to recover the observed data from the local cache. To fulfill the potential features of SN/MS, the emerging technologies practiced in healthcare applications use fundamental features of the Internet of Things (IoT). Despite the fact of being more accessible and potentially in service, security is highly concerned in restraining the unsatisfied threats in 5G infrastructure. Thus, in this paper, a lightweight two-factor authentication with anonymous data access framework is proposed (L2FA-ADA) using SN/MS. To examine the key properties of cryptographic protocols, the appropriate key agreement schemes were extensively researched. Moreover, the proposed L2FA-ADA utilizes a strategy of two-factor authentication with anonymous data access to ensure perfect forward secrecy with a significant degree of security efficiency. The security analysis including formal and informal shows that the proposed L2FA-ADA is provably protected in securing data privacy, integrity, and confidentiality. In conclusion, using a practical testbed, the key metrics such as transmission efficiency and overhead ratio were evaluated to signify the performance efficiencies of the proposed L2FA-ADA compared to other relevant state-of-the-art approaches.
Similar content being viewed by others
Data availability
Not applicable.
References
Ma X, Liu J, Jiang H (2015) Resource allocation for heterogeneous applications with device-to-device communication underlaying cellular networks. IEEE J Sel Areas Commun 34(1):15–26
Al-Sarawi S, Anbar M, Abdullah R, Al Hawari AB (2020, July) Internet of Things market analysis forecasts, 2020–2030. In: 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4). IEEE, pp 449–453
Almuhaideb AM, Alghamdi HA (2022) Secure and efficient WBAN authentication protocols for intra-BAN tier. J Sens Actuator Netw 11(3):44
Moon AH, Iqbal U, Bhat GM (2016) Mutual entity authentication protocol based on ECDSA for WSN. Procedia Comput Sci 89:187–192
Saqib M, Jasra B, Moon AH (2020) Mutual authentication protocol for green Internet of Things in content centric network. J Green Eng (JGE) 10(9)
Saqib M, Jasra B, Moon AH (2020, November) A systematized security and communication protocols stack review for Internet of Things. In: 2020 IEEE International Conference for Innovation in Technology (INOCON). IEEE, pp 1–9
Almuhaideb AM, Alqudaihi KS (2021) Authentication in wireless body area network: Taxonomy and open challenges. J Internet Things 3(4):159
Almuhaideb AM, Alghamdi HA (2022) Design of inter-BAN authentication protocols for WBAN in a cloud-assisted environment. Big Data Cognit Comput 6(4):124
Kayes ASM, Rahayu W, Dillon T (2019) Critical situation management utilizing IoT-based data resources through dynamic contextual role modeling and activation. Computing 101(7):743–772
Yan X, Ma M (2022) A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks. Comput Secur 116:102601
Lu K, Qian Y, Guizani M, Chen HH (2008) A framework for a distributed key management scheme in heterogeneous wireless sensor networks. IEEE Trans Wirel Commun 7:639–647
Limbasiya T, Sahay SK, Sridharan B (2021) Privacy-preserving mutual authentication and key agreement scheme for multi-server healthcare system. Inf Syst Front 23(4):835–848
Tian E, Yue D, Yang TC, Gu Z, Lu G (2011) T-S fuzzy model-based robust stabilization for networked control systems with probabilistic sensor and actuator failure. IEEE Trans Fuzzy Syst 19(3):553–561
Hassan M, Mansoor K, Tahir S, Iqbal W (2019, August) Enhanced lightweight cloud-assisted mutual authentication scheme for wearable devices. In: 2019 International Conference on Applied and Engineering Mathematics (ICAEM). IEEE, pp 62–67
Deebak BD, Al-Turjman F (2020) Smart mutual authentication protocol for cloud based medical healthcare systems using Internet of medical things. IEEE J Sel Areas Commun 39(2):346–360
Deebak BD, Al-Turjman F, Mostarda L (2020) Seamless secure anonymous authentication for cloud-based mobile edge computing. Comput Electr Eng 87:106782
Deebak BD, Al-Turjman F (2021) Robust lightweight privacy-preserving and session scheme interrogation for fog computing systems. J Inf Secur Appl 58:102689
Ometov A, Bezzateev S, Mäkitalo N, Andreev S, Mikkonen T, Koucheryavy Y (2018) Multi-factor authentication: A survey. Cryptography 2(1):1
Rasheed A, Mahapatra RN (2012) The three-tier security scheme in wireless sensor networks with mobile sinks. IEEE Trans Parallel Distrib Syst 23(5):958–965
He D, Chen Y, Chen J (2012) Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn 69:1149–1157
Deebak BD, Al-Turjman F (2021) Secure-user sign-in authentication for IoT-based eHealth systems. Complex Intell Syst 1–21
Dharminder D, Kumar U, Gupta P (2021) A construction of a conformal Chebyshev chaotic map based authentication protocol for healthcare telemedicine services. Complex Intell Syst 7:2531–2542
Amin R, Kumar N, Biswas GP, Iqbal R, Chang V (2018) A lightweight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment. Futur Gener Comput Syst 78:1005–1019
Wei F, Zhang R, Ma C (2018) A provably secure anonymous two-factor authenticated key exchange protocol for cloud computing. Fund Inform 157(1):201–220
Dsouza C, Ahn GJ, Taguinod M (2014, August) Policy-driven security management for fog computing: Preliminary framework and a case study. In: Proceedings of the 2014 IEEE 15th international conference on information reuse and integration (IEEE IRI 2014). IEEE, pp 16–23
Shivraj VL, Rajan MA, Singh M, Balamuralidhar P (2015, February) One time password authentication scheme based on elliptic curves for Internet of Things (IoT). In: 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW). IEEE, pp 1–6
Sarker IH, Kayes ASM (2020) ABC-RuleMiner: User behavioral rule-based machine learning method for context-aware intelligent services. J Netw Comput Appl 168:102762
Lu R, Heung K, Lashkari AH, Ghorbani AA (2017) A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5:3302–3312
Kumar PM, Gandhi UD (2020) Enhanced DTLS with CoAP-based authentication scheme for the Internet of things in healthcare application. J Supercomput 76(6):3963–3983
Ibrahim MH (2016) Octopus: an edge-fog mutual authentication scheme. Int J Netw Secur 18(6):1089–1101
Amor AB, Abid M, Meddeb A (2017, October) A privacy-preserving authentication scheme in an edge-fog environment. In: 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA). IEEE, pp 1225–1231
Xu G, Qiu S, Ahmad H, Xu G, Guo Y, Zhang M, Xu H (2018) A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography. Sensors 18(7):2394
Lee J, Yu S, Park K, Park Y, Park Y (2019) Secure three-factor authentication protocol for multi-gateway IoT environments. Sensors 19(10):2358
Yu S, Park K, Park Y (2019) A secure lightweight three-factor authentication scheme for IoT in cloud computing environment. Sensors 19(16):3598
Watters P, Scolyer-Gray P, Kayes ASM, Chowdhury MJM (2019) This would work perfectly if it weren't for all the humans: Two factor authentication in late modern societies. First Monday 24(7)
Kalaria R, Kayes ASM, Rahayu W, Pardede E (2021) A secure mutual authentication approach to fog computing environment. Comput Secur 102483
He D, Kumar N, Chen J, Lee CC, Chilamkurti N, Yeo SS (2015) Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimedia Syst 21(1):49–60
Wu F, Xu L, Kumari S, Li X (2017) An improved and anonymous two-factor authentication protocol for healthcare applications with wireless medical sensor networks. Multimedia Syst 23(2):195–205
Amin R, Islam SH, Biswas GP, Khan MK, Kumar N (2018) A robust and anonymous patient monitoring system using wireless medical sensor networks. Futur Gener Comput Syst 80:483–495
Kumari S, Om H (2016) Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Comput Netw 104:137–154
Wu F, Li X, Sangaiah AK, Xu L, Kumari S, Wu L, Shen J (2018) A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Futur Gener Comput Syst 82:727–737
Wazid M, Das AK, Shetty S, JPC Rodrigues J, Park Y (2019) LDAKM-EIoT: Lightweight device authentication and key management mechanism for edge-based IoT deployment. Sensors 19(24):5539
Deebak BD, Hwang SO (2023) Intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era. Comput Netw 225:109664
He D, Cai Y, Zhu S, Zhao Z, Chan S, Guizani M (2023) A lightweight authentication and key exchange protocol with anonymity for IoT. IEEE Trans Wirel Commun 22(11):7862–7872
Nikooghadam M, Amintoosi H (2023) Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme. Int J Commun Syst 36(1):e4332
Gupta S, Arya PK, Sharma HK (2023) User anonymity-based secure authentication protocol for telemedical server systems. Int J Inf Comput Secur 20(1–2):199–219
Patel C, Doshi N (2023) LDA-2IoT: A level dependent authentication using two factor for IoT paradigm. Comput Netw 109580
Ryu J, Oh J, Kwon D, Son S, Lee J, Park Y, Park Y (2022) Secure ECC-based three-factor mutual authentication protocol for telecare medical information system. IEEE Access 10:11511–11526
Deebak BD (2020) Lightweight authentication and key management in mobile-sink for smart IoT-assisted systems. Sustain Cities Soc 102416
Farash MS, Chaudhry SA, Heydari M, Sajad Sadough SM, Kumari S, Khan MK (2017) A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int J Commun Syst 30(4):e3019
Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208
Deebak BD (2016) Secure and efficient mutual adaptive user authentication scheme for heterogeneous wireless sensor networks using multimedia client–server systems. Wireless Pers Commun 87(3):1013–1035
Burrows M, Abadi M, Needham R (1990) Logic of authentication. ACM Trans Comput Syst 8(1):18–36
Ever YK (2020) A secure authentication scheme framework for mobile-sinks used in the internet of drones applications. Comput Commun 155:143–149
He D, Wang D, Xie Q, Chen K (2017) Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation. Sci China Inf Sci 60(5):05210f
Xu X, Zeng Z, Yang S, Shao H (2020) A novel blockchain framework for industrial IoT edge computing. Sensors 20(7):2061
Huang H (2019, August) Architecture of audio broadcasting coverage monitoring system based on internet of things. In: 2019 IEEE International Conference on Smart Internet of Things (SmartIoT). IEEE, pp 320–324
Habaebi MH, Merrad Y, Islam MR, Elsheikh EA, Sliman FM, Mesri M (2023) Extending CloudSim to simulate sensor networks. SIMULATION 99(1):3–22
Mahmud R, Pallewatta S, Goudarzi M, Buyya R (2022) iFogSim2: An extended iFogSim simulator for mobility, clustering, and microservice management in edge and fog computing environments. J Syst Softw 190:111351
Abbas AM, Zekry A, Youssef KY, Mahmoud II (2020, December) Simulink based modeling and performance analysis of NB-IoT uplink scheduler. In: 2020 8th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC). IEEE, pp 11–17
Funding
Not applicable.
Author information
Authors and Affiliations
Contributions
R. Muralidhara Rao contributed to Methodology, Formal Analysis, Investigation, and Writing – Original Draft Preparation. B. D. Deebak contributed to Conceptualization, Writing—Review and Editing, and Supervision.
Corresponding author
Ethics declarations
Ethics approval
Not applicable.
Consent to publish
Not applicable.
Competing interests
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of Topical Collection: Special Issue on 2 - Track on Security and Privacy
Guest Editor: Rongxing Lu
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Rao, P.M., Deebak, B.D. Lightweight two-factor authentication framework with privacy preserving for smart eHealth. Peer-to-Peer Netw. Appl. 17, 373–396 (2024). https://doi.org/10.1007/s12083-023-01596-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-023-01596-5