Loading…

HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks

With the recent use of IoT in the field of healthcare, a lot of patient data is being transmitted and made available online. This necessitates sufficient security measures to be put in place to prevent the possibilities of cyberattacks. In this regard, several authentication techniques have been des...

Full description

Saved in:
Bibliographic Details
Published in:IEEE journal on selected areas in communications 2021-02, Vol.39 (2), p.361-369
Main Authors: Alladi, Tejasvi, Chamola, Vinay, Naren
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c293t-77a26c471d70248b13cfad308c27fd261b821ed59377830e6ff2d43c4c0b75823
cites cdi_FETCH-LOGICAL-c293t-77a26c471d70248b13cfad308c27fd261b821ed59377830e6ff2d43c4c0b75823
container_end_page 369
container_issue 2
container_start_page 361
container_title IEEE journal on selected areas in communications
container_volume 39
creator Alladi, Tejasvi
Chamola, Vinay
Naren
description With the recent use of IoT in the field of healthcare, a lot of patient data is being transmitted and made available online. This necessitates sufficient security measures to be put in place to prevent the possibilities of cyberattacks. In this regard, several authentication techniques have been designed in recent times to mitigate these challenges, but the physical security of the healthcare IoT devices against node tampering and node replacement attacks, in particular, is not addressed sufficiently in the literature. To address these challenges, a two-way two-stage authentication protocol using hardware security primitives called Physical Unclonable Functions (PUFs) is presented in this paper. Considering the memory and energy constraints of healthcare IoT devices, this protocol is made very lightweight. A formal security evaluation of this protocol is done to prove its validity. We also compare it with relevant protocols in the healthcare IoT scenario in terms of computation time and security to show its suitability and robustness.
doi_str_mv 10.1109/JSAC.2020.3020605
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_JSAC_2020_3020605</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9183966</ieee_id><sourcerecordid>2478835383</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-77a26c471d70248b13cfad308c27fd261b821ed59377830e6ff2d43c4c0b75823</originalsourceid><addsrcrecordid>eNo9kF1LwzAUhoMoOKc_QLwJeN16ktM2qXelTDcZfla8DFmass65zDRj7N_bseHNeS_O854DDyHXDGLGIL97-ijKmAOHGPuRQXpCBixNZQQA8pQMQCBGUrDsnFx03QKAJYnkA_I2Lt7LyT0taLV10Zfe0WIT5nYVWqND61b01bvgjFvSxnlazb21dNRvw46OrV6GudHe0omr6LMNW-e_u0ty1uhlZ6-OOSSfD6OqHEfTl8dJWUwjw3MMkRCaZyYRrBbAEzljaBpdI0jDRVPzjM0kZ7ZOcxRCItisaXidoEkMzEQqOQ7J7eHu2rvfje2CWriNX_UvFU-ElJiixJ5iB8p413XeNmrt2x_td4qB2ptTe3Nqb04dzfWdm0Ontdb-8zmTmGcZ_gGGY2ev</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2478835383</pqid></control><display><type>article</type><title>HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks</title><source>IEEE Xplore (Online service)</source><creator>Alladi, Tejasvi ; Chamola, Vinay ; Naren</creator><creatorcontrib>Alladi, Tejasvi ; Chamola, Vinay ; Naren</creatorcontrib><description>With the recent use of IoT in the field of healthcare, a lot of patient data is being transmitted and made available online. This necessitates sufficient security measures to be put in place to prevent the possibilities of cyberattacks. In this regard, several authentication techniques have been designed in recent times to mitigate these challenges, but the physical security of the healthcare IoT devices against node tampering and node replacement attacks, in particular, is not addressed sufficiently in the literature. To address these challenges, a two-way two-stage authentication protocol using hardware security primitives called Physical Unclonable Functions (PUFs) is presented in this paper. Considering the memory and energy constraints of healthcare IoT devices, this protocol is made very lightweight. A formal security evaluation of this protocol is done to prove its validity. We also compare it with relevant protocols in the healthcare IoT scenario in terms of computation time and security to show its suitability and robustness.</description><identifier>ISSN: 0733-8716</identifier><identifier>EISSN: 1558-0008</identifier><identifier>DOI: 10.1109/JSAC.2020.3020605</identifier><identifier>CODEN: ISACEM</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Authentication ; Health care ; Healthcare IoT ; Internet of medical things ; Medical services ; Monitoring ; physical security ; physically unclonable functions (PUFs) ; privacy ; Protocol ; Protocols ; Robustness (mathematics) ; Security ; Security management ; security protocol ; Servers ; two-way authentication ; Wireless sensor networks</subject><ispartof>IEEE journal on selected areas in communications, 2021-02, Vol.39 (2), p.361-369</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-77a26c471d70248b13cfad308c27fd261b821ed59377830e6ff2d43c4c0b75823</citedby><cites>FETCH-LOGICAL-c293t-77a26c471d70248b13cfad308c27fd261b821ed59377830e6ff2d43c4c0b75823</cites><orcidid>0000-0002-2844-707X ; 0000-0003-4612-3180 ; 0000-0002-6730-3060</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9183966$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Alladi, Tejasvi</creatorcontrib><creatorcontrib>Chamola, Vinay</creatorcontrib><creatorcontrib>Naren</creatorcontrib><title>HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks</title><title>IEEE journal on selected areas in communications</title><addtitle>J-SAC</addtitle><description>With the recent use of IoT in the field of healthcare, a lot of patient data is being transmitted and made available online. This necessitates sufficient security measures to be put in place to prevent the possibilities of cyberattacks. In this regard, several authentication techniques have been designed in recent times to mitigate these challenges, but the physical security of the healthcare IoT devices against node tampering and node replacement attacks, in particular, is not addressed sufficiently in the literature. To address these challenges, a two-way two-stage authentication protocol using hardware security primitives called Physical Unclonable Functions (PUFs) is presented in this paper. Considering the memory and energy constraints of healthcare IoT devices, this protocol is made very lightweight. A formal security evaluation of this protocol is done to prove its validity. We also compare it with relevant protocols in the healthcare IoT scenario in terms of computation time and security to show its suitability and robustness.</description><subject>Authentication</subject><subject>Health care</subject><subject>Healthcare IoT</subject><subject>Internet of medical things</subject><subject>Medical services</subject><subject>Monitoring</subject><subject>physical security</subject><subject>physically unclonable functions (PUFs)</subject><subject>privacy</subject><subject>Protocol</subject><subject>Protocols</subject><subject>Robustness (mathematics)</subject><subject>Security</subject><subject>Security management</subject><subject>security protocol</subject><subject>Servers</subject><subject>two-way authentication</subject><subject>Wireless sensor networks</subject><issn>0733-8716</issn><issn>1558-0008</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNo9kF1LwzAUhoMoOKc_QLwJeN16ktM2qXelTDcZfla8DFmass65zDRj7N_bseHNeS_O854DDyHXDGLGIL97-ijKmAOHGPuRQXpCBixNZQQA8pQMQCBGUrDsnFx03QKAJYnkA_I2Lt7LyT0taLV10Zfe0WIT5nYVWqND61b01bvgjFvSxnlazb21dNRvw46OrV6GudHe0omr6LMNW-e_u0ty1uhlZ6-OOSSfD6OqHEfTl8dJWUwjw3MMkRCaZyYRrBbAEzljaBpdI0jDRVPzjM0kZ7ZOcxRCItisaXidoEkMzEQqOQ7J7eHu2rvfje2CWriNX_UvFU-ElJiixJ5iB8p413XeNmrt2x_td4qB2ptTe3Nqb04dzfWdm0Ontdb-8zmTmGcZ_gGGY2ev</recordid><startdate>20210201</startdate><enddate>20210201</enddate><creator>Alladi, Tejasvi</creator><creator>Chamola, Vinay</creator><creator>Naren</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0002-2844-707X</orcidid><orcidid>https://orcid.org/0000-0003-4612-3180</orcidid><orcidid>https://orcid.org/0000-0002-6730-3060</orcidid></search><sort><creationdate>20210201</creationdate><title>HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks</title><author>Alladi, Tejasvi ; Chamola, Vinay ; Naren</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-77a26c471d70248b13cfad308c27fd261b821ed59377830e6ff2d43c4c0b75823</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Authentication</topic><topic>Health care</topic><topic>Healthcare IoT</topic><topic>Internet of medical things</topic><topic>Medical services</topic><topic>Monitoring</topic><topic>physical security</topic><topic>physically unclonable functions (PUFs)</topic><topic>privacy</topic><topic>Protocol</topic><topic>Protocols</topic><topic>Robustness (mathematics)</topic><topic>Security</topic><topic>Security management</topic><topic>security protocol</topic><topic>Servers</topic><topic>two-way authentication</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Alladi, Tejasvi</creatorcontrib><creatorcontrib>Chamola, Vinay</creatorcontrib><creatorcontrib>Naren</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) Online</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE journal on selected areas in communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Alladi, Tejasvi</au><au>Chamola, Vinay</au><au>Naren</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks</atitle><jtitle>IEEE journal on selected areas in communications</jtitle><stitle>J-SAC</stitle><date>2021-02-01</date><risdate>2021</risdate><volume>39</volume><issue>2</issue><spage>361</spage><epage>369</epage><pages>361-369</pages><issn>0733-8716</issn><eissn>1558-0008</eissn><coden>ISACEM</coden><abstract>With the recent use of IoT in the field of healthcare, a lot of patient data is being transmitted and made available online. This necessitates sufficient security measures to be put in place to prevent the possibilities of cyberattacks. In this regard, several authentication techniques have been designed in recent times to mitigate these challenges, but the physical security of the healthcare IoT devices against node tampering and node replacement attacks, in particular, is not addressed sufficiently in the literature. To address these challenges, a two-way two-stage authentication protocol using hardware security primitives called Physical Unclonable Functions (PUFs) is presented in this paper. Considering the memory and energy constraints of healthcare IoT devices, this protocol is made very lightweight. A formal security evaluation of this protocol is done to prove its validity. We also compare it with relevant protocols in the healthcare IoT scenario in terms of computation time and security to show its suitability and robustness.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/JSAC.2020.3020605</doi><tpages>9</tpages><orcidid>https://orcid.org/0000-0002-2844-707X</orcidid><orcidid>https://orcid.org/0000-0003-4612-3180</orcidid><orcidid>https://orcid.org/0000-0002-6730-3060</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 0733-8716
ispartof IEEE journal on selected areas in communications, 2021-02, Vol.39 (2), p.361-369
issn 0733-8716
1558-0008
language eng
recordid cdi_crossref_primary_10_1109_JSAC_2020_3020605
source IEEE Xplore (Online service)
subjects Authentication
Health care
Healthcare IoT
Internet of medical things
Medical services
Monitoring
physical security
physically unclonable functions (PUFs)
privacy
Protocol
Protocols
Robustness (mathematics)
Security
Security management
security protocol
Servers
two-way authentication
Wireless sensor networks
title HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T13%3A17%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=HARCI:%20A%20Two-Way%20Authentication%20Protocol%20for%20Three%20Entity%20Healthcare%20IoT%20Networks&rft.jtitle=IEEE%20journal%20on%20selected%20areas%20in%20communications&rft.au=Alladi,%20Tejasvi&rft.date=2021-02-01&rft.volume=39&rft.issue=2&rft.spage=361&rft.epage=369&rft.pages=361-369&rft.issn=0733-8716&rft.eissn=1558-0008&rft.coden=ISACEM&rft_id=info:doi/10.1109/JSAC.2020.3020605&rft_dat=%3Cproquest_cross%3E2478835383%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c293t-77a26c471d70248b13cfad308c27fd261b821ed59377830e6ff2d43c4c0b75823%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2478835383&rft_id=info:pmid/&rft_ieee_id=9183966&rfr_iscdi=true