skip to main content
research-article

Lightweight Multi-party Authentication and Key Agreement Protocol in IoT-based E-Healthcare Service

Published: 14 June 2021 Publication History

Abstract

Internet of Things (IoT) is playing a promising role in e-healthcare applications in the recent decades; nevertheless, security is one of the crucial challenges in the current field of study. Many healthcare devices (for instance, a sensor-augmented insulin pump and heart-rate sensor) collect a user’s real-time data (such as glucose level and heart rate) and send them to the cloud for proper analysis and diagnosis of the user. However, the real-time user’s data are vulnerable to various authentication attacks while sending through an insecure channel. Besides that, the attacks may further open scope for many other subsequent attacks. Existing security mechanisms concentrate on two-party mutual authentication. However, an IoT-enabled healthcare application involves multiple parties such as a patient, e-healthcare test-equipment, doctors, and cloud servers that requires multi-party authentication for secure communication. Moreover, the design and implementation of a lightweight security mechanism that fits into the resource constraint IoT-enabled healthcare devices are challenging. Therefore, this article proposes a lightweight, multi-party authentication and key-establishment protocol in IoT-based e-healthcare service access network to counter the attacks in resource constraint devices. The proposed multi-party protocol has used a lattice-based cryptographic construct such as Identity-Based Encryption (IBE) to acquire security, privacy, and efficiency. The study provided all-round analysis of the scheme, such as security, power consumption, and practical usage, in the following ways. The proposed scheme is tested by a formal security tool, Scyther, to testify the security properties of the protocol. In addition, security analysis for various attacks and comparison with other existing works are provided to show the robust security characteristics. Further, an experimental evaluation of the proposed scheme using IBE cryptographic construct is provided to validate the practical usage. The power consumption of the scheme is also computed and compared with existing works to evaluate its efficiency.

References

[1]
Michel Abdalla, Pierre-Alain Fouque, and David Pointcheval. 2005. Password-based authenticated key exchange in the three-party setting. In Proceedings of the Annual Conference on Public Key Cryptography (PKC’05), Serge Vaudenay (Ed.). Springer, Berlin, 65–84.
[2]
Ai-fen Sui, L. C. K. Hui, S. M. Yiu, K. P. Chow, W. W. Tsang, C. F. Chong, K. H. Pun, and H. W. Chan. 2005. An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication. In Proceedings of the IEEE Wireless Communications and Networking Conference, Vol. 4. 2088–2093.
[3]
Amel Arfaoui, Ali Kribeche, and Sidi-Mohammed Senouci. 2019. Context-aware anonymous authentication protocols in the internet of things dedicated to e-health applications. Comput, Netw. 159 (2019), 23–36.
[4]
L. Babai. 1986. On Lovász’ lattice reduction and the nearest lattice point problem. Combinatorica 6, 1 (01 Mar. 1986), 1–13.
[5]
Dan Boneh and Matthew Franklin. 2003. Identity-based encryption from the weil pairing. SIAM J. Comput. 32, 3 (Mar. 2003), 586–615.
[6]
Ran Canetti and Hugo Krawczyk. 2001. Analysis of key-exchange protocols and their use for building secure channels. In Proceedings of the Annual Conference on Advances in Cryptology (EUROCRYPT’01), Birgit Pfitzmann (Ed.). Springer, Berlin, 453–474.
[7]
Sjouke Mauw Cas Cremers. 2012. Operational Semantics and Verification of Security Protocols (1st ed.). Springer-Verlag, Berlin.
[8]
Henri Cohen. 1993. Algorithms for Linear Algebra and Lattices. Springer, Berlin, 45–107.
[9]
Cas Cremers and Sjouke Mauw. 2012. Operational Semantics and Verification of Security Protocols (1 ed.). Springer-Verlag, Berlin. 174 pages.
[10]
Cas J. Cremers. 2008. The scyther tool: Verification, falsification, and analysis of security protocols. In Proceedings of the 20th International Conference on Computer Aided Verification (CAV’08). Springer-Verlag, Berlin, 414–418.
[11]
Z. Cui, F. Xue, S. Zhang, X. Cai, Y. Cao, W. Zhang, and J. Chen. 2020. A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Trans. Services Comput. 13, 2 (2020), 241–251.
[12]
D. Dolev and A. C. Yao. 1981. On the security of public key protocols. In Proceedings of the 22nd Annual Symposium on Foundations of Computer Science (SFCS’81). 350–357.
[13]
Léo Ducas, Vadim Lyubashevsky, and Thomas Prest. 2014. Efficient identity-based encryption over NTRU lattices. In Proceedings of the Annual Conference on Advances in Cryptology (ASIACRYPT’14), Palash Sarkar and Tetsu Iwata (Eds.). Springer, Berlin, 22–41.
[14]
Morris J. Dworkin. 2015. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. National Institute of Standards and Technology.
[15]
M. A. Ferrag, L. Maglaras, and A. Ahmim. 2017. Privacy-preserving schemes for ad hoc social networks: A survey. IEEE Commun. Surv. Tutor. 19, 4 (Fourthquarter 2017), 3015–3045.
[16]
Nicolas Gama and Phong Q. Nguyen. 2008. Predicting lattice reduction. In Proceedings of theAnnual Conference on Advances in Cryptology (EUROCRYPT’08), Nigel Smart (Ed.). Springer, Berlin, 31–51.
[17]
Ankur Gupta, Meenakshi Tripathi, Tabish Jamil Shaikh, and Aakar Sharma. 2019. A lightweight anonymous user authentication and key establishment scheme for wearable devices. Comput, Netw, 149 (2019), 29–42.
[18]
Yi-Kai Liu Dustin Moody Rene Peralta Ray Perlner Daniel Smith-Tone Lily Chen, Stephen Jordan. 2016. Report on Post-Quantum Cryptography. National Institute of Standards and Technology.
[19]
H. Janicke J. Jiang M. A. Ferrag, L. A. Maglaras and L. Shu. 2017. Authentication protocols for internet of things: A comprehensive survey. Secur. Commun. Netw. 1939-0114 (Fourthquarter 2017), 0–6.
[20]
Ullah Ata Mahmood Zahid, Ning Huansheng and Yao Xuanxia. 2017. Secure authentication and prescription safety protocol for telecare health services using ubiquitous IoT. Appl. Sci. 7, 10 (2017).
[21]
P. Porambage, A. Braeken, C. Schmitt, A. Gurtov, M. Ylianttila, and B. Stiller. 2015. Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications. IEEE Access 3 (2015), 1503–1511.
[22]
Deepak Puthal. 2018. Lattice-modeled information flow control of big sensing data streams for smart health application. IEEE IoT J. 6, 2 (2018), 1312–1320.
[23]
A. K. Sahu, S. Sharma, D. Puthal, A. Pandey, and R. Shit. 2017. Secure authentication protocol for IoT architecture. In Proceedings of the 2017 International Conference on Information Technology (ICIT’17). 220–224.
[24]
Adi Shamir. 1985. Identity-based cryptosystems and signature schemes. In Proceedings of the Advances in Cryptology, George Robert Blakley and David Chaum (Eds.). Springer, Berlin, 47–53.
[25]
Suraj Sharma, Shaswat Satapathy, Shivani Singh, Amiya Kumar Sahu, Mohammad S. Obaidat, Sanjay Saxena, and Deepak Puthal. 2018. Secure authentication protocol for 5G enabled IoT network. In Proceedings of the 2018 5th International Conference on Parallel, Distributed and Grid Computing (PDGC’18). IEEE, 621–626.
[26]
K. Tsai, Y. Huang, F. Leu, and I. You. 2016. TTP based high-efficient multi-key exchange protocol. IEEE Access 4 (2016), 6261–6271.
[27]
Muhammad Usman, Mian Ahmad Jan, and Deepak Puthal. 2019. PAAL: A framework based on authentication, aggregation and local differential privacy for Internet of Multimedia Things. IEEE IoT J. 7, 4 (2019), 2501–2508.
[28]
Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, and Athanasios V. Vasilakos. 2019. Design of secure key management and user authentication scheme for fog computing services. Fut. Gener. Comput. Syst. 91 (2019), 475–492.
[29]
E. K. Win, T. Yoshihisa, Y. Ishi, T. Kawakami, Y. Teranishi, and S. Shimojo. 2017. A lightweight multi-receiver encryption scheme with mutual authentication. In Proceedings of the 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC’17), Vol. 2. 491–497.
[30]
Fan Wu, Xiong Li, Arun Kumar Sangaiah, Lili Xu, Saru Kumari, Liuxi Wu, and Jian Shen. 2018. A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Fut. Gener. Comput. Syst. 82 (2018), 727–737.
[31]
Venkata Yanambaka, Saraju Mohanty, Elias Kougianos, Deepak Puthal, and Laavanya Rachakonda. 2019. PMsec: PUF-based energy-efficient authentication of devices in the Internet of Medical Things (IoMT). In Proceedings of the 2019 IEEE International Symposium on Smart Electronic Systems (iSES, Formerly iNiS’19), Vol. 15. IEEE, 420–434.
[32]
Venkata P. Yanambaka, Saraju P. Mohanty, Elias Kougianos, and Deepak Puthal. 2019. Pmsec: Physical unclonable function-based robust and lightweight authentication in the internet of medical things. IEEE Trans. Consum. Electr. 65, 3 (2019), 388–397.
[33]
Y. Zhang, F. Ren, A. Wu, T. Zhang, J. Cao, and D. Zheng. 2019. Certificateless multi-party authenticated encryption for NB-IoT terminals in 5G networks. IEEE Access 7 (2019), 114721–114730.
[34]
J. Zhou, Z. Cao, Z. Qin, X. Dong, and K. Ren. 2019. LPPA: Lightweight privacy-preserving authentication from efficient multi-key secure outsourced computation for location-based services in VANETs. IEEE Trans. Inf. Forens. Secur. 15 (2019), 420–434.

Cited By

View all
  • (2025)Lightweight 0-RTT Session Resumption Protocol for Constrained DevicesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.349779620(221-233)Online publication date: 1-Jan-2025
  • (2025)An intelligent attention based deep convoluted learning (IADCL) model for smart healthcare securityScientific Reports10.1038/s41598-024-84691-815:1Online publication date: 8-Jan-2025
  • (2025)A privacy-preserving and energy efficient authentication protocol for the cloud-based e-healthcare systemAlexandria Engineering Journal10.1016/j.aej.2025.01.051118(59-90)Online publication date: Apr-2025
  • Show More Cited By

Index Terms

  1. Lightweight Multi-party Authentication and Key Agreement Protocol in IoT-based E-Healthcare Service

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Multimedia Computing, Communications, and Applications
    ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 17, Issue 2s
    June 2021
    349 pages
    ISSN:1551-6857
    EISSN:1551-6865
    DOI:10.1145/3465440
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 June 2021
    Online AM: 07 May 2020
    Accepted: 01 May 2020
    Revised: 01 April 2020
    Received: 01 February 2020
    Published in TOMM Volume 17, Issue 2s

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Internet of Things
    2. authentication
    3. healthcare
    4. lightweight
    5. key establishment
    6. security protocol
    7. lattice-based cryptography
    8. identity-based encryption

    Qualifiers

    • Research-article
    • Refereed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)114
    • Downloads (Last 6 weeks)8
    Reflects downloads up to 03 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Lightweight 0-RTT Session Resumption Protocol for Constrained DevicesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.349779620(221-233)Online publication date: 1-Jan-2025
    • (2025)An intelligent attention based deep convoluted learning (IADCL) model for smart healthcare securityScientific Reports10.1038/s41598-024-84691-815:1Online publication date: 8-Jan-2025
    • (2025)A privacy-preserving and energy efficient authentication protocol for the cloud-based e-healthcare systemAlexandria Engineering Journal10.1016/j.aej.2025.01.051118(59-90)Online publication date: Apr-2025
    • (2024)Enhanced Authentication Protocol for Securing Internet of Medical Things with Lightweight Post-Quantum Cryptography2024 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)10.1109/IICAIET62352.2024.10730752(625-630)Online publication date: 26-Aug-2024
    • (2024)Role-Based Access Control, Secure Multi-Party Computation, and Hierarchical Identity-Based Encryption: Combining AI to Improve Mobile Healthcare Security2024 International Conference on Emerging Research in Computational Science (ICERCS)10.1109/ICERCS63125.2024.10894813(1-5)Online publication date: 12-Dec-2024
    • (2024)RELAKA: Robust ECC based Privacy Preserving Lightweight Authenticated Key Agreement protocol for healthcare applicationsEngineering Science and Technology, an International Journal10.1016/j.jestch.2024.10188759(101887)Online publication date: Nov-2024
    • (2023)OTP-Q encryption and Diffie-Hellman mutual authentication for e-healthcare data based on lightweight S-WBSN frameworkTechnology and Health Care10.3233/THC-22058831:6(2073-2090)Online publication date: 1-Jan-2023
    • (2023)Lightweight Security for IoTJournal of Intelligent & Fuzzy Systems10.3233/JIFS-23238845:4(5423-5439)Online publication date: 4-Oct-2023
    • (2023)RDH-DES: Reversible Data Hiding over Distributed Encrypted-Image Servers Based on Secret SharingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/351279719:1(1-19)Online publication date: 5-Jan-2023
    • (2023)Healthcare Applications Using Blockchain With a Cloud-Assisted Decentralized Privacy-Preserving FrameworkIEEE Transactions on Mobile Computing10.1109/TMC.2023.331551023:5(5897-5916)Online publication date: 14-Sep-2023
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media