skip to main content
research-article

A Multifactor Ring Signature based Authentication Scheme for Quality Assessment of IoMT Environment in COVID-19 Scenario

Published: 22 June 2023 Publication History

Abstract

The quality of the healthcare environment has become an essential factor for healthcare users to access quality services. Smart healthcare systems use the Internet of Medical Things (IoMT) devices to capture patients’ health data for treatment or diagnostic purposes. This sensitive collected patient data is shared between the different stakeholders across the network to provide quality services. Due to this, healthcare systems are vulnerable to confidentiality, integrity and privacy threats. In the COVID-19 scenario, when collaborative medical consultation is required, the quality assessment of the framework is essential to protect the privacy of doctors and patients. In this paper, a ring signature-based anonymous authentication and quality assessment scheme is designed for collaborative medical consultation environments for quality assessment and protection of the privacy of doctors and patients. This scheme also uses a new KMOV Cryptosystem to ensure the quality of the network and protect the system from different attacks that hamper data confidentiality.

References

[1]
Ruhul Amin and G. P. Biswas. 2016. A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Networks 36 (2016), 58–80.
[2]
Danilo Ardagna, Cinzia Cappiello, Walter Samá, and Monica Vitali. 2018. Context-aware data quality assessment for big data. Future Generation Computer Systems 89 (2018), 548–562.
[3]
Carlo Batini, Cinzia Cappiello, Chiara Francalanci, and Andrea Maurino. 2009. Methodologies for data quality assessment and improvement. ACM Computing Surveys (CSUR) 41, 3 (2009), 1–52.
[4]
Maher Boudabra and Abderrahmane Nitaj. 2018. A new generalization of the KMOV cryptosystem. Journal of Applied Mathematics and Computing 57, 1 (2018), 229–245.
[5]
Maher Boudabra and Abderrahmane Nitaj. 2019. A new public key cryptosystem based on Edwards curves. Journal of Applied Mathematics and Computing 61, 1 (2019), 431–450.
[6]
Sravani Challa, Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Alavalapati Goutham Reddy, Eun-Jun Yoon, and Kee-Young Yoo. 2017. Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 5 (2017), 3028–3043.
[7]
Anna Challoner and Gheorghe H. Popescu. 2019. Intelligent sensing technology, smart healthcare services, and Internet of Medical Things-based diagnosis. American Journal of Medical Research 6, 1 (2019), 13–18.
[8]
Kakali Chatterjee. 2020. An improved authentication protocol for wireless body sensor networks applied in healthcare applications. Wireless Personal Communications 111, 4 (2020), 2605–2623.
[9]
Kakali Chatterjee et al. 2019. Continuous user authentication system: A risk analysis based approach. Wireless Personal Communications 108, 1 (2019), 281–295.
[10]
Kakali Chatterjee and Daya Gupta. 2009. Secure access of smart cards using elliptic curve cryptosystems. In 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing. IEEE, 1–4.
[11]
Kakali Chatterjee, Daya Gupta, and Asok De. 2013. A framework for development of secure software. CSI Transactions on ICT 1, 2 (2013), 143–157.
[12]
Shehzad Ashraf Chaudhry, Khalid Mahmood, Husnain Naqvi, and Muhammad Khurram Khan. 2015. An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography. Journal of Medical Systems 39, 11 (2015), 1–12.
[13]
Zhenfei Chen, Tianqing Zhu, Ping Xiong, Chenguang Wang, and Wei Ren. 2021. Privacy preservation for image data: A GAN-based method. International Journal of Intelligent Systems 36, 4 (2021), 1668–1685.
[14]
George W. Clark, Michael V. Doran, and Todd R. Andel. 2017. Cybersecurity issues in robotics. In 2017 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA’17). IEEE, 1–5.
[15]
Ashok Kumar Das. 2015. A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems. Journal of Medical Systems 39, 3 (2015), 1–20.
[16]
Ashok Kumar Das and Bezawada Bruhadeshwar. 2013. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. Journal of Medical Systems 37, 5 (2013), 1–17.
[17]
Justin A. DeSimone and P. D. Harms. 2018. Dirty data: The effects of screening respondents who provide low-quality data in survey research. Journal of Business and Psychology 33, 5 (2018), 559–577.
[18]
Taher ElGamal. 1985. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31, 4 (1985), 469–472.
[19]
Levent Eriskin, Mumtaz Karatas, and Yu-Jun Zheng. 2022. A robust multi-objective model for healthcare resource management and location planning during pandemics. Annals of Operations Research (2022), 1–48.
[20]
Moneer Fakroon, Mohammed Alshahrani, Fayez Gebali, and Issa Traore. 2020. Secure remote anonymous user authentication scheme for smart home environment. Internet of Things 9 (2020), 100158.
[21]
Murat M. Gunal and Mumtaz Karatas. 2019. Industry 4.0, digitisation in manufacturing, and simulation: A review of the literature. Simulation for Industry 4.0 (2019), 19–37.
[22]
Cheng Guo and Chin-Chen Chang. 2013. Chaotic maps-based password-authenticated key agreement using smart cards. Communications in Nonlinear Science and Numerical Simulation 18, 6 (2013), 1433–1440.
[23]
Jigna J. Hathaliya and Sudeep Tanwar. 2020. An exhaustive survey on security and privacy issues in Healthcare 4.0. Computer Communications 153 (2020), 311–335.
[24]
Debiao He, Sherali Zeadally, Neeraj Kumar, and Jong-Hyouk Lee. 2016. Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal 11, 4 (2016), 2590–2601.
[25]
Bernd Heinrich, Diana Hristova, Mathias Klier, Alexander Schiller, and Michael Szubartowicz. 2018. Requirements for data quality metrics. Journal of Data and Information Quality (JDIQ) 9, 2 (2018), 1–32.
[26]
Sheetal Kalra and Sandeep K. Sood. 2015. Secure authentication scheme for IoT and cloud servers. Pervasive and Mobile Computing 24 (2015), 210–223.
[27]
Mumtaz Karatas, Levent Erişkin, and Elif Bozkaya. 2022. Transportation and location planning during epidemics/pandemics: Emerging problems and solution approaches. IEEE Transactions on Intelligent Transportation Systems (2022).
[28]
Mumtaz Karatas, Levent Eriskin, Muhammet Deveci, Dragan Pamucar, and Harish Garg. 2022. Big data for healthcare industry 4.0: Applications, challenges and future perspectives. Expert Systems with Applications (2022), 116912.
[29]
Marwa Keshk, Nour Moustafa, Elena Sitnikova, and Gideon Creech. 2017. Privacy preservation intrusion detection technique for SCADA systems. In 2017 Military Communications and Information Systems Conference (MilCIS’17). IEEE, 1–6.
[30]
Sumanta Kuila, Namrata Dhanda, Subhankar Joardar, Sarmistha Neogy, and Jayanta Kuila. 2019. A generic survey on medical big data analysis using Internet of Things. In First International Conference on Artificial Intelligence and Cognitive Computing. Springer, 265–276.
[31]
J. Sathish Kumar and Dhiren R. Patel. 2014. A survey on Internet of Things: Security and privacy issues. International Journal of Computer Applications 90, 11 (2014).
[32]
Saru Kumari, Marimuthu Karuppiah, Ashok Kumar Das, Xiong Li, Fan Wu, and Neeraj Kumar. 2018. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. The Journal of Supercomputing 74, 12 (2018), 6428–6453.
[33]
Mayank Kumar Kundalwal, Kakali Chatterjee, and Ashish Singh. 2019. An improved privacy preservation technique in health-cloud. ICT Express 5, 3 (2019), 167–172.
[34]
Abdullah Lakhan, Qurat-Ul-Ain Mastoi, Mohamed Elhoseny, Muhammad Suleman Memon, and Mazin Abed Mohammed. 2021. Deep neural network-based application partitioning and scheduling for hospitals and medical enterprises using IoT assisted mobile fog cloud. Enterprise Information Systems (2021), 1–23.
[35]
Abdullah Lakhan, Mazin Abed Mohammed, Sergei Kozlov, and Joel J. P. C. Rodrigues. 2021. Mobile-fog-cloud assisted deep reinforcement learning and blockchain-enable IoMT system for healthcare workflows. Transactions on Emerging Telecommunications Technologies (2021), e4363.
[36]
Abdullah Lakhan, Mazin Abed Mohammed, Ahmed N. Rashid, Seifedine Kadry, Thammarat Panityakul, Karrar Hameed Abdulkareem, and Orawit Thinnukool. 2021. Smart-contract aware ethereum and client-fog-cloud healthcare system. Sensors 21, 12 (2021), 4093.
[37]
Tian-Fu Lee, I-Pin Chang, Tsung-Hung Lin, and Ching-Cheng Wang. 2013. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system. Journal of Medical Systems 37, 3 (2013), 1–7.
[38]
Ming Li, Shucheng Yu, Wenjing Lou, and Kui Ren. 2010. Group device pairing based secure sensor association and key management for body area networks. In 2010 Proceedings IEEE INFOCOM. IEEE, 1–9.
[39]
Han-Yu Lin. 2015. Improved chaotic maps-based password-authenticated key agreement using smart cards. Communications in Nonlinear Science and Numerical Simulation 20, 2 (2015), 482–488.
[40]
Yanrong Lu, Lixiang Li, Haipeng Peng, and Yixian Yang. 2015. An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. Journal of Medical Systems 39, 3 (2015), 1–8.
[41]
Sophie McFarland, Anne Coufopolous, and Deborah Lycett. 2021. The effect of telehealth versus usual care for home-care patients with long-term conditions: A systematic review, meta-analysis and qualitative synthesis. Journal of Telemedicine and Telecare 27, 2 (2021), 69–87.
[42]
Dheerendra Mishra. 2015. On the security flaws in ID-based password authentication schemes for telecare medical information systems. Journal of Medical Systems 39, 1 (2015), 1–16.
[43]
Dheerendra Mishra, Sourav Mukhopadhyay, Saru Kumari, Muhammad Khurram Khan, and Ankita Chaturvedi. 2014. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. Journal of Medical Systems 38, 5 (2014), 1–11.
[44]
Robert Mitchell and Ing-Ray Chen. 2014. A survey of intrusion detection techniques for cyber-physical systems. ACM Computing Surveys (CSUR) 46, 4 (2014), 1–29.
[45]
Mazin Abed Mohammed, Dheyaa Ahmed Ibrahim, Karrar Hameed Abdulkareem, et al. 2021. Bio-inspired robotics enabled schemes in blockchain-fog-cloud assisted IoMT environment. Journal of King Saud University-Computer and Information Sciences (2021).
[46]
Hilal Nuha, Bo Liu, M. Mohandes, and Ali Al-Shaikhi. 2022. A weighted metric for semi-blind seismic data quality assessment. In Conference of the Arabian Journal of Geosciences. Springer, 265–268.
[47]
Pawani Porambage, Corinna Schmitt, Pardeep Kumar, Andrei Gurtov, and Mika Ylianttila. 2014. Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In 2014 IEEE Wireless Communications and Networking Conference (WCNC’14). IEEE, 2728–2733.
[48]
Aaron Pulver, Ran Wei, and Clay Mann. 2016. Locating AED enabled medical drones to enhance cardiac arrest response times. Prehospital Emergency Care 20, 3 (2016), 378–389.
[49]
Majid Rafiei and Wil M. P. van der Aalst. 2021. Group-based privacy preservation techniques for process mining. Data & Knowledge Engineering 134 (2021), 101908.
[50]
Mohammadreza Rahimpour, Nigel H. Lovell, Branko G. Celler, and John McCormick. 2008. Patients’ perceptions of a home telecare system. International Journal of Medical Informatics 77, 7 (2008), 486–498.
[51]
P. Ram Mohan Rao, S. Murali Krishna, and A. P. Siva Kumar. 2018. Privacy preservation techniques in big data analytics: A survey. Journal of Big Data 5, 1 (2018), 1–12.
[52]
Ronald L. Rivest, Adi Shamir, and Leonard Adleman. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (1978), 120–126.
[53]
Nazish Saeed, Mirfa Manzoor, and Pouria Khosravi. 2020. An exploration of usability issues in telecare monitoring systems and possible solutions: A systematic literature review. Disability and Rehabilitation: Assistive Technology 15, 3 (2020), 271–281.
[54]
Fendy Santoso and Stephen J. Redmond. 2015. Indoor location-aware medical systems for smart homecare and telehealth monitoring: State-of-the-art. Physiological Measurement 36, 10 (2015), R53.
[55]
Joyce Sensmeier. 2017. Harnessing the power of artificial intelligence. Nursing Management 48, 11 (2017), 14–19.
[56]
Dylan Sey. 2018. A survey on authentication methods for the Internet of Things. PeerJ Preprints 6 (2018), e26474v2.
[57]
Inc. Synopsys. 2017. Synopsys and Ponemon Study Highlights Critical Security Deficiencies in Medical Devices. https://www.prnewswire.com/news-releases/synopsys-and-ponemon-study-highlights-critical-security-deficiencies-in-medical-devices-300463669.html.
[58]
Michal Trnka, Tomas Cerny, and Nathaniel Stickney. 2018. Survey of authentication and authorization for the Internet of Things. Security and Communication Networks 2018 (2018).
[59]
Muhamed Turkanović, Boštjan Brumen, and Marko Hölbl. 2014. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Networks 20 (2014), 96–112.
[61]
Krishna K. Venkatasubramanian, Ayan Banerjee, and Sandeep Kumar S. Gupta. 2009. PSKA: Usable and secure key agreement scheme for body area networks. IEEE Transactions on Information Technology in Biomedicine 14, 1 (2009), 60–68.
[62]
Ding Wang, Xizhe Zhang, Zijian Zhang, and Ping Wang. 2020. Understanding security failures of multi-factor authentication schemes for multi-server environments. Computers & Security 88 (2020), 101619.
[63]
Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Mauro Conti, and Minho Jo. 2017. Design of secure user authenticated key management protocol for generic IoT networks. IEEE Internet of Things Journal 5, 1 (2017), 269–282.
[64]
Zhen-Yu Wu, Yueh-Chun Lee, Feipei Lai, Hung-Chang Lee, and Yufang Chung. 2012. A secure authentication scheme for telecare medicine information systems. Journal of Medical Systems 36, 3 (2012), 1529–1535.
[65]
Lei Xu, Chunxiao Jiang, Yan Chen, Jian Wang, and Yong Ren. 2016. A framework for categorizing and applying privacy-preservation techniques in big data mining. Computer 49, 2 (2016), 54–62.
[66]
Kaiping Xue, Peilin Hong, and Changsha Ma. 2014. A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J. Comput. System Sci. 80, 1 (2014), 195–206.
[67]
Jean-Paul A. Yaacoub, Mohamad Noura, Hassan N. Noura, Ola Salman, Elias Yaacoub, Raphaël Couturier, and Ali Chehab. 2020. Securing Internet of Medical Things systems: Limitations, issues and recommendations. Future Generation Computer Systems 105 (2020), 581–606.
[68]
Bruno Bogaz Zarpelão, Rodrigo Sanches Miani, Cláudio Toshio Kawakani, and Sean Carlisto de Alvarenga. 2017. A survey of intrusion detection in Internet of Things. Journal of Network and Computer Applications 84 (2017), 25–37.
[69]
Lei Zhang, Shui Yu, Di Wu, and Paul Watters. 2011. A survey on latest botnet attack and defense. In 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 53–60.
[70]
Liping Zhang, Shaohui Zhu, and Shanyu Tang. 2016. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE Journal of Biomedical and Health Informatics 21, 2 (2016), 465–475.
[71]
Yanping Zhang, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang, and Hongmei Deng. 2012. A survey of cyber crimes. Security and Communication Networks 5, 4 (2012), 422–437.

Cited By

View all
  • (2024)Lattice-based ring signcryption scheme for smart healthcare managementCluster Computing10.1007/s10586-024-04611-327:10(14131-14148)Online publication date: 1-Dec-2024
  • (2023)Federated Learning-Based Lightweight Two-Factor Authentication Framework with Privacy Preservation for Mobile Sink in the Social IoMTElectronics10.3390/electronics1205125012:5(1250)Online publication date: 5-Mar-2023
  • (2023)Beyond Basic Trust: Envisioning the Future of NextGen Networked Systems and Digital Signatures2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)10.1109/TPS-ISA58951.2023.00041(267-276)Online publication date: 1-Nov-2023
  • Show More Cited By

Index Terms

  1. A Multifactor Ring Signature based Authentication Scheme for Quality Assessment of IoMT Environment in COVID-19 Scenario

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Journal of Data and Information Quality
        Journal of Data and Information Quality  Volume 15, Issue 2
        June 2023
        363 pages
        ISSN:1936-1955
        EISSN:1936-1963
        DOI:10.1145/3605909
        Issue’s Table of Contents

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 22 June 2023
        Online AM: 20 January 2023
        Accepted: 27 October 2022
        Revised: 02 September 2022
        Received: 22 February 2022
        Published in JDIQ Volume 15, Issue 2

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Quality assessment
        2. Internet of Medical Things
        3. smart card
        4. elliptic curve
        5. mutual authentication
        6. data security
        7. ring signature

        Qualifiers

        • Research-article

        Funding Sources

        • Japan Society for the Promotion of Science (JSPS) Grants-in-Aid for Scientific Research (KAKENHI)

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)136
        • Downloads (Last 6 weeks)16
        Reflects downloads up to 20 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Lattice-based ring signcryption scheme for smart healthcare managementCluster Computing10.1007/s10586-024-04611-327:10(14131-14148)Online publication date: 1-Dec-2024
        • (2023)Federated Learning-Based Lightweight Two-Factor Authentication Framework with Privacy Preservation for Mobile Sink in the Social IoMTElectronics10.3390/electronics1205125012:5(1250)Online publication date: 5-Mar-2023
        • (2023)Beyond Basic Trust: Envisioning the Future of NextGen Networked Systems and Digital Signatures2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)10.1109/TPS-ISA58951.2023.00041(267-276)Online publication date: 1-Nov-2023
        • (2023)Investigating novel machine learning based intrusion detection models for NSL-KDD data sets2023 International Conference on IT and Industrial Technologies (ICIT)10.1109/ICIT59216.2023.10335831(1-6)Online publication date: 9-Oct-2023
        • (2023)Blockchain-Integrated Security for Real-Time Patient Monitoring in the Internet of Medical Things Using Federated LearningIEEE Access10.1109/ACCESS.2023.332615511(117826-117850)Online publication date: 2023

        View Options

        Login options

        Full Access

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Full Text

        View this article in Full Text.

        Full Text

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media