Abstract
Because of recent COVID-19 epidemic, the Internet-of-Medical-Things (IoMT) has acquired a significant impetus to diagnose patients remotely, regulate medical equipment, and track quarantined patients via smart electronic devices installed at the patient’s end. Nevertheless, the IoMT confronts various security and privacy issues, such as entity authentication, confidentiality, and integrity of health-related data, among others, rendering this technology vulnerable to different attacks. To address these concerns, a number of security procedures based on traditional cryptographic approaches, such as discrete logarithm and integer factorization problems, have been developed. All of these protocols, however, are vulnerable to quantum attacks. This paper, in this context, presents a data authentication and access control protocol for IoMT systems that can withstand quantum attacks. A comprehensive formal security assessment demonstrates that the proposed algorithm can endure both current and future threats. In terms of data computing, transmission, and key storage overheads, it also surpasses other related techniques.



Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Aghili SF, Mala H, Shojafar M, Peris-Lopez P (2019) LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT. Futur Gener Comput Syst 96:410–424
Ajtai M (1996) Generating hard instances of lattice problems. In: Proceedings of the twenty-eighth annual ACM symposium on Theory of computing, ACM, pp. 99–108
Alabdulatif A, Khalil I, Forkan ARM, Atiquzzaman M (2018) Real-time secure health surveillance for smarter health communities. IEEE Commun Mag 57(1):122–129
Alassaf N, Gutub A (2019) Simulating light-weight-cryptography implementation for iot healthcare data security applications. Int J E-Health Med Commun (IJEHMC) 10(4):1–15
Alassaf N, Alkazemi N, Gutub A (2003) Applicable light-weight cryptography to secure medical data in iot systems, Arabia
Al-Turjman F, Deebak B (2020) Privacy-aware energy-efficient framework using the internet of medical things for covid-19. IEEE Internet Things Mag 3(3):64–68
Aman AHM, Hassan WH, Sameen S, Attarbashi ZS, Alizadeh M, Latiff LA (202) IoMT amid COVID-19 pandemic: Application, architecture, technology, and security. J Netw Comput Appl
Amin R, Islam SH, Biswas GP, Khan MK, Li X (2015) Cryptanalysis and enhancement of anonymity preserving remote user mutual authentication and session key agreement scheme for e-health care systems. J Med Syst 39(11):140
Amin R, Islam SH, Biswas GP, Khan MK, Kumar N (2018) A robust and anonymous patient monitoring system using wireless medical sensor networks. Futur Gener Comput Syst 80:483–495
Baranchuk A, Refaat MM, Patton PP, Chung MK, Krishnan K, Kutyifa V, Upadhyay G, Fisher JD, Lakkireddy DR, Cardiology AC et al (2018) Cybersecurity for cardiac implantable electronic devices: what should you know? J Am Coll Cardiol 71(11):1284–1288
Cao J, Yu P, Xiang X, Ma M, Li H (2019) Anti-quantum fast authentication and data transmission scheme for massive devices in 5G NB-IoT system. IEEE Internet Things J 6(6):9794–9805
Chaudhary R, Jindal A, Aujla GS, Kumar N, Das AK, Saxena N (2018) Lscsh: Lattice-based secure cryptosystem for smart healthcare in smart cities environment. IEEE Commun Mag 56(4):24–32
Das AK, Goswami A (2013) A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J Med Syst 37(3):9948
Firouzi F, Farahani B, Ibrahim M, Chakrabarty K (2018) Keynote paper: From EDA to IoT ehealth: Promises, challenges, and solutions. IEEE Trans Comput Aided Des Integr Circuits Syst 37(12):2965–2978
Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the fortieth annual ACM symposium on Theory of computing, pp. 197–206
Gupta DS, Islam SH, Obaidat MS, Karati A, Sadoun B (2020) Laac: Lightweight lattice-based authentication and access control protocol for e-health systems in IoT environments. IEEE Syst J
Gupta DS, Karati A, Saad W, Da Costa DB (2022) Quantum-defended blockchain-assisted data authentication protocol for internet of vehicles. IEEE Trans Veh Technol
Gupta DS, Biswas G (2017) An ecc-based authenticated group key exchange protocol in ibe framework. Int J Commun Syst 30(18):e3363
Gupta DS, Biswas G (2017) On securing bi-and tri-partite session key agreement protocol using ibe framework. Wireless Pers Commun 96(3):4505–4524
Gupta DS, Biswas G (2018) Design of lattice-based elgamal encryption and signature schemes using sis problem. Trans Emerg Telecommun Technol 29(6):e3255
Gupta DS, Biswas G (2018) A novel and efficient lattice-based authenticated key exchange protocol in c-k model. Int J Commun Syst 31(3):e3473
Gupta DS, Islam SH, Obaidat MS, Vijayakumar P, Kumar N, Park Y (2020) A provably secure and lightweight identity-based two-party authenticated key agreement protocol for iiot environments. IEEE Syst J 15(2):1732–1741
Gupta DS, Ray S, Singh T, Kumari M (2022) Post-quantum lightweight identity-based two-party authenticated key exchange protocol for internet of vehicles with probable security. Comput Commun 181:69–79
He D, Kumar N, Chen J, Lee C-C, Chilamkurti N, Yeo S-S (2015) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed Syst 21(1):49–60
Jan MA, Khan F, Mastorakis S, Adil M, Akbar A, Stergiou N (2021) LightIoT: Lightweight and secure communication for energy-efficient IoT in health informatics. IEEE Trans Green Commun Netw
Kim J (2015) Energy-efficient dynamic packet downloading for medical IoT platforms. IEEE Trans Industr Inf 11(6):1653–1659
Kumar P, Lee S-G, Lee H-J (2012) E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12(2):1625–1647
Kumar G, Saha R, Rai MK, Buchanan WJ, Thomas R, Geetha G, Hoon-Kim T, Rodrigues JJ (2020) A privacy-preserving secure framework for electric vehicles in IoT using matching market and signcryption. IEEE Trans Veh Technol 69(7):7707–7722
Li X, Niu J, Karuppiah M, Kumari S, Wu F (2016) Secure and efficient two-factor user authentication scheme with user anonymity for network based e-health care applications. J Med Syst 40(12):268
Li C-T, Wu T-Y, Chen C-L, Lee C-C, Chen C-M (2017) An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system. Sensors 17(7):1482
Lin X, Lu R, Shen X, Nemoto Y, Kato N (2009) SAGE: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE J Sel Areas Commun 27(4):365–378
Liu C-H, Chung Y-F (2017) Secure user authentication scheme for wireless healthcare sensor networks. Comput Electr Eng 59:250–261
Masud M, Gaba GS, Alqahtani S, Muhammad G, Gupta B, Kumar P, Ghoneim A (2020) A lightweight and robust secure key establishment protocol for internet of medical things in covid-19 patients care. IEEE Internet Things J
Micciancio D, Regev O (2007) Worst-case to average-case reductions based on gaussian measures. SIAM J Comput 37(1):267–302
Mukherjee S, Gupta DS, Biswas GP (2019) An efficient and batch verifiable conditional privacy-preserving authentication scheme for vanets using lattice. Computing 101(12):1763–1788
Sahu AK, Sharma S, Puthal D (2021) Lightweight multi-party authentication and key-agreement protocol in iot based e-healthcare service. ACM Trans Multimed Comput Commun Appl (TOMM)
Samkari H, Gutub A (2019) Protecting medical records against cybercrimes within hajj period by 3-layer security. Recent Trends Inf Technol Appl 2(3):1–21
Shambour M, Gutub A (2021) Personal privacy evaluation of smart devices applications serving hajj and umrah rituals. J Eng Res
Shor PW (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev 41(2):303–332
Yaacoub J-PA, Noura M, Noura HN, Salman O, Yaacoub E, Couturier R, Chehab A (2020) Securing internet of medical things systems: limitations, issues and recommendations. Futur Gener Comput Syst 105:581–606
Yaqoob T, Abbas H, Atiquzzaman M (2019) Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices-a review. IEEE Commun Surv Tutor 21(4):3723–3768
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Gupta, D.S., Mazumdar, N., Nag, A. et al. Secure data authentication and access control protocol for industrial healthcare system. J Ambient Intell Human Comput 14, 4853–4864 (2023). https://doi.org/10.1007/s12652-022-04370-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-022-04370-2