Loading…
HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks
With the recent use of IoT in the field of healthcare, a lot of patient data is being transmitted and made available online. This necessitates sufficient security measures to be put in place to prevent the possibilities of cyberattacks. In this regard, several authentication techniques have been des...
Saved in:
Published in: | IEEE journal on selected areas in communications 2021-02, Vol.39 (2), p.361-369 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c293t-77a26c471d70248b13cfad308c27fd261b821ed59377830e6ff2d43c4c0b75823 |
---|---|
cites | cdi_FETCH-LOGICAL-c293t-77a26c471d70248b13cfad308c27fd261b821ed59377830e6ff2d43c4c0b75823 |
container_end_page | 369 |
container_issue | 2 |
container_start_page | 361 |
container_title | IEEE journal on selected areas in communications |
container_volume | 39 |
creator | Alladi, Tejasvi Chamola, Vinay Naren |
description | With the recent use of IoT in the field of healthcare, a lot of patient data is being transmitted and made available online. This necessitates sufficient security measures to be put in place to prevent the possibilities of cyberattacks. In this regard, several authentication techniques have been designed in recent times to mitigate these challenges, but the physical security of the healthcare IoT devices against node tampering and node replacement attacks, in particular, is not addressed sufficiently in the literature. To address these challenges, a two-way two-stage authentication protocol using hardware security primitives called Physical Unclonable Functions (PUFs) is presented in this paper. Considering the memory and energy constraints of healthcare IoT devices, this protocol is made very lightweight. A formal security evaluation of this protocol is done to prove its validity. We also compare it with relevant protocols in the healthcare IoT scenario in terms of computation time and security to show its suitability and robustness. |
doi_str_mv | 10.1109/JSAC.2020.3020605 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_JSAC_2020_3020605</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9183966</ieee_id><sourcerecordid>2478835383</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-77a26c471d70248b13cfad308c27fd261b821ed59377830e6ff2d43c4c0b75823</originalsourceid><addsrcrecordid>eNo9kF1LwzAUhoMoOKc_QLwJeN16ktM2qXelTDcZfla8DFmass65zDRj7N_bseHNeS_O854DDyHXDGLGIL97-ijKmAOHGPuRQXpCBixNZQQA8pQMQCBGUrDsnFx03QKAJYnkA_I2Lt7LyT0taLV10Zfe0WIT5nYVWqND61b01bvgjFvSxnlazb21dNRvw46OrV6GudHe0omr6LMNW-e_u0ty1uhlZ6-OOSSfD6OqHEfTl8dJWUwjw3MMkRCaZyYRrBbAEzljaBpdI0jDRVPzjM0kZ7ZOcxRCItisaXidoEkMzEQqOQ7J7eHu2rvfje2CWriNX_UvFU-ElJiixJ5iB8p413XeNmrt2x_td4qB2ptTe3Nqb04dzfWdm0Ontdb-8zmTmGcZ_gGGY2ev</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2478835383</pqid></control><display><type>article</type><title>HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks</title><source>IEEE Xplore (Online service)</source><creator>Alladi, Tejasvi ; Chamola, Vinay ; Naren</creator><creatorcontrib>Alladi, Tejasvi ; Chamola, Vinay ; Naren</creatorcontrib><description>With the recent use of IoT in the field of healthcare, a lot of patient data is being transmitted and made available online. This necessitates sufficient security measures to be put in place to prevent the possibilities of cyberattacks. In this regard, several authentication techniques have been designed in recent times to mitigate these challenges, but the physical security of the healthcare IoT devices against node tampering and node replacement attacks, in particular, is not addressed sufficiently in the literature. To address these challenges, a two-way two-stage authentication protocol using hardware security primitives called Physical Unclonable Functions (PUFs) is presented in this paper. Considering the memory and energy constraints of healthcare IoT devices, this protocol is made very lightweight. A formal security evaluation of this protocol is done to prove its validity. We also compare it with relevant protocols in the healthcare IoT scenario in terms of computation time and security to show its suitability and robustness.</description><identifier>ISSN: 0733-8716</identifier><identifier>EISSN: 1558-0008</identifier><identifier>DOI: 10.1109/JSAC.2020.3020605</identifier><identifier>CODEN: ISACEM</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Authentication ; Health care ; Healthcare IoT ; Internet of medical things ; Medical services ; Monitoring ; physical security ; physically unclonable functions (PUFs) ; privacy ; Protocol ; Protocols ; Robustness (mathematics) ; Security ; Security management ; security protocol ; Servers ; two-way authentication ; Wireless sensor networks</subject><ispartof>IEEE journal on selected areas in communications, 2021-02, Vol.39 (2), p.361-369</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-77a26c471d70248b13cfad308c27fd261b821ed59377830e6ff2d43c4c0b75823</citedby><cites>FETCH-LOGICAL-c293t-77a26c471d70248b13cfad308c27fd261b821ed59377830e6ff2d43c4c0b75823</cites><orcidid>0000-0002-2844-707X ; 0000-0003-4612-3180 ; 0000-0002-6730-3060</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9183966$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Alladi, Tejasvi</creatorcontrib><creatorcontrib>Chamola, Vinay</creatorcontrib><creatorcontrib>Naren</creatorcontrib><title>HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks</title><title>IEEE journal on selected areas in communications</title><addtitle>J-SAC</addtitle><description>With the recent use of IoT in the field of healthcare, a lot of patient data is being transmitted and made available online. This necessitates sufficient security measures to be put in place to prevent the possibilities of cyberattacks. In this regard, several authentication techniques have been designed in recent times to mitigate these challenges, but the physical security of the healthcare IoT devices against node tampering and node replacement attacks, in particular, is not addressed sufficiently in the literature. To address these challenges, a two-way two-stage authentication protocol using hardware security primitives called Physical Unclonable Functions (PUFs) is presented in this paper. Considering the memory and energy constraints of healthcare IoT devices, this protocol is made very lightweight. A formal security evaluation of this protocol is done to prove its validity. We also compare it with relevant protocols in the healthcare IoT scenario in terms of computation time and security to show its suitability and robustness.</description><subject>Authentication</subject><subject>Health care</subject><subject>Healthcare IoT</subject><subject>Internet of medical things</subject><subject>Medical services</subject><subject>Monitoring</subject><subject>physical security</subject><subject>physically unclonable functions (PUFs)</subject><subject>privacy</subject><subject>Protocol</subject><subject>Protocols</subject><subject>Robustness (mathematics)</subject><subject>Security</subject><subject>Security management</subject><subject>security protocol</subject><subject>Servers</subject><subject>two-way authentication</subject><subject>Wireless sensor networks</subject><issn>0733-8716</issn><issn>1558-0008</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNo9kF1LwzAUhoMoOKc_QLwJeN16ktM2qXelTDcZfla8DFmass65zDRj7N_bseHNeS_O854DDyHXDGLGIL97-ijKmAOHGPuRQXpCBixNZQQA8pQMQCBGUrDsnFx03QKAJYnkA_I2Lt7LyT0taLV10Zfe0WIT5nYVWqND61b01bvgjFvSxnlazb21dNRvw46OrV6GudHe0omr6LMNW-e_u0ty1uhlZ6-OOSSfD6OqHEfTl8dJWUwjw3MMkRCaZyYRrBbAEzljaBpdI0jDRVPzjM0kZ7ZOcxRCItisaXidoEkMzEQqOQ7J7eHu2rvfje2CWriNX_UvFU-ElJiixJ5iB8p413XeNmrt2x_td4qB2ptTe3Nqb04dzfWdm0Ontdb-8zmTmGcZ_gGGY2ev</recordid><startdate>20210201</startdate><enddate>20210201</enddate><creator>Alladi, Tejasvi</creator><creator>Chamola, Vinay</creator><creator>Naren</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0002-2844-707X</orcidid><orcidid>https://orcid.org/0000-0003-4612-3180</orcidid><orcidid>https://orcid.org/0000-0002-6730-3060</orcidid></search><sort><creationdate>20210201</creationdate><title>HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks</title><author>Alladi, Tejasvi ; Chamola, Vinay ; Naren</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-77a26c471d70248b13cfad308c27fd261b821ed59377830e6ff2d43c4c0b75823</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Authentication</topic><topic>Health care</topic><topic>Healthcare IoT</topic><topic>Internet of medical things</topic><topic>Medical services</topic><topic>Monitoring</topic><topic>physical security</topic><topic>physically unclonable functions (PUFs)</topic><topic>privacy</topic><topic>Protocol</topic><topic>Protocols</topic><topic>Robustness (mathematics)</topic><topic>Security</topic><topic>Security management</topic><topic>security protocol</topic><topic>Servers</topic><topic>two-way authentication</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Alladi, Tejasvi</creatorcontrib><creatorcontrib>Chamola, Vinay</creatorcontrib><creatorcontrib>Naren</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) Online</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE journal on selected areas in communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Alladi, Tejasvi</au><au>Chamola, Vinay</au><au>Naren</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks</atitle><jtitle>IEEE journal on selected areas in communications</jtitle><stitle>J-SAC</stitle><date>2021-02-01</date><risdate>2021</risdate><volume>39</volume><issue>2</issue><spage>361</spage><epage>369</epage><pages>361-369</pages><issn>0733-8716</issn><eissn>1558-0008</eissn><coden>ISACEM</coden><abstract>With the recent use of IoT in the field of healthcare, a lot of patient data is being transmitted and made available online. This necessitates sufficient security measures to be put in place to prevent the possibilities of cyberattacks. In this regard, several authentication techniques have been designed in recent times to mitigate these challenges, but the physical security of the healthcare IoT devices against node tampering and node replacement attacks, in particular, is not addressed sufficiently in the literature. To address these challenges, a two-way two-stage authentication protocol using hardware security primitives called Physical Unclonable Functions (PUFs) is presented in this paper. Considering the memory and energy constraints of healthcare IoT devices, this protocol is made very lightweight. A formal security evaluation of this protocol is done to prove its validity. We also compare it with relevant protocols in the healthcare IoT scenario in terms of computation time and security to show its suitability and robustness.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/JSAC.2020.3020605</doi><tpages>9</tpages><orcidid>https://orcid.org/0000-0002-2844-707X</orcidid><orcidid>https://orcid.org/0000-0003-4612-3180</orcidid><orcidid>https://orcid.org/0000-0002-6730-3060</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0733-8716 |
ispartof | IEEE journal on selected areas in communications, 2021-02, Vol.39 (2), p.361-369 |
issn | 0733-8716 1558-0008 |
language | eng |
recordid | cdi_crossref_primary_10_1109_JSAC_2020_3020605 |
source | IEEE Xplore (Online service) |
subjects | Authentication Health care Healthcare IoT Internet of medical things Medical services Monitoring physical security physically unclonable functions (PUFs) privacy Protocol Protocols Robustness (mathematics) Security Security management security protocol Servers two-way authentication Wireless sensor networks |
title | HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T13%3A17%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=HARCI:%20A%20Two-Way%20Authentication%20Protocol%20for%20Three%20Entity%20Healthcare%20IoT%20Networks&rft.jtitle=IEEE%20journal%20on%20selected%20areas%20in%20communications&rft.au=Alladi,%20Tejasvi&rft.date=2021-02-01&rft.volume=39&rft.issue=2&rft.spage=361&rft.epage=369&rft.pages=361-369&rft.issn=0733-8716&rft.eissn=1558-0008&rft.coden=ISACEM&rft_id=info:doi/10.1109/JSAC.2020.3020605&rft_dat=%3Cproquest_cross%3E2478835383%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c293t-77a26c471d70248b13cfad308c27fd261b821ed59377830e6ff2d43c4c0b75823%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2478835383&rft_id=info:pmid/&rft_ieee_id=9183966&rfr_iscdi=true |