4.7 Article

Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology

期刊

DIGITAL COMMUNICATIONS AND NETWORKS
卷 7, 期 2, 页码 235-244

出版社

KEAI PUBLISHING LTD
DOI: 10.1016/j.dcan.2020.06.003

关键词

Authentication; Security protocol; IoT; 5G; e-health cloud

向作者/读者索取更多资源

Modern information technology is increasingly being utilized in storing and distributing healthcare data to reduce costs and improve medical facilities. While the emergence of e-Health clouds offers novel opportunities for easy and remote access to medical data, it also presents new risks and challenges in terms of ensuring integrity, security, and confidentiality. Authentication, particularly through factors like smart cards, passwords, and biometrics, is crucial in protecting susceptible e-Health data from illegal access. Many ECC-based authentication protocols have been proposed for e-Health clouds, but most suffer from security flaws and high computational overheads. Introducing a novel protocol that addresses major attack vectors and evaluating it through security analysis shows it to be more efficient, robust, and secure than existing protocols.
Modern information technology has been utilized progressively to store and distribute a large amount of healthcare data to reduce costs and improve medical facilities. In this context, the emergence of e-Health clouds offers novel opportunities, like easy and remote accessibility of medical data. However, this achievement produces plenty of new risks and challenges like how to provide integrity, security, and confidentiality to the highly susceptible e-Health data. Among these challenges, authentication is a major issue that ensures that the susceptible medical data in clouds is not available to illegal participants. The smart card, password and biometrics are three factors of authentication which fulfill the requirement of giving high security. Numerous three-factor ECC-based authentication protocols on e-Health clouds have been presented so far. However, most of the protocols have serious security flaws and produce high computation and communication overheads. Therefore, we introduce a novel protocol for the e-Health cloud, which thwarts some major attacks, such as user anonymity, offline password guessing, impersonation, and stolen smart card attacks. Moreover, we evaluate our protocol through formal security analysis using the Random Oracle Model (ROM). The analysis shows that our proposed protocol is more efficient than many existing protocols in terms of computation and communication costs. Thus, our proposed protocol is proved to be more efficient, robust and secure.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据