Computer Science ›› 2023, Vol. 50 ›› Issue (8): 359-364.doi: 10.11896/jsjkx.220700151

• Information Security • Previous Articles     Next Articles

Anonymous Authentication Protocol for Medical Internet of Things

LIU Yingjun1, LUO Yang2, YANG Yujun2, LIU Yuanni3   

  1. 1 Industry Development and Promotion Center,Beijing 100846,China
    2 School of Computer Science and Technology,Chongqing University of Posts and Telecommunications,Chongqing 400065,China
    3 School of Cyber Security and Information Law,Chongqing University of Posts and Telecommunications,Chongqing 400065,China
  • Received:2022-07-15 Revised:2023-06-12 Online:2023-08-15 Published:2023-08-02
  • About author:LIU Yingjun,born in 1974,master,se-nior engineer.His main reaserch in-terests include cybersecurity data go-vernance and new generation information technology,digital transformation and high quality development of small and medium enterprises,and industrialization of manufacturing innovation achievements.
    YANG Yujun,born in 1998,postgra-duate.Her main research interests include authentication and key agreement protocol and communication security.
  • Supported by:
    General Program of Natural Science Foundation of Chongqing(cstc2020jcyj-msxmX1021),Science and Technology Research Program of Chongqing Municipal Education Commission(KJZD-K20200602),Open Foundation of State key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications)(SKLNST-2021-1-18) and Natural Science Foundation of Chongqing,China(cstc2020jcyj-msxmX0343).

Abstract: As IoT technology continues to mature,it has been frequently used in various industries to improve people's work efficiency and living standards.The widespread application of IoT in the medical field facilitates patients' access to medical services while also allowing doctors to obtain more timely and accurate information about the patient's physical condition,so that they can develop more efficient treatment plans.However,while people are enjoying the convenience of medical IoT,how to ensure the communication security and personal privacy of patients are issues that cannot be ignored.In order to realize users' secure access to the network,this paper proposes an efficient anonymous authentication and key exchange protocol based on homomorphic encryption.Medical devices and telemedicine servers only need a low-entropy password for mutual authentication,thus negotiating a high-entropy session key.In this paper,the security of the scheme is proved under the standard model,and the simulation experimental results show that the scheme is more efficient than existing similar schemes.

Key words: Cryptography authentication, Medical Internet of things, Standard model, Anonymous authentication

CLC Number: 

  • TP309.2
[1]HAASE B,LABRIQUE B.AuCPace:Efficient verifier-basedPAKE protocol tailored for the IIoT[J].IACR Transactions on Cryptographic Hardware and Embedded Systems,2019(2):1-48.
[2]BELLOVIN S M,MERRITT M.Encrypted key exchange:password-based protocols secure against dictionary attacks[C]//Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.Oakland,CA,USA,1992:72-84.
[3]LI X,NIU J,KHAN M K,et al.An enhanced smart card based remote user password authentication scheme[J].Journal of Network and Computer Applications,2013,36(5):1365-1371.
[4]KUMARI S,KHAN M K,LI X,et al.Design of a user anonymous password authentication scheme without smart card[J].International Journal of Communication Systems,2016,29(3):441-458.
[5]SHEN J,FENG M,LIU D,et al.Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing[C]//International Conference on Information Security Practice and Experience.Cham:Springer,2017:454-467.
[6]SHU J,XU C X.Efficient Password-Based Authenticated KeyExchange Protocol under Standard Model[J].Journal of Electronics & Information Technology,2009,31(11):2716-2719.
[7]JIANG Q,MA J,LI G,et al.Improvement of robust smart-card-based password authentication scheme[J].International Journal of Communication Systems,2015,28(2):383-393.
[8]JIANG Q,MA J,TIAN Y.Cryptanalysis of smart-card-basedpassword authenticated key agreement protocol for session initia-tion protocol of Zhang et al[J].International Journal of Communication Systems,2015,28(7):1340-1351.
[9]WEI F,VIJAYAKUMAR P,SHEN J,et al.A provably secure password-based anonymous authentication scheme for wireless body area networks[J].Computers & Electrical Engineering,2018,65:322-331.
[10]WANG C,XU G,LI W.A secure and anonymous two-factor authentication protocol in multiserver environment[J].Security and CommunicationNetworks,2018,2018:1-15.
[11]BANERJEE S,ODELU V,DAS A K,et al.A provably secure and lightweight anonymous user authenticated session key exchange scheme for Internet of Things deployment[J].IEEE Internet of Things Journal,2019,6(5):8739-8752.
[12]VIET D Q,YAMAMURA A,TANAKA H.Anonymous password-based authenticated key exchange[C]//International Conference on Cryptology in India.Berlin:Springer,2005:244-257.
[13]YANG J,ZHANG Z.A new anonymous password-based au-thenticated key exchange protocol[C]//International Confe-rence on Cryptology in India.Berlin:Springer,2008:200-212.
[14]LIU F F,LIU Y B.Lightweight smart phone security authentication protocol based on social network[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2013,25(1):132-137.
[15]YANG Y,ZHOU J,WENG J,et al.A new approach for anonymous password authentication[C]//2009 Annual Computer Security Applications Conference.IEEE,2009:199-208.
[16]QIAN H,GONG J,ZHOU Y.Anonymous password-based key exchange with low resources consumption and better user-friendliness[J].Security and Communication Networks,2012,5(12):1379-1393.
[17]HU X,ZHANG J,ZHANG Z,et al.Anonymous password authenticated key exchange protocol in the standard model[J].Wireless Personal Communications,2017,96(1):1451-1474.
[18]JIANG Q,MA J,WEI F,et al.An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks[J].Journal of Network and Computer Applications,2016,76:37-48.
[19]ZHANG Y,XIANG Y,WU W,et al.A variant of password authenticated key exchange protocol[J].Future Generation Computer Systems,2018,78:699-711.
[20]CHEN Y,YUAN J,ZHANG Y.An improved password-authenticated key exchange protocol for VANET[J].Vehicular Communications,2021,27:100286.
[21]CHANG C C,LE H D.A provably secure,efficient,and flexible authentication scheme for ad hoc wireless sensor networks[J].IEEE Transactions on wireless communications,2015,15(1):357-366.
[22]HE J,YANG Z,ZHANG J,et al.On the security ofa provably secure,efficient,and flexible authentication scheme for ad hoc wireless sensor networks[J].International Journal of Distributed Sensor Networks,2018,14(1):1-11.
[23]JIANG Q,MA J,YANG C,et al.Efficient end-to-end authentication protocol forwearable health monitoring systems[J].Computers & Electrical Engineering,2017,63:182-195.
[24]ZHAO Z Q,GUO X J,YIN M H,et al.Research on authentication method of identity-based higncryption in IoT[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2023,35(2):343-351.
[25]LIU C H,CHUNG Y F.Secure user authentication scheme for wireless healthcare sensor networks[J].Computers & Electrical Engineering,2017,59:250-261.
[26]LI C T,WU T Y,CHEN C L,et al.An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system[J].Sensors,2017,17(7):1482.
[27]BELLARE M,POINTCHEVAL D,ROGAWAY P.Authenticated key exchange secure against dictionary attacks[C]//International Conference on the Theory and Applications of Cryptographic Techniques.Berlin:Springer,2000:139-155.
[28]LI Z P,WANG D.Achieving one-round password-based authenticated key exchange over lattices[J].IEEE Transactions on Services Computing,2019,15(1):308-321.
[29]YU J X,LIAN H H,ZHAO Z Q,et al.Provably secure verifier-based password authenticated key exchange based on lattices[M]//Advances in Computers.Elsevier,2021:121-156.
[30]XIANG S B,XU B,CHEN K.A two-party password-authenti-cated key exchange protocol with verifier[J].Journal of Compu-ter and Communications,2021,9(4):102.
[31]SHIN S H,KOBARA K.Simple anonymous password-based authenticated key exchange(sapake),reconsidered[J].IEIC Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2017,100(2):639-652.
[1] GUO Nan, SONG Xiaobo, ZHUANG Luyuan, ZHAO Cong. Anonymous Batch Authentication Scheme in Internet of Vehicles for WAVE Security Services [J]. Computer Science, 2023, 50(4): 308-316.
[2] SHI Yu-qing, LING Jie. Online/Offline Attribute-based Encryption with User and Attribute Authority Accountability [J]. Computer Science, 2020, 47(4): 292-297.
[3] WANG Qing-long, QIAO Rui, DUAN Zong-tao. Security Analysis on VANETs Authentication Schemes:CPAV and ABV [J]. Computer Science, 2019, 46(4): 177-182.
[4] YUE Xiao-han, HUI Ming-heng, WANG Xi-bo. Forward Security Anonymous Authentication Protocol Based on Group Signature for Vehicular Ad Hoc Network [J]. Computer Science, 2018, 45(11A): 382-388.
[5] CHEN Hai-hong. Three-party Authenticated Key Agreement Protocol Based on One-way Isomorphism [J]. Computer Science, 2015, 42(Z6): 447-450.
[6] CHEN Jian, WANG Xiao-ying, WANG Yong-tao and LI Yao-sen. Efficient Attribute Based Key Agreement Protocol [J]. Computer Science, 2015, 42(Z6): 444-446.
[7] REN Yan. Attribute-based Signatures with Auditabiling in Standard Model [J]. Computer Science, 2015, 42(2): 142-146.
[8] FANG Li-ming, HUANG Zhi-qiu and WANG Jian-dong. Secure Channel Free Searchable Encryption in Standard Model [J]. Computer Science, 2015, 42(11): 197-202.
[9] XU Jun-feng,DING Xue-feng,SI Cheng-xiang and ZHANG Wei. Certificateless Anonymous Authentication Protocol for Vehicle Ad-hoc Network [J]. Computer Science, 2013, 40(9): 152-155.
[10] WANG Yong-tao,FENG Wei-duan,LIU Xiao-nan,SONG Jing and GUO Zhen-zhou. Message Policy Attribute Based Key Agreement Protocol [J]. Computer Science, 2013, 40(9): 106-110.
[11] MING Yang and LI Rui. Efficient Identity-based Sanitizable Signature Scheme in Standard Model [J]. Computer Science, 2013, 40(5): 158-163.
[12] JI Hui-fang, HAN Wen-bao, LIU Lian-dong. New Identity-based Proxy Signature in the Standard Model [J]. Computer Science, 2011, 38(8): 88-91.
[13] HUANG Gang,LI Jin-hang,JIA Yan. SWO: A Fast Search Algorithm Based on Small World Effect [J]. Computer Science, 2011, 38(7): 255-260.
[14] YU Yi-ke,ZHEN Xue-feng,HAN Xiao-guang,LIU Xing-bing. Efficient ID-based Proxy Signature in the Standard Model [J]. Computer Science, 2011, 38(6): 133-139.
[15] WANG Zhi-yi,LIU Tie,KANG Li,XIE Jing,LEI Gang. Short Public Key Provable Security Identity-based Signature Scheme [J]. Computer Science, 2011, 38(3): 136-139.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!