IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v11y2023i18p3857-d1236370.html
   My bibliography  Save this article

A Lightweight and Privacy-Preserving Authentication Protocol for Healthcare in an IoT Environment

Author

Listed:
  • Qingyun Xie

    (Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University, Hangzhou 311121, China)

  • Zixuan Ding

    (Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University, Hangzhou 311121, China)

  • Qi Xie

    (Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University, Hangzhou 311121, China)

Abstract

In Internet of Things (IoT)-based healthcare, sensor nodes are deployed to detect the patient’s physiological data in a wireless sensor network. In order to prevent unwarranted users from accessing the sensor network to obtain patients’ data, designing lightweight and privacy-preserving authentication protocols plays a crucial role. Many lightweight authentication protocols for IoT-based healthcare have been proposed in recent years, but most of them may suffer from one or more security problems. In particular, few protocols can resist sensor node-captured attacks and achieve n-factor secrecy, which leads to unauthorized personnel being able to access the patient’s physiological data and obtain patients’ privacy. Therefore, a lightweight and privacy-preserving authentication protocol for healthcare based on elliptic curve cryptography (ECC) and physical unclonable function (PUF) is proposed to surmount the above obstacles. We design a dynamic anonymity strategy to achieve users’ anonymity and unlinkability and use PUF to protect information stored in users’ devices and sensor nodes. In addition, higher security features such as three-factor secrecy, perfect forward secrecy, resistance to sensor node-captured attacks, and update asynchronous attacks are guaranteed. The proposed protocol is proven to be secure under the random oracle model and maintains lightweight computing efficiency.

Suggested Citation

  • Qingyun Xie & Zixuan Ding & Qi Xie, 2023. "A Lightweight and Privacy-Preserving Authentication Protocol for Healthcare in an IoT Environment," Mathematics, MDPI, vol. 11(18), pages 1-17, September.
  • Handle: RePEc:gam:jmathe:v:11:y:2023:i:18:p:3857-:d:1236370
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/11/18/3857/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/11/18/3857/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Jian Zhong & Tao Zhao & Ling Xiong & Ruixing Lin & Zexin Wang, 2023. "An Anonymous Authentication Scheme Based on Chinese Residue Theorem in Wireless Body Area Networks," Mathematics, MDPI, vol. 11(13), pages 1-19, July.
    2. Chandrashekhar Meshram & Cheng-Chi Lee & Ismail Bahkali & Agbotiname Lucky Imoize, 2023. "An Efficient Fractional Chebyshev Chaotic Map-Based Three-Factor Session Initiation Protocol for the Human-Centered IoT Architecture," Mathematics, MDPI, vol. 11(9), pages 1-20, April.
    3. Jan Lansky & Amir Masoud Rahmani & Saqib Ali & Nasour Bagheri & Masoumeh Safkhani & Omed Hassan Ahmed & Mehdi Hosseinzadeh, 2021. "BCmECC: A Lightweight Blockchain-Based Authentication and Key Agreement Protocol for Internet of Things," Mathematics, MDPI, vol. 9(24), pages 1-17, December.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Mehdi Hosseinzadeh & Rizwan Ali Naqvi & Masoumeh Safkhani & Lilia Tightiz & Raja Majid Mehmood, 2022. "Secure Authentication in the Smart Grid," Mathematics, MDPI, vol. 11(1), pages 1-24, December.
    2. Weichu Deng & Teng Huang & Haiyang Wang, 2022. "A Review of the Key Technology in a Blockchain Building Decentralized Trust Platform," Mathematics, MDPI, vol. 11(1), pages 1-29, December.
    3. Mehdi Hosseinzadeh & Mazhar Hussain Malik & Masoumeh Safkhani & Nasour Bagheri & Quynh Hoang Le & Lilia Tightiz & Amir H. Mosavi, 2023. "Toward Designing a Secure Authentication Protocol for IoT Environments," Sustainability, MDPI, vol. 15(7), pages 1-16, March.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:11:y:2023:i:18:p:3857-:d:1236370. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.