ECC-based lightweight authentication and access control scheme for IoT E-healthcare
نویسندگان
چکیده
The E-healthcare system has a complex architecture, diverse business types, and sensitive data security. To meet the secure communication access control requirements in user–medical server, user–patient, patient–medical other scenarios system, efficient authenticated key agreement authorization scheme need to be studied. However, existing multi-server solutions do not consider authentication of Wireless Body Area Network (WBAN) are suitable for server scenarios; most WBAN schemes single-server type, which difficult applications, study user–patient real-time received due attention. This work first reveals structural flaws security vulnerabilities typical then proposes an architecture multiple with separate management designs novel ECC-based multi-factor remote using physically unclonable function (PUF) hash. Security analysis efficiency show that new achieved improved functionality higher while maintaining low computational overhead.
منابع مشابه
Some observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)
Over the last years, the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. Security and efficiency could be the main challenges of that communication. On the other hand, authenticity and confidentiality are two important goals to provide desired security in an information system, including IoT-based applications. An Authentication an...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملA Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to reveal their identities while using some privacy-related services such as location information, printing, browsing web pages, etc. In addition, we should consider lightweight cryptographic protocols because UCE can be co...
متن کاملAttribute-Based Access Control Scheme in Federated IoT Platforms
The Internet of Things (IoT) introduced the possibility to connect electronic things from everyday life to the Internet, while making them ubiquitously available. With advanced IoT services, based on a trusted federation among heterogeneous IoT platforms, new security problems (including authentication and authorization) emerge. This contribution aims at describing the main facets of the prelim...
متن کاملAn Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare
Wireless sensor networks (WSNs) will play an active role in the 21th Century Healthcare IT to reduce the healthcare cost and improve the quality of care. The protection of data confidentiality and patient privacy are the most critical requirements for the ubiquitous use of WSNs in healthcare environments. This requires a secure and lightweight user authentication and access control. Symmetric k...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Soft Computing
سال: 2021
ISSN: ['1433-7479', '1432-7643']
DOI: https://doi.org/10.1007/s00500-021-06512-8