Skip to main content

Advertisement

Log in

An Efficient and Provable Secure Certificate-Based Combined Signature, Encryption and Signcryption Scheme for Internet of Things (IoT) in Mobile Health (M-Health) System

  • Mobile & Wireless Health
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

Mobile health (M-Health) system is the remote form of Wireless Body Area Networks (WBAN), which can be used for collecting patient’s health data in real-time with mobile devices, and storing it to the network servers. The data can be accessed by doctors to monitor, diagnosed and treat patients through a variety of techniques and technologies. The main advantage of the M-Health system is the ease of time-independent communication from physically distant places that enhances the quality of healthcare services at a reduced cost. Furthermore, to provide faster access to the treatment of patients, an M-Health system can be integrated with the internet of things (IoT) to offer preventive or proactive healthcare services by connecting devices and persons. However, its equally great drawback lies in transmitting and receiving the health information wirelessly through an open wireless medium that offers different security and privacy violation threats. We aim to address such a deficiency, and thus a new scheme called an efficient and provable secure certificate-based combined signature, encryption and signcryption (CBCSES) scheme, has been proposed in this article. The scheme not only obtains encryption and signcryption but also provides encryption or signature model alone when needed. To show the effectiveness of the proposed scheme, detailed security analyses, i.e. indistinguishable under adaptive chosen-ciphertext attacks (IND-CBCSES-CCA) and unforgeable under adaptive chosen message attacks (EUF-CBCSES-CMA), and the comparisons with relevant existing schemes are carried out. The results obtained authenticate the superiority of our scheme in terms of both computation and communication costs with enhanced security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. S. Vitabile, M. Marks, D. Stojanovic, S. Pllana, J.M. Molina, M. Krzyszton & A.S. Ilic. Medical data processing and analysis for remote health and activities monitoring. In High-Performance Modelling and Simulation for Big Data Applications, Springer, Cham. 2019, pp. 186-220.

    Google Scholar 

  2. Q. Jiang, Z. Chen, J. Ma, X. Ma, J. Shen and D. Wu, “Optimized Fuzzy Commitment based Key Agreement Protocol for Wireless Body Area Network,” in IEEE Transactions on Emerging Topics in Computing, https://doi.org/10.1109/TETC.2019.2949137.

  3. S. Zou, Y. Xu, H. Wang, Z. Li, S. Chen, and B. Hu, “A Survey on Secure Wireless Body Area Networks,” Secur. Commun. networks, vol. 2017, pp. 1–9, 2011

    Google Scholar 

  4. S. Chaudhary, A. Singh, C. Kakali. Wireless Body Sensor Network (WBSN) Security and Privacy Issues: A Survey; Int. Jour. of Comp. Int. & IoT, 2 2019.

  5. X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, Sage: a strong privacy preserving scheme against global eavesdropping for ehealth systems, IEEE J. Sel. Areas Commun., 2009, vol. 27, no. 4, pp. 365–378

    Article  Google Scholar 

  6. Jiang, Q., Huang, X., Zhang, N., Zhang, K., Ma, X., & Ma, J.. Shake to Communicate: Secure Handshake Acceleration-based Pairing Mechanism for Wrist Worn Devices. IEEE Internet of Things Journal, 1–1. doi:https://doi.org/10.1109/jiot.2019.2904177 (2019)

  7. V. D. Ta, C.-M. Liu, and G. W. Nkabinde, “Big data stream computing in healthcare real-time analytics,” in 2016 IEEE Intl Conf. on Cloud Comput. and Big Data Analysis (ICCCBDA), pp. 37 2016.

  8. Li, X., Niu, J., Kumari, S., Wu, F., & Choo, K.-K. R. (2018). A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city. Future Generation Computer Systems, 83, 607–618. doi:https://doi.org/10.1016/j.future.2017.04.012

    Article  Google Scholar 

  9. Li, X., Niu, J.-W., Ma, J., Wang, W.-D., & Liu, C.-L. (2011). Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 34(1), 73–79. doi:https://doi.org/10.1016/j.jnca.2010.09.003

    Article  CAS  Google Scholar 

  10. Li, X., Ma, J., Wang, W., Xiong, Y., & Zhang, J. (2013). A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Mathematical and Computer Modelling, 58(1-2), 85–95. doi:https://doi.org/10.1016/j.mcm.2012.06.033

    Article  Google Scholar 

  11. Y. Zheng, Digital signcryption or how to achieve cost (signature& encryption) << cost (signature) + cost (encryption), in Proc. of the Annu. Int. Cryptol. Conf. Springer, pp. 165–179 1997.

  12. Y. Han, X. Yang, P. Wei, Y. Wang, and Y. Hu, “ECGSC: Elliptic Curve Based Generalized Signcryption,” in Ubiquitous Intelligence and Computing, Third International Conference, vol. 4159 of Lecture Notes in Computer Science, Springer pp. 956–965 2006.

  13. H. Chen, S. Chen, H. Xu, and H. Hu, A Security Scheme of 5G Ultradense Network Based on the Implicit Certificate, Wireless Communications and Mobile Computing. 2018, 8562904, 11.

    Google Scholar 

  14. N.C. Kumar, A. Basit, P. Singh, and V.C. Venkaiah, Lightweight Cryptography for Distributed PKI Based MANETS, International Journal of Computer Networks & Communications, 2018, 10, 2.

    Google Scholar 

  15. S. Ullah, L. Marcenaro. and B. Rinner, Secure Smart Cameras by Aggregate-Signcryption with Decryption Fairness for Multi-Receiver IoT Applications. Sensors, 2019, 19, 2.

    Article  Google Scholar 

  16. A. Shamir. Identity-based cryptosystems and signature schemes,” in Proc. of the CRYPTO 1984, Santa Barbara, CA, USA, pp. 19–23 1984.

  17. P. Kumar, S. Kumari, V. Sharma, A. K. Sangaiah, J. Wei, and X. Li, A certificateless aggregate signature scheme for healthcare wireless sensor network, Sustainable Computing: Informatics and Systems, 2018 vol. 18, pp. 80–89.

    Google Scholar 

  18. P. Kumar, S. Kumari, V. Sharma, X. Li, A. K. Sangaiah, and S. H. Islam, “Secure cls and cl-as schemes designed for vanets, The Journal of Supercomputing, pp. 1–23 2019.

  19. S.S. Al-Riyami, and K.G. Paterson, “Certificateless public key cryptography,” in Advances in CryptologyASIACRYPT, vol. 2894 of Lecture Notes in Computer Science, Springer, pp. 452–473 2003.

  20. C. Gentry, Certificate-based encryption and the certificate revocation problem.Advances in Cryptology | EUROCRYPT, LNCS 2656. Springer, 272{293 2003.

  21. Zhou, C., Gao, G., Cui, Z., & Zhao, Z. Certificate-Based Generalized Ring Signcryption Scheme. International Journal of Foundations of Computer Science, 2018, 29(06), 1063–1088.

    Article  Google Scholar 

  22. A. Braeken, Pairing Free Certificate Based Signcryption Schemes Using ECQV Implicit Certificates. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 13, NO. 3 2019.

  23. M. Suárez-Albela, P. Fraga-Lamas, and T.M. Fernández-Caramés. A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices, Sensors, 2018, 18, 11.

    Article  Google Scholar 

  24. M. Yu, J. Zhang, J. Wang, J. Gao, T. Xu, R. Deng, Y. Zhang, and R. Yu. Internet of Things security and privacy-preserving method through nodes differentiation, concrete cluster centers, multi-signature, and blockchain. International Journal of Distributed Sensor Networks, 2018, 14, 12.

    Google Scholar 

  25. S. S. Ullah et al., “A Lightweight Identity-Based Signature Scheme for Mitigation of Content Poisoning Attack in Named Data Networking With Internet of Things,” IEEE Access, vol. 8, pp. 98910-98928, 2020, https://doi.org/10.1109/ACCESS.2020.2995080.

    Article  Google Scholar 

  26. S. Hussain et al., “A Lightweight and Formally Secure Certificate Based Signcryption With Proxy Re-Encryption (CBSRE) for Internet of Things Enabled Smart Grid,” IEEE Access, vol. 8, pp. 93230-93248, 2020, https://doi.org/10.1109/ACCESS.2020.2994988.

    Article  Google Scholar 

  27. S. Kumari, M. Karuppiah, A.K. Das, X. Li, F. Wu, and N. Kumar. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. The Journal of Supercomputing, 2017, 74, 12

    Google Scholar 

  28. A. Omala, A. Mbandu, K. Mutiria, C. Jin, and F. Li. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network. Journal of Medical Systems, 2018, 42, 6.

    Article  Google Scholar 

  29. V.S. Naresh, R. Sivaranjani, N.V.E.S Murthy, “Provable secure lightweight hyper elliptic curve-based communication system for wireless sensor networks. International Journal of Communication Systems, 2018, 31, 15.

    Article  Google Scholar 

  30. A. Rahman, I. Ullah, M. Naeem, R. Anwar, H. Khattak, and S. Ullah. A Lightweight Multi-Message and Multi-Receiver Heterogeneous Hybrid Signcryption Scheme based on Hyper Elliptic Curve, International Journal of Advanced Computer Science and Applications, 2018, 9, 5.

    Article  Google Scholar 

  31. H. Ji, W. Han, and Z. Long . “Certificateless generalized signcryption.” Physics Procedia , 2012, 33.

  32. P. Kushwah, and S. Lal. Provable secure certificateless generalized signcryption scheme, Technology & Applications,3.3 2012

  33. C. Zhou, Z. Wan , and D. Xiwei. Provable certificateless generalized signcryption scheme, Designs, codes and cryptography, 71.2 2014.

  34. A.Q. Zhang, L.Wang, X.R. Ye . Light-weight and robust security-aware D2D-assist data transmission protocol for mobile-health systems. IEEE T Inf Foren Sec , 2017, 12(3): 662–675.

    Article  Google Scholar 

  35. C. Zhou, Z. Zhao, W. Zhou, & Y. Mei. Certificateless key-insulated generalized signcryption scheme without bilinear pairings. Security and Communication Networks, 2017.

  36. B. Zhang, J. Zhongtian, and Z. Chuan . An efficient Certificateless generalized Signcryption scheme. Security and Communication Networks, 2018.

  37. C. Zhou. An improved lightweight certificateless generalized signcryption scheme for mobile-health system, International Journal of Distributed Sensor Networks, 2019, 15.1.

  38. A. Waheed, J. Iqbal, N. Din, S.Ul, A. Iqbal, and N.U. Amin. Improved Cryptanalysis of Provable Certificateless Generalized Signcryption. Int. J. Adv. Comput. Sci. Appl, 10 2019.

  39. A. Karati, F. Chun. and H. R. Hau. Provably Secure and Generalized Signcryption with Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices, IEEE Internet of Things Journal, 2019

  40. M. Barbosa , P. Farshim. Certificateless signcryption. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS ‘08), 2008.

  41. S. Patonico, P. Shabisha, A. Braeken, A. Touhafi & Steenhaut, K. Elliptic curve-based proxy re- signcryption scheme for secure data storage on the cloud. Concurrency and Computation: Practice and Experience, doi:https://doi.org/10.1002/cpe.5657 2020

  42. I. Ullah, N.U. Amin, M. Zareei, A. Zeb, H. Khattak, A. Khan, and S. Goudarzi. A Lightweight and Provable Secured Certificateless Signcryption Approach for Crowdsourced IIoT Applications, Symmetry, 2019, 11, 11, 1386.

    Article  Google Scholar 

  43. I. Ullah, A. Alomari, N.U. Amin, M.A. Khan, and H. Khattak. An Energy Efficient and Formally Secured Certificate-Based Signcryption for Wireless Body Area Networks with the Internet of Things, Electronics, 2019, 8, no. 10, 1171.

    Article  Google Scholar 

  44. Khan, M.A.; Qureshi, I.M.; Ullah, I.; Khan, S.; Khanzada, F.; Noor, F. An Efficient and Provably Secure Certificateless Blind Signature Scheme for Flying Ad-Hoc Network Based on Multi-Access Edge Computing. Electronics 2020, 9, 30.

    Article  Google Scholar 

  45. I. Ullah, N.U.Amin, M. Naeem, H. Khattak, S.J. Khattak, & H. Ali. A Novel Provable Secured Signcryption Scheme????: A Hyper-Elliptic Curve-Based Approach. Mathematics, 2019, 7(8), 686.

    Article  Google Scholar 

  46. Khan M.A et al., “An Efficient and Provably Secure Certificateless Key-Encapsulated Signcryption Scheme for Flying Ad-hoc Network,” IEEE Access, vol. 8, pp. 36807-36828, 2020.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saru Kumari.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ullah, I., Amin, N.U., Khan, M.A. et al. An Efficient and Provable Secure Certificate-Based Combined Signature, Encryption and Signcryption Scheme for Internet of Things (IoT) in Mobile Health (M-Health) System. J Med Syst 45, 4 (2021). https://doi.org/10.1007/s10916-020-01658-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-020-01658-8

Keywords

Navigation