iZKP-AKA:用于可持续医疗保健的安全和改进的ZKP-AKA协议

IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Computers & Electrical Engineering Pub Date : 2024-11-30 DOI:10.1016/j.compeleceng.2024.109886
Shubham Kumar , Kanhaiya Kumar , Abhishek Anand , Awaneesh Kumar Yadav , Manoj Misra , An Braeken
{"title":"iZKP-AKA:用于可持续医疗保健的安全和改进的ZKP-AKA协议","authors":"Shubham Kumar ,&nbsp;Kanhaiya Kumar ,&nbsp;Abhishek Anand ,&nbsp;Awaneesh Kumar Yadav ,&nbsp;Manoj Misra ,&nbsp;An Braeken","doi":"10.1016/j.compeleceng.2024.109886","DOIUrl":null,"url":null,"abstract":"<div><div>The use of IoT in healthcare has undoubtedly brought many significant adaptations and benefits that changed medical facilities. However, the possibility of unauthorized access to private medical data is a serious issue that requires appropriate attention to protect the user’s privacy. Recently, a proposed scheme by Gurjot et al. suggested an authentication mechanism to provide anonymity and other security characteristics. We did the security analysis and informally proved that their scheme is prone to various attacks, such as failure to offer perfect forward secrecy, ephemeral secret leakage, traceability, replay, stolen device attacks, and also face desynchronization issues. These issues make the proposed scheme unsuitable for the healthcare system. Therefore, there is an impelling need to design an authentication mechanism that can restrict the attacker from getting any sensitive information. Considering the above requirements, we present a novel Zero Knowledge Proof based Authenticated Key Agreement (ZKP-AKA) protocol. The security of our proposed authentication mechanism is examined using the informal (non-mathematical) and formal (Scyther tool) security verification to confirm that the proposed protocol offers the prominent security features mentioned above. We also measure the performance to show that our proposed mechanism is suitable for IoT devices in the healthcare intelligent system by doing a comparative analysis with its competitors in terms of communication, computational, message exchange and energy consumption costs.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"122 ","pages":"Article 109886"},"PeriodicalIF":4.0000,"publicationDate":"2024-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"iZKP-AKA: A secure and improved ZKP-AKA protocol for sustainable healthcare\",\"authors\":\"Shubham Kumar ,&nbsp;Kanhaiya Kumar ,&nbsp;Abhishek Anand ,&nbsp;Awaneesh Kumar Yadav ,&nbsp;Manoj Misra ,&nbsp;An Braeken\",\"doi\":\"10.1016/j.compeleceng.2024.109886\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The use of IoT in healthcare has undoubtedly brought many significant adaptations and benefits that changed medical facilities. However, the possibility of unauthorized access to private medical data is a serious issue that requires appropriate attention to protect the user’s privacy. Recently, a proposed scheme by Gurjot et al. suggested an authentication mechanism to provide anonymity and other security characteristics. We did the security analysis and informally proved that their scheme is prone to various attacks, such as failure to offer perfect forward secrecy, ephemeral secret leakage, traceability, replay, stolen device attacks, and also face desynchronization issues. These issues make the proposed scheme unsuitable for the healthcare system. Therefore, there is an impelling need to design an authentication mechanism that can restrict the attacker from getting any sensitive information. Considering the above requirements, we present a novel Zero Knowledge Proof based Authenticated Key Agreement (ZKP-AKA) protocol. The security of our proposed authentication mechanism is examined using the informal (non-mathematical) and formal (Scyther tool) security verification to confirm that the proposed protocol offers the prominent security features mentioned above. We also measure the performance to show that our proposed mechanism is suitable for IoT devices in the healthcare intelligent system by doing a comparative analysis with its competitors in terms of communication, computational, message exchange and energy consumption costs.</div></div>\",\"PeriodicalId\":50630,\"journal\":{\"name\":\"Computers & Electrical Engineering\",\"volume\":\"122 \",\"pages\":\"Article 109886\"},\"PeriodicalIF\":4.0000,\"publicationDate\":\"2024-11-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers & Electrical Engineering\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0045790624008127\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Electrical Engineering","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0045790624008127","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

摘要

在医疗保健中使用物联网无疑带来了许多重大的适应和好处,改变了医疗设施。然而,未经授权访问私人医疗数据的可能性是一个严重的问题,需要适当注意以保护用户的隐私。最近,Gurjot等人提出的方案提出了一种身份验证机制,以提供匿名性和其他安全特性。我们做了安全分析并非正式地证明了他们的方案容易受到各种攻击,例如无法提供完美的前向保密,短暂的秘密泄漏,可追溯性,重播,被盗设备攻击,并且还面临去同步问题。这些问题使得提议的方案不适合医疗保健系统。因此,迫切需要设计一种身份验证机制,以限制攻击者获取任何敏感信息。考虑到上述需求,我们提出了一种新的基于零知识证明的认证密钥协议(ZKP-AKA)协议。使用非正式(非数学)和正式(Scyther工具)安全验证来检查我们提议的身份验证机制的安全性,以确认提议的协议提供了上面提到的重要安全特性。我们还测量了性能,通过在通信、计算、消息交换和能耗成本方面与竞争对手进行比较分析,表明我们提出的机制适用于医疗智能系统中的物联网设备。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
iZKP-AKA: A secure and improved ZKP-AKA protocol for sustainable healthcare
The use of IoT in healthcare has undoubtedly brought many significant adaptations and benefits that changed medical facilities. However, the possibility of unauthorized access to private medical data is a serious issue that requires appropriate attention to protect the user’s privacy. Recently, a proposed scheme by Gurjot et al. suggested an authentication mechanism to provide anonymity and other security characteristics. We did the security analysis and informally proved that their scheme is prone to various attacks, such as failure to offer perfect forward secrecy, ephemeral secret leakage, traceability, replay, stolen device attacks, and also face desynchronization issues. These issues make the proposed scheme unsuitable for the healthcare system. Therefore, there is an impelling need to design an authentication mechanism that can restrict the attacker from getting any sensitive information. Considering the above requirements, we present a novel Zero Knowledge Proof based Authenticated Key Agreement (ZKP-AKA) protocol. The security of our proposed authentication mechanism is examined using the informal (non-mathematical) and formal (Scyther tool) security verification to confirm that the proposed protocol offers the prominent security features mentioned above. We also measure the performance to show that our proposed mechanism is suitable for IoT devices in the healthcare intelligent system by doing a comparative analysis with its competitors in terms of communication, computational, message exchange and energy consumption costs.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Computers & Electrical Engineering
Computers & Electrical Engineering 工程技术-工程:电子与电气
CiteScore
9.20
自引率
7.00%
发文量
661
审稿时长
47 days
期刊介绍: The impact of computers has nowhere been more revolutionary than in electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, a transformation that has been motivated by the natural ease of interface between computers and electrical systems, and the promise of spectacular improvements in speed and efficiency. Published since 1973, Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and electronic systems. The journal publishes papers featuring novel implementations of computers and computational techniques in areas like signal and image processing, high-performance computing, parallel processing, and communications. Special attention will be paid to papers describing innovative architectures, algorithms, and software tools.
期刊最新文献
Editorial Board Improved perturbation based hybrid firefly algorithm and long short-term memory based intelligent security model for IoT network intrusion detection iZKP-AKA: A secure and improved ZKP-AKA protocol for sustainable healthcare BlockGuard: Advancing digital copyright integrity with blockchain technique Reliability-based preventive maintenance scheduling in power generation systems: A lévy flight and chaotic local search-based discrete mayfly algorithm
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1