Skip to main content

Advertisement

Log in

Secure data authentication and access control protocol for industrial healthcare system

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Because of recent COVID-19 epidemic, the Internet-of-Medical-Things (IoMT) has acquired a significant impetus to diagnose patients remotely, regulate medical equipment, and track quarantined patients via smart electronic devices installed at the patient’s end. Nevertheless, the IoMT confronts various security and privacy issues, such as entity authentication, confidentiality, and integrity of health-related data, among others, rendering this technology vulnerable to different attacks. To address these concerns, a number of security procedures based on traditional cryptographic approaches, such as discrete logarithm and integer factorization problems, have been developed. All of these protocols, however, are vulnerable to quantum attacks. This paper, in this context, presents a data authentication and access control protocol for IoMT systems that can withstand quantum attacks. A comprehensive formal security assessment demonstrates that the proposed algorithm can endure both current and future threats. In terms of data computing, transmission, and key storage overheads, it also surpasses other related techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.

References

  • Aghili SF, Mala H, Shojafar M, Peris-Lopez P (2019) LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT. Futur Gener Comput Syst 96:410–424

    Article  Google Scholar 

  • Ajtai M (1996) Generating hard instances of lattice problems. In: Proceedings of the twenty-eighth annual ACM symposium on Theory of computing, ACM, pp. 99–108

  • Alabdulatif A, Khalil I, Forkan ARM, Atiquzzaman M (2018) Real-time secure health surveillance for smarter health communities. IEEE Commun Mag 57(1):122–129

    Article  Google Scholar 

  • Alassaf N, Gutub A (2019) Simulating light-weight-cryptography implementation for iot healthcare data security applications. Int J E-Health Med Commun (IJEHMC) 10(4):1–15

    Article  Google Scholar 

  • Alassaf N, Alkazemi N, Gutub A (2003) Applicable light-weight cryptography to secure medical data in iot systems, Arabia

  • Al-Turjman F, Deebak B (2020) Privacy-aware energy-efficient framework using the internet of medical things for covid-19. IEEE Internet Things Mag 3(3):64–68

    Article  Google Scholar 

  • Aman AHM, Hassan WH, Sameen S, Attarbashi ZS, Alizadeh M, Latiff LA (202) IoMT amid COVID-19 pandemic: Application, architecture, technology, and security. J Netw Comput Appl

  • Amin R, Islam SH, Biswas GP, Khan MK, Li X (2015) Cryptanalysis and enhancement of anonymity preserving remote user mutual authentication and session key agreement scheme for e-health care systems. J Med Syst 39(11):140

    Article  Google Scholar 

  • Amin R, Islam SH, Biswas GP, Khan MK, Kumar N (2018) A robust and anonymous patient monitoring system using wireless medical sensor networks. Futur Gener Comput Syst 80:483–495

    Article  Google Scholar 

  • Baranchuk A, Refaat MM, Patton PP, Chung MK, Krishnan K, Kutyifa V, Upadhyay G, Fisher JD, Lakkireddy DR, Cardiology AC et al (2018) Cybersecurity for cardiac implantable electronic devices: what should you know? J Am Coll Cardiol 71(11):1284–1288

    Article  Google Scholar 

  • Cao J, Yu P, Xiang X, Ma M, Li H (2019) Anti-quantum fast authentication and data transmission scheme for massive devices in 5G NB-IoT system. IEEE Internet Things J 6(6):9794–9805

    Article  Google Scholar 

  • Chaudhary R, Jindal A, Aujla GS, Kumar N, Das AK, Saxena N (2018) Lscsh: Lattice-based secure cryptosystem for smart healthcare in smart cities environment. IEEE Commun Mag 56(4):24–32

    Article  Google Scholar 

  • Das AK, Goswami A (2013) A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J Med Syst 37(3):9948

    Article  Google Scholar 

  • Firouzi F, Farahani B, Ibrahim M, Chakrabarty K (2018) Keynote paper: From EDA to IoT ehealth: Promises, challenges, and solutions. IEEE Trans Comput Aided Des Integr Circuits Syst 37(12):2965–2978

    Article  Google Scholar 

  • Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the fortieth annual ACM symposium on Theory of computing, pp. 197–206

  • Gupta DS, Islam SH, Obaidat MS, Karati A, Sadoun B (2020) Laac: Lightweight lattice-based authentication and access control protocol for e-health systems in IoT environments. IEEE Syst J

  • Gupta DS, Karati A, Saad W, Da Costa DB (2022) Quantum-defended blockchain-assisted data authentication protocol for internet of vehicles. IEEE Trans Veh Technol

  • Gupta DS, Biswas G (2017) An ecc-based authenticated group key exchange protocol in ibe framework. Int J Commun Syst 30(18):e3363

    Article  Google Scholar 

  • Gupta DS, Biswas G (2017) On securing bi-and tri-partite session key agreement protocol using ibe framework. Wireless Pers Commun 96(3):4505–4524

    Article  Google Scholar 

  • Gupta DS, Biswas G (2018) Design of lattice-based elgamal encryption and signature schemes using sis problem. Trans Emerg Telecommun Technol 29(6):e3255

    Article  Google Scholar 

  • Gupta DS, Biswas G (2018) A novel and efficient lattice-based authenticated key exchange protocol in c-k model. Int J Commun Syst 31(3):e3473

    Article  Google Scholar 

  • Gupta DS, Islam SH, Obaidat MS, Vijayakumar P, Kumar N, Park Y (2020) A provably secure and lightweight identity-based two-party authenticated key agreement protocol for iiot environments. IEEE Syst J 15(2):1732–1741

    Article  Google Scholar 

  • Gupta DS, Ray S, Singh T, Kumari M (2022) Post-quantum lightweight identity-based two-party authenticated key exchange protocol for internet of vehicles with probable security. Comput Commun 181:69–79

    Article  Google Scholar 

  • He D, Kumar N, Chen J, Lee C-C, Chilamkurti N, Yeo S-S (2015) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed Syst 21(1):49–60

    Article  Google Scholar 

  • Jan MA, Khan F, Mastorakis S, Adil M, Akbar A, Stergiou N (2021) LightIoT: Lightweight and secure communication for energy-efficient IoT in health informatics. IEEE Trans Green Commun Netw

  • Kim J (2015) Energy-efficient dynamic packet downloading for medical IoT platforms. IEEE Trans Industr Inf 11(6):1653–1659

    Article  MathSciNet  Google Scholar 

  • Kumar P, Lee S-G, Lee H-J (2012) E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12(2):1625–1647

    Article  Google Scholar 

  • Kumar G, Saha R, Rai MK, Buchanan WJ, Thomas R, Geetha G, Hoon-Kim T, Rodrigues JJ (2020) A privacy-preserving secure framework for electric vehicles in IoT using matching market and signcryption. IEEE Trans Veh Technol 69(7):7707–7722

    Article  Google Scholar 

  • Li X, Niu J, Karuppiah M, Kumari S, Wu F (2016) Secure and efficient two-factor user authentication scheme with user anonymity for network based e-health care applications. J Med Syst 40(12):268

    Article  Google Scholar 

  • Li C-T, Wu T-Y, Chen C-L, Lee C-C, Chen C-M (2017) An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system. Sensors 17(7):1482

    Article  Google Scholar 

  • Lin X, Lu R, Shen X, Nemoto Y, Kato N (2009) SAGE: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE J Sel Areas Commun 27(4):365–378

    Article  Google Scholar 

  • Liu C-H, Chung Y-F (2017) Secure user authentication scheme for wireless healthcare sensor networks. Comput Electr Eng 59:250–261

    Article  Google Scholar 

  • Masud M, Gaba GS, Alqahtani S, Muhammad G, Gupta B, Kumar P, Ghoneim A (2020) A lightweight and robust secure key establishment protocol for internet of medical things in covid-19 patients care. IEEE Internet Things J

  • Micciancio D, Regev O (2007) Worst-case to average-case reductions based on gaussian measures. SIAM J Comput 37(1):267–302

    Article  MathSciNet  MATH  Google Scholar 

  • Mukherjee S, Gupta DS, Biswas GP (2019) An efficient and batch verifiable conditional privacy-preserving authentication scheme for vanets using lattice. Computing 101(12):1763–1788

    Article  MathSciNet  MATH  Google Scholar 

  • Sahu AK, Sharma S, Puthal D (2021) Lightweight multi-party authentication and key-agreement protocol in iot based e-healthcare service. ACM Trans Multimed Comput Commun Appl (TOMM)

  • Samkari H, Gutub A (2019) Protecting medical records against cybercrimes within hajj period by 3-layer security. Recent Trends Inf Technol Appl 2(3):1–21

    Google Scholar 

  • Shambour M, Gutub A (2021) Personal privacy evaluation of smart devices applications serving hajj and umrah rituals. J Eng Res

  • Shor PW (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev 41(2):303–332

    Article  MathSciNet  MATH  Google Scholar 

  • Yaacoub J-PA, Noura M, Noura HN, Salman O, Yaacoub E, Couturier R, Chehab A (2020) Securing internet of medical things systems: limitations, issues and recommendations. Futur Gener Comput Syst 105:581–606

    Article  Google Scholar 

  • Yaqoob T, Abbas H, Atiquzzaman M (2019) Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices-a review. IEEE Commun Surv Tutor 21(4):3723–3768

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daya Sagar Gupta.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gupta, D.S., Mazumdar, N., Nag, A. et al. Secure data authentication and access control protocol for industrial healthcare system. J Ambient Intell Human Comput 14, 4853–4864 (2023). https://doi.org/10.1007/s12652-022-04370-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-022-04370-2

Keywords