A privacy and session key based authentication scheme for medical IoT networks
Due to rapid increase rate of smart medical devices, the existing security internet of things (IoT) protocols cannot guaranty to perform better in-term of various threats. In this paper, the Secure Addressing and Mutual Authentication protocol (SAMA) scheme is proposed to protect the network from mu...
Saved in:
Published in | Computer communications Vol. 166; pp. 154 - 164 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
15.01.2021
|
Subjects | |
Online Access | Get full text |
ISSN | 0140-3664 1873-703X |
DOI | 10.1016/j.comcom.2020.11.017 |
Cover
Loading…
Abstract | Due to rapid increase rate of smart medical devices, the existing security internet of things (IoT) protocols cannot guaranty to perform better in-term of various threats. In this paper, the Secure Addressing and Mutual Authentication protocol (SAMA) scheme is proposed to protect the network from multiple attacks. The SAMA scheme uses the unique addressing and identification method to authenticates the smart medical monitoring devices, so that they can uniquely identifies in medical IoT network. Additionally, the proposed scheme also preserves anonymity with the help of session key establishment to secure communication between the user and medical server. The performance of SAMA scheme has been evaluated in-term of functionality, computation and communication cost, and results are compared with existing schemes. Finally for security, the proposed scheme is also analyzed formally and informally using AVISPA tool and widely-accepted BAN logic model. The security analysis shows that the SAMA scheme ensures security against, such as, impersonation, password guessing, man-in-the-middle attack replay, etc. |
---|---|
AbstractList | Due to rapid increase rate of smart medical devices, the existing security internet of things (IoT) protocols cannot guaranty to perform better in-term of various threats. In this paper, the Secure Addressing and Mutual Authentication protocol (SAMA) scheme is proposed to protect the network from multiple attacks. The SAMA scheme uses the unique addressing and identification method to authenticates the smart medical monitoring devices, so that they can uniquely identifies in medical IoT network. Additionally, the proposed scheme also preserves anonymity with the help of session key establishment to secure communication between the user and medical server. The performance of SAMA scheme has been evaluated in-term of functionality, computation and communication cost, and results are compared with existing schemes. Finally for security, the proposed scheme is also analyzed formally and informally using AVISPA tool and widely-accepted BAN logic model. The security analysis shows that the SAMA scheme ensures security against, such as, impersonation, password guessing, man-in-the-middle attack replay, etc. |
Author | Kumar, Pankaj Chouhan, Lokesh |
Author_xml | – sequence: 1 givenname: Pankaj surname: Kumar fullname: Kumar, Pankaj email: Pankaj@nith.ac.in, Pankajdhiman12508@gmail.com – sequence: 2 givenname: Lokesh surname: Chouhan fullname: Chouhan, Lokesh email: Lokesh@nith.ac.in |
BookMark | eNqFkM9KAzEQh4NUsK2-gYe8wK6TbHaz9SCU4p9C0UsFbyFNZmna7kaStdK3N7WePCgMDMzw_Zj5RmTQ-Q4JuWaQM2DVzSY3vk2Vc-BpxHJg8owMWS2LTELxNiBDYAKyoqrEBRnFuAEAIWUxJM9T-h7cXpsD1Z2lEWN0vqNbPNCVjmip_ujX2PXO6P64iGaNLdLGB9qiTdMdnfsl7bD_9GEbL8l5o3cRr376mLw-3C9nT9ni5XE-my4yU0DVZ4YBb6xuWI281pyBNsIiWs2MnADIsrHVik9EqXmNE4Gl1FxAKYuKcwOSFWNye8o1wccYsFHG9d8X9kG7nWKgjmbURp3MqKMZxZhKZhIsfsFJQavD4T_s7oRhemzvMKhoHHYmaQhoemW9-zvgC17Kgjs |
CitedBy_id | crossref_primary_10_12677_CSA_2021_119233 crossref_primary_10_1016_j_procs_2024_03_201 crossref_primary_10_1016_j_phycom_2023_102084 crossref_primary_10_1111_exsy_12788 crossref_primary_10_3390_s25030821 crossref_primary_10_1155_2022_5642026 crossref_primary_10_1007_s11042_024_19898_y crossref_primary_10_1038_s41598_023_44101_x crossref_primary_10_1016_j_comcom_2023_07_042 crossref_primary_10_1016_j_comcom_2021_11_021 crossref_primary_10_32604_cmc_2025_060372 crossref_primary_10_1016_j_comcom_2022_05_002 crossref_primary_10_1155_2021_5533843 crossref_primary_10_1016_j_future_2023_03_014 crossref_primary_10_3390_s21041488 crossref_primary_10_3390_su132111645 crossref_primary_10_3390_app122412688 crossref_primary_10_3390_electronics12081901 crossref_primary_10_1002_ett_4479 crossref_primary_10_1109_JIOT_2024_3420719 crossref_primary_10_1016_j_jisa_2022_103377 crossref_primary_10_32604_cmc_2024_049017 crossref_primary_10_4018_IJSSCI_285593 crossref_primary_10_2174_0123520965267339230928061410 crossref_primary_10_1007_s42979_022_01300_z crossref_primary_10_3390_su15043317 crossref_primary_10_3390_app12157487 crossref_primary_10_1109_ACCESS_2022_3212735 crossref_primary_10_1016_j_adhoc_2023_103159 crossref_primary_10_1109_JIOT_2023_3252051 crossref_primary_10_1016_j_comnet_2024_110450 crossref_primary_10_1007_s42979_024_03375_2 |
Cites_doi | 10.17487/rfc3971 10.1007/s13369-019-03752-7 10.1016/j.adhoc.2015.05.014 10.1016/j.pmcj.2015.12.003 10.1109/JSYST.2013.2260942 10.1007/s10916-014-0136-8 10.1007/s11042-017-4390-x 10.1109/ACCESS.2017.2695525 10.1142/S0129626411000047 10.1109/ECS.2014.6892510 10.1145/3098954.3098975 10.1016/j.mcm.2012.06.033 10.1016/j.adhoc.2014.03.003 10.1109/JSEN.2015.2475298 10.1016/j.jnca.2012.03.011 10.1007/s12652-017-0520-6 10.4218/etrij.10.1510.0134 10.1007/s12652-016-0345-8 10.1109/MSP.2012.28 10.1109/TETC.2015.2392380 10.1109/LSENS.2019.2905020 10.1002/dac.2644 10.1007/s10916-016-0521-6 10.1002/dac.2368 10.1016/j.comcom.2005.09.002 10.1109/ACCESS.2017.2676119 10.1007/s11227-017-2048-0 10.3390/s100302450 10.1007/s10916-018-0921-x 10.1007/s12083-014-0324-9 10.17487/rfc7136 10.1007/s10916-015-0307-2 10.1016/j.pmcj.2015.08.001 10.3390/s120201625 10.1109/TMC.2013.134 10.1109/JSYST.2014.2301517 |
ContentType | Journal Article |
Copyright | 2020 Elsevier B.V. |
Copyright_xml | – notice: 2020 Elsevier B.V. |
DBID | AAYXX CITATION |
DOI | 10.1016/j.comcom.2020.11.017 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1873-703X |
EndPage | 164 |
ExternalDocumentID | 10_1016_j_comcom_2020_11_017 S014036642032003X |
GroupedDBID | --K --M .DC .~1 0R~ 1B1 1~. 1~5 4.4 457 4G. 5GY 5VS 7-5 71M 77K 8P~ 9JN AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABBOA ABFNM ABMAC ABYKQ ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD AXJTR BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EO8 EO9 EP2 EP3 FDB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ IHE J1W JJJVA KOM LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 ROL RPZ RXW SDF SDG SDP SES SPC SPCBC SST SSV SSZ T5K WH7 ZMT ~G- 07C 29F AAQXK AATTM AAXKI AAYWO AAYXX ABJNI ABWVN ABXDB ACNNM ACRPL ACVFH ADCNI ADJOM ADMUD ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AI. AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP ASPBG AVWKF AZFZN BNPGV CITATION EJD F0J FEDTE FGOYB HLZ HVGLF HZ~ R2- RIG SBC SEW SSH TAE UHS VH1 VOH WUQ XPP ZY4 |
ID | FETCH-LOGICAL-c306t-c102fdaf18e28a210ac4deeda1c790075fd6b2945a28e94e57a240573622c0713 |
IEDL.DBID | .~1 |
ISSN | 0140-3664 |
IngestDate | Tue Jul 01 02:43:06 EDT 2025 Thu Apr 24 23:05:27 EDT 2025 Fri Feb 23 02:48:21 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Extended unique identifier Medical cloud server Interface identifier Medical internet of things |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c306t-c102fdaf18e28a210ac4deeda1c790075fd6b2945a28e94e57a240573622c0713 |
PageCount | 11 |
ParticipantIDs | crossref_citationtrail_10_1016_j_comcom_2020_11_017 crossref_primary_10_1016_j_comcom_2020_11_017 elsevier_sciencedirect_doi_10_1016_j_comcom_2020_11_017 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2021-01-15 |
PublicationDateYYYYMMDD | 2021-01-15 |
PublicationDate_xml | – month: 01 year: 2021 text: 2021-01-15 day: 15 |
PublicationDecade | 2020 |
PublicationTitle | Computer communications |
PublicationYear | 2021 |
Publisher | Elsevier B.V |
Publisher_xml | – name: Elsevier B.V |
References | Kumar, Lee, Lee (b31) 2012; 12 Xu, Wu (b58) 2019; 44 Pecorella (b50) 2014 Chang, Wu, Sun (b35) 2017; 38 Kalra, Sood (b36) 2015; 24 Wu, Xu, Kumari, Li (b42) 2017; 8 M.F. Ayub, K. Mahmood, S. Kumari, A.K. Sangaiah, et al. Lightweight authentication protocol for e-health clouds in iot based applications through 5g technology, Digital Communications and Networks. P. Kumar, L. Chouhan, Design of secure session key using unique addressing and identification scheme for smart home internet of things network, Trans. Emerg. Telecommun. Technol., e3993. Carpenter, Jiang (b16) 2014 Dey, Hossain (b53) 2019; 3 Dunlop, Groat, Urbanski, Marchany, Tront (b12) 2012; 10 J. Lim, M. Han, J. Kim, Implementation of light-weight IKE protocol for IPsec VPN within router, in: The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005. 1, 2005, pp. 81–84. Wang, Wang (b32) 2014; 20 Lee, Li, Chen (b26) 2011; 21 V.K. Yadav, S. Batham, M. Jain, S. Sharma, An approach to electronic voting system using UIDAI, in: 2014 International Conference on Electronics and Communication Systems (ICECS), 2014, pp. 1–4. Chen, Shih (b23) 2010; 32 He, Gao, Chan, Chen, Bu (b24) 2010; 10 C. Bhatt, N. Dey, A.S. Ashour, Internet of things and big data technologies for next generation healthcare. Chen, Thombre, Järvinen, Lohan, Alén-Savikko, Leppäkoski, Bhuiyan, Bu-Pasha, Ferrara, Honkala, Lindqvist, Ruotsalainen, Korpisaari, Kuusniemi (b1) 2017; 5 F. Gont, A. Cooper, D. Thaler, W. Liu, Recommendation on stable ipv6 interface identifiers, The Internet Engineering Task Force, RFC 8064. Kumar, Chouhan (b9) 2020 Beijnum (b3) 2005 Agrawal, Zhou, Chang (b8) 2019 Dey, Ashour, Shi, Fong, Tavares (b21) 2018; 42 Das, Sharma, Chatterjee, Sing (b30) 2012; 35 Amin, Islam, Biswas, Khan, Obaidat (b41) 2015; 39 D.Evans (b2) 2011; 1 Han, Hwang (b19) 2006; 29 Khan, Alghathbar (b25) 2010; 10 Vaidya, Makrakis, Mouftah (b27) 2010 Das (b39) 2016; 9 Jo, Paik, Lee (b48) 2013; 13 F. Gont, et al. A method for generating semantically opaque interface identifiers with ipv6 stateless address autoconfiguration (slaac), IETF RFC 7217. Siddiqui, Singh (b17) 2015; 6 Dey, Tamane (b7) 2018 Challa, Wazid, Das, Kumar, Reddy, Yoon, Yoo (b55) 2017; 5 Farash, Nawaz, Mahmood, Chaudhry, Khan (b33) 2016; 40 Jiang, Ma, Li, Li (b37) 2015; 28 Chikouche, Cayrel, Boidje (b56) 2019 Dey, Ashour, Bhatt (b22) 2017 Saxena, Shaw, Verma (b40) 2019 Farash, Turkanović, Kumari, Hölbl (b43) 2016; 36 Kumari, Karuppiah, Das, Li, Wu, Kumar (b57) 2018; 74 G. Malkin, R. Minnear, Ripng for ipv6, IETF RFC 2080. Riley, Henderson (b47) 2010 Nicanfar, Jokar, Beznosov, Leung (b34) 2013; 8 Kumari, Das, Li, Wu, Khan, Jiang, Islam (b45) 2018; 77 Li, Ma, Wang, Xiong, Zhang (b28) 2013; 58 Tseng, Huang, Tsai, Ke (b49) 2015; 4 Sarowar, Kamal, Dey (b4) 2019 Arshad, Nikooghadam (b29) 2014; 38 Arkko, Kempf (b15) 2005 Kumar, Gurtov, Iinatti, Ylianttila, Sain (b52) 2015; 16 He, Wang (b59) 2014; 9 Elhayatmy, Dey, Ashour (b5) 2018 Chen, Kuo, Wuu (b38) 2014; 27 Verma, Sood, Kalra (b44) 2018; 9 AVISPA (b54) 2015 A. Judmayer, J. Ullrich, G. Merzdovnik, A.G. Voyiatzis, E. Weippl, Lightweight address hopping for defending the ipv6 iot, in: Proceedings of the 12th International Conference on Availability, Reliability and Security, 2017, pp. 1–10. Elhayatmy (10.1016/j.comcom.2020.11.017_b5) 2018 Dey (10.1016/j.comcom.2020.11.017_b7) 2018 Amin (10.1016/j.comcom.2020.11.017_b41) 2015; 39 AVISPA (10.1016/j.comcom.2020.11.017_b54) 2015 Carpenter (10.1016/j.comcom.2020.11.017_b16) 2014 Challa (10.1016/j.comcom.2020.11.017_b55) 2017; 5 Chen (10.1016/j.comcom.2020.11.017_b38) 2014; 27 Dunlop (10.1016/j.comcom.2020.11.017_b12) 2012; 10 Chikouche (10.1016/j.comcom.2020.11.017_b56) 2019 Verma (10.1016/j.comcom.2020.11.017_b44) 2018; 9 Jo (10.1016/j.comcom.2020.11.017_b48) 2013; 13 Kumar (10.1016/j.comcom.2020.11.017_b9) 2020 Han (10.1016/j.comcom.2020.11.017_b19) 2006; 29 10.1016/j.comcom.2020.11.017_b46 Chen (10.1016/j.comcom.2020.11.017_b1) 2017; 5 Arshad (10.1016/j.comcom.2020.11.017_b29) 2014; 38 Dey (10.1016/j.comcom.2020.11.017_b21) 2018; 42 Wang (10.1016/j.comcom.2020.11.017_b32) 2014; 20 Kalra (10.1016/j.comcom.2020.11.017_b36) 2015; 24 Agrawal (10.1016/j.comcom.2020.11.017_b8) 2019 He (10.1016/j.comcom.2020.11.017_b59) 2014; 9 10.1016/j.comcom.2020.11.017_b18 Chen (10.1016/j.comcom.2020.11.017_b23) 2010; 32 Wu (10.1016/j.comcom.2020.11.017_b42) 2017; 8 Khan (10.1016/j.comcom.2020.11.017_b25) 2010; 10 Sarowar (10.1016/j.comcom.2020.11.017_b4) 2019 10.1016/j.comcom.2020.11.017_b14 Riley (10.1016/j.comcom.2020.11.017_b47) 2010 10.1016/j.comcom.2020.11.017_b13 D.Evans (10.1016/j.comcom.2020.11.017_b2) 2011; 1 Das (10.1016/j.comcom.2020.11.017_b30) 2012; 35 Tseng (10.1016/j.comcom.2020.11.017_b49) 2015; 4 Dey (10.1016/j.comcom.2020.11.017_b22) 2017 Xu (10.1016/j.comcom.2020.11.017_b58) 2019; 44 Lee (10.1016/j.comcom.2020.11.017_b26) 2011; 21 Kumari (10.1016/j.comcom.2020.11.017_b57) 2018; 74 Chang (10.1016/j.comcom.2020.11.017_b35) 2017; 38 Das (10.1016/j.comcom.2020.11.017_b39) 2016; 9 Dey (10.1016/j.comcom.2020.11.017_b53) 2019; 3 Siddiqui (10.1016/j.comcom.2020.11.017_b17) 2015; 6 10.1016/j.comcom.2020.11.017_b10 10.1016/j.comcom.2020.11.017_b11 Farash (10.1016/j.comcom.2020.11.017_b33) 2016; 40 10.1016/j.comcom.2020.11.017_b51 Li (10.1016/j.comcom.2020.11.017_b28) 2013; 58 Jiang (10.1016/j.comcom.2020.11.017_b37) 2015; 28 Vaidya (10.1016/j.comcom.2020.11.017_b27) 2010 Pecorella (10.1016/j.comcom.2020.11.017_b50) 2014 Kumari (10.1016/j.comcom.2020.11.017_b45) 2018; 77 Beijnum (10.1016/j.comcom.2020.11.017_b3) 2005 He (10.1016/j.comcom.2020.11.017_b24) 2010; 10 Farash (10.1016/j.comcom.2020.11.017_b43) 2016; 36 Kumar (10.1016/j.comcom.2020.11.017_b31) 2012; 12 Nicanfar (10.1016/j.comcom.2020.11.017_b34) 2013; 8 Kumar (10.1016/j.comcom.2020.11.017_b52) 2015; 16 10.1016/j.comcom.2020.11.017_b6 Saxena (10.1016/j.comcom.2020.11.017_b40) 2019 Arkko (10.1016/j.comcom.2020.11.017_b15) 2005 10.1016/j.comcom.2020.11.017_b20 |
References_xml | – start-page: 1 year: 2019 end-page: 12 ident: b40 article-title: A novel hash-based mutual rfid tag authentication protocol publication-title: Data and Communication Networks – volume: 1 start-page: 1 year: 2011 end-page: 11 ident: b2 article-title: The internet of things how the next evolution of the internet is changing everything publication-title: CISCO white paper – year: 2005 ident: b3 article-title: Ipv4 address consumption publication-title: The Internet Protocol J. – volume: 58 start-page: 85 year: 2013 end-page: 95 ident: b28 article-title: A novel smart card and dynamic id based remote user authentication scheme for multi-server environments publication-title: Math. Comput. Modelling – volume: 9 start-page: 223 year: 2016 end-page: 244 ident: b39 article-title: A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks publication-title: Peer-to-peer Netw. Appl. – year: 2015 ident: b54 article-title: Automated validation of internet security protocols and applications – volume: 42 start-page: 74 year: 2018 ident: b21 article-title: Medical cyber-physical systems: A survey publication-title: J. Med. Syst. – year: 2014 ident: b50 article-title: Ripng Simple Network – volume: 6 start-page: 40 year: 2015 end-page: 43 ident: b17 article-title: Aadhar management system publication-title: IITM J. Manage. IT – volume: 39 start-page: 137 year: 2015 ident: b41 article-title: Design and analysis of an enhanced patient-server mutual authentication protocol for telecare medical information system publication-title: J. Med. Syst. – reference: M.F. Ayub, K. Mahmood, S. Kumari, A.K. Sangaiah, et al. Lightweight authentication protocol for e-health clouds in iot based applications through 5g technology, Digital Communications and Networks. – volume: 29 start-page: 1422 year: 2006 end-page: 1432 ident: b19 article-title: Care-of address provisioning for efficient ipv6 mobility support publication-title: Comput. Commun. – reference: A. Judmayer, J. Ullrich, G. Merzdovnik, A.G. Voyiatzis, E. Weippl, Lightweight address hopping for defending the ipv6 iot, in: Proceedings of the 12th International Conference on Availability, Reliability and Security, 2017, pp. 1–10. – volume: 12 start-page: 1625 year: 2012 end-page: 1647 ident: b31 article-title: E-sap: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks publication-title: Sensors – volume: 13 start-page: 1469 year: 2013 end-page: 1481 ident: b48 article-title: Efficient privacy-preserving authentication in wireless mobile networks publication-title: IEEE Trans. Mob. Comput. – reference: C. Bhatt, N. Dey, A.S. Ashour, Internet of things and big data technologies for next generation healthcare. – volume: 28 start-page: 383 year: 2015 end-page: 393 ident: b37 article-title: Improvement of robust smart-card-based password authentication scheme publication-title: Int. J. Commun. Syst. – volume: 10 start-page: 361 year: 2010 end-page: 371 ident: b24 article-title: An enhanced two-factor user authentication scheme in wireless sensor networks publication-title: Ad Hoc Sens. Wirel. Netw. – volume: 3 start-page: 1 year: 2019 end-page: 4 ident: b53 article-title: Session-key establishment and authentication in a smart home network using public key cryptography publication-title: IEEE Sensors Lett. – start-page: 1 year: 2019 end-page: 31 ident: b56 article-title: A privacy-preserving code-based authentication protocol for internet of things publication-title: J. Supercomput. – volume: 5 start-page: 3028 year: 2017 end-page: 3043 ident: b55 article-title: Secure signature-based authenticated key establishment scheme for future iot applications publication-title: IEEE Access – reference: V.K. Yadav, S. Batham, M. Jain, S. Sharma, An approach to electronic voting system using UIDAI, in: 2014 International Conference on Electronics and Communication Systems (ICECS), 2014, pp. 1–4. – start-page: 1 year: 2020 end-page: 19 ident: b9 article-title: A secure authentication scheme for iot application in smart home publication-title: Peer-to-Peer Netw. Appl. – volume: 9 start-page: 816 year: 2014 end-page: 823 ident: b59 article-title: Robust biometrics-based authentication scheme for multiserver environment publication-title: IEEE Systems J. – volume: 4 start-page: 102 year: 2015 end-page: 112 ident: b49 article-title: List-free id-based mutual authentication and key agreement protocol for multiserver architectures publication-title: IEEE Trans. Emerg. Top. Comput. – year: 2018 ident: b7 article-title: Big Data Analytics for Smart and Connected Cities – reference: P. Kumar, L. Chouhan, Design of secure session key using unique addressing and identification scheme for smart home internet of things network, Trans. Emerg. Telecommun. Technol., e3993. – volume: 20 start-page: 1 year: 2014 end-page: 15 ident: b32 article-title: Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks publication-title: Ad Hoc Netw. – volume: 35 start-page: 1646 year: 2012 end-page: 1656 ident: b30 article-title: A dynamic password-based user authentication scheme for hierarchical wireless sensor networks publication-title: J. Netw. Comput. Appl. – volume: 24 start-page: 210 year: 2015 end-page: 223 ident: b36 article-title: Secure authentication scheme for iot and cloud servers publication-title: Pervasive Mob. Comput. – volume: 9 start-page: 1293 year: 2018 end-page: 1309 ident: b44 article-title: Cloud-centric iot based student healthcare monitoring framework publication-title: J. Ambient Intell. Humaniz. Comput. – start-page: 71 year: 2019 end-page: 94 ident: b8 article-title: A survey on lightweight authenticated encryption and challenges for securing industrial iot publication-title: Security and Privacy Trends in the Industrial Internet of Things – volume: 10 start-page: 2450 year: 2010 end-page: 2459 ident: b25 article-title: Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’ publication-title: Sensors – volume: 77 start-page: 2359 year: 2018 end-page: 2389 ident: b45 article-title: A provably secure biometrics-based authenticated key agreement scheme for multi-server environments publication-title: Multimedia Tools Appl. – volume: 32 start-page: 704 year: 2010 end-page: 712 ident: b23 article-title: A robust mutual authentication protocol for wireless sensor networks publication-title: ETRI J. – year: 2005 ident: b15 article-title: Secure neighbor discovery (send) – start-page: 600 year: 2010 end-page: 606 ident: b27 article-title: Improved two-factor user authentication in wireless sensor networks publication-title: 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications – reference: J. Lim, M. Han, J. Kim, Implementation of light-weight IKE protocol for IPsec VPN within router, in: The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005. 1, 2005, pp. 81–84. – start-page: 3 year: 2017 end-page: 12 ident: b22 article-title: Internet of things driven connected healthcare publication-title: Internet of Things and Big Data Technologies for Next Generation Healthcare – volume: 10 start-page: 35 year: 2012 end-page: 43 ident: b12 article-title: The blind man’s bluff approach to security using ipv6 publication-title: IEEE Security Privacy – year: 2014 ident: b16 article-title: Significance of ipv6 interface identifiers – reference: F. Gont, A. Cooper, D. Thaler, W. Liu, Recommendation on stable ipv6 interface identifiers, The Internet Engineering Task Force, RFC 8064. – volume: 8 start-page: 101 year: 2017 end-page: 116 ident: b42 article-title: A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security publication-title: J. Ambient Intell. Humaniz. Comput. – volume: 44 start-page: 3977 year: 2019 end-page: 3993 ident: b58 article-title: A lightweight authentication scheme for multi-gateway wireless sensor networks under iot conception publication-title: Arab. J. Sci. Eng. – volume: 8 start-page: 629 year: 2013 end-page: 640 ident: b34 article-title: Efficient authentication and key management mechanisms for smart grid communications publication-title: IEEE Syst. J. – start-page: 3 year: 2018 end-page: 20 ident: b5 article-title: Internet of things based wireless body area network in healthcare publication-title: Internet of Things and Big Data Analytics Toward Next-Generation Intelligence – volume: 36 start-page: 152 year: 2016 end-page: 176 ident: b43 article-title: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment publication-title: Ad Hoc Netw. – reference: F. Gont, et al. A method for generating semantically opaque interface identifiers with ipv6 stateless address autoconfiguration (slaac), IETF RFC 7217. – volume: 74 start-page: 6428 year: 2018 end-page: 6453 ident: b57 article-title: A secure authentication scheme based on elliptic curve cryptography for iot and cloud servers publication-title: J. Supercomput. – reference: G. Malkin, R. Minnear, Ripng for ipv6, IETF RFC 2080. – volume: 38 start-page: 136 year: 2014 ident: b29 article-title: Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems publication-title: J. Med. Syst. – start-page: 15 year: 2010 end-page: 34 ident: b47 article-title: The NS-3 network simulator publication-title: Modeling and Tools for Network Simulation – volume: 27 start-page: 377 year: 2014 end-page: 389 ident: b38 article-title: Robust smart-card-based remote user password authentication scheme publication-title: Int. J. Commun. Syst. – volume: 5 start-page: 8956 year: 2017 end-page: 8977 ident: b1 article-title: Robustness, security and privacy in location-based services for future iot: A survey publication-title: IEEE Access – volume: 40 start-page: 165 year: 2016 ident: b33 article-title: A provably secure rfid authentication protocol based on elliptic curve for healthcare environments publication-title: J. Med. Syst. – volume: 38 start-page: 275 year: 2017 end-page: 278 ident: b35 article-title: Notes on secure authentication scheme for iot and cloud servers publication-title: Pervasive Mob. Comput. – start-page: 103 year: 2019 end-page: 136 ident: b4 article-title: Internet of things and its impacts in computing intelligence: a comprehensive review–iot application for big data publication-title: Big Data Analytics for Smart and Connected Cities – volume: 21 start-page: 21 year: 2011 end-page: 26 ident: b26 article-title: Two attacks on a two-factor user authentication in wireless sensor networks publication-title: Parallel Process. Lett. – volume: 16 start-page: 254 year: 2015 end-page: 264 ident: b52 article-title: Lightweight and secure session-key establishment scheme in smart home environments publication-title: IEEE Sens. J. – year: 2005 ident: 10.1016/j.comcom.2020.11.017_b15 article-title: Secure neighbor discovery (send) doi: 10.17487/rfc3971 – ident: 10.1016/j.comcom.2020.11.017_b11 – start-page: 3 year: 2017 ident: 10.1016/j.comcom.2020.11.017_b22 article-title: Internet of things driven connected healthcare – volume: 44 start-page: 3977 issue: 4 year: 2019 ident: 10.1016/j.comcom.2020.11.017_b58 article-title: A lightweight authentication scheme for multi-gateway wireless sensor networks under iot conception publication-title: Arab. J. Sci. Eng. doi: 10.1007/s13369-019-03752-7 – volume: 36 start-page: 152 year: 2016 ident: 10.1016/j.comcom.2020.11.017_b43 article-title: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment publication-title: Ad Hoc Netw. doi: 10.1016/j.adhoc.2015.05.014 – year: 2005 ident: 10.1016/j.comcom.2020.11.017_b3 article-title: Ipv4 address consumption publication-title: The Internet Protocol J. – volume: 38 start-page: 275 year: 2017 ident: 10.1016/j.comcom.2020.11.017_b35 article-title: Notes on secure authentication scheme for iot and cloud servers publication-title: Pervasive Mob. Comput. doi: 10.1016/j.pmcj.2015.12.003 – volume: 8 start-page: 629 issue: 2 year: 2013 ident: 10.1016/j.comcom.2020.11.017_b34 article-title: Efficient authentication and key management mechanisms for smart grid communications publication-title: IEEE Syst. J. doi: 10.1109/JSYST.2013.2260942 – year: 2014 ident: 10.1016/j.comcom.2020.11.017_b50 – year: 2018 ident: 10.1016/j.comcom.2020.11.017_b7 – volume: 1 start-page: 1 year: 2011 ident: 10.1016/j.comcom.2020.11.017_b2 article-title: The internet of things how the next evolution of the internet is changing everything publication-title: CISCO white paper – volume: 38 start-page: 136 issue: 12 year: 2014 ident: 10.1016/j.comcom.2020.11.017_b29 article-title: Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems publication-title: J. Med. Syst. doi: 10.1007/s10916-014-0136-8 – start-page: 3 year: 2018 ident: 10.1016/j.comcom.2020.11.017_b5 article-title: Internet of things based wireless body area network in healthcare – volume: 77 start-page: 2359 issue: 2 year: 2018 ident: 10.1016/j.comcom.2020.11.017_b45 article-title: A provably secure biometrics-based authenticated key agreement scheme for multi-server environments publication-title: Multimedia Tools Appl. doi: 10.1007/s11042-017-4390-x – start-page: 71 year: 2019 ident: 10.1016/j.comcom.2020.11.017_b8 article-title: A survey on lightweight authenticated encryption and challenges for securing industrial iot – volume: 5 start-page: 8956 year: 2017 ident: 10.1016/j.comcom.2020.11.017_b1 article-title: Robustness, security and privacy in location-based services for future iot: A survey publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2695525 – volume: 21 start-page: 21 issue: 01 year: 2011 ident: 10.1016/j.comcom.2020.11.017_b26 article-title: Two attacks on a two-factor user authentication in wireless sensor networks publication-title: Parallel Process. Lett. doi: 10.1142/S0129626411000047 – ident: 10.1016/j.comcom.2020.11.017_b18 doi: 10.1109/ECS.2014.6892510 – volume: 10 start-page: 361 issue: 4 year: 2010 ident: 10.1016/j.comcom.2020.11.017_b24 article-title: An enhanced two-factor user authentication scheme in wireless sensor networks publication-title: Ad Hoc Sens. Wirel. Netw. – ident: 10.1016/j.comcom.2020.11.017_b20 doi: 10.1145/3098954.3098975 – start-page: 600 year: 2010 ident: 10.1016/j.comcom.2020.11.017_b27 article-title: Improved two-factor user authentication in wireless sensor networks – start-page: 1 year: 2019 ident: 10.1016/j.comcom.2020.11.017_b56 article-title: A privacy-preserving code-based authentication protocol for internet of things publication-title: J. Supercomput. – start-page: 1 year: 2019 ident: 10.1016/j.comcom.2020.11.017_b40 article-title: A novel hash-based mutual rfid tag authentication protocol – ident: 10.1016/j.comcom.2020.11.017_b51 – volume: 58 start-page: 85 issue: 1–2 year: 2013 ident: 10.1016/j.comcom.2020.11.017_b28 article-title: A novel smart card and dynamic id based remote user authentication scheme for multi-server environments publication-title: Math. Comput. Modelling doi: 10.1016/j.mcm.2012.06.033 – volume: 20 start-page: 1 year: 2014 ident: 10.1016/j.comcom.2020.11.017_b32 article-title: Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks publication-title: Ad Hoc Netw. doi: 10.1016/j.adhoc.2014.03.003 – volume: 16 start-page: 254 issue: 1 year: 2015 ident: 10.1016/j.comcom.2020.11.017_b52 article-title: Lightweight and secure session-key establishment scheme in smart home environments publication-title: IEEE Sens. J. doi: 10.1109/JSEN.2015.2475298 – volume: 35 start-page: 1646 issue: 5 year: 2012 ident: 10.1016/j.comcom.2020.11.017_b30 article-title: A dynamic password-based user authentication scheme for hierarchical wireless sensor networks publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2012.03.011 – ident: 10.1016/j.comcom.2020.11.017_b13 – start-page: 1 year: 2020 ident: 10.1016/j.comcom.2020.11.017_b9 article-title: A secure authentication scheme for iot application in smart home publication-title: Peer-to-Peer Netw. Appl. – volume: 9 start-page: 1293 issue: 5 year: 2018 ident: 10.1016/j.comcom.2020.11.017_b44 article-title: Cloud-centric iot based student healthcare monitoring framework publication-title: J. Ambient Intell. Humaniz. Comput. doi: 10.1007/s12652-017-0520-6 – volume: 32 start-page: 704 issue: 5 year: 2010 ident: 10.1016/j.comcom.2020.11.017_b23 article-title: A robust mutual authentication protocol for wireless sensor networks publication-title: ETRI J. doi: 10.4218/etrij.10.1510.0134 – volume: 8 start-page: 101 issue: 1 year: 2017 ident: 10.1016/j.comcom.2020.11.017_b42 article-title: A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security publication-title: J. Ambient Intell. Humaniz. Comput. doi: 10.1007/s12652-016-0345-8 – volume: 10 start-page: 35 issue: 4 year: 2012 ident: 10.1016/j.comcom.2020.11.017_b12 article-title: The blind man’s bluff approach to security using ipv6 publication-title: IEEE Security Privacy doi: 10.1109/MSP.2012.28 – volume: 4 start-page: 102 issue: 1 year: 2015 ident: 10.1016/j.comcom.2020.11.017_b49 article-title: List-free id-based mutual authentication and key agreement protocol for multiserver architectures publication-title: IEEE Trans. Emerg. Top. Comput. doi: 10.1109/TETC.2015.2392380 – volume: 3 start-page: 1 issue: 4 year: 2019 ident: 10.1016/j.comcom.2020.11.017_b53 article-title: Session-key establishment and authentication in a smart home network using public key cryptography publication-title: IEEE Sensors Lett. doi: 10.1109/LSENS.2019.2905020 – volume: 28 start-page: 383 issue: 2 year: 2015 ident: 10.1016/j.comcom.2020.11.017_b37 article-title: Improvement of robust smart-card-based password authentication scheme publication-title: Int. J. Commun. Syst. doi: 10.1002/dac.2644 – volume: 40 start-page: 165 issue: 7 year: 2016 ident: 10.1016/j.comcom.2020.11.017_b33 article-title: A provably secure rfid authentication protocol based on elliptic curve for healthcare environments publication-title: J. Med. Syst. doi: 10.1007/s10916-016-0521-6 – volume: 27 start-page: 377 issue: 2 year: 2014 ident: 10.1016/j.comcom.2020.11.017_b38 article-title: Robust smart-card-based remote user password authentication scheme publication-title: Int. J. Commun. Syst. doi: 10.1002/dac.2368 – volume: 29 start-page: 1422 issue: 9 year: 2006 ident: 10.1016/j.comcom.2020.11.017_b19 article-title: Care-of address provisioning for efficient ipv6 mobility support publication-title: Comput. Commun. doi: 10.1016/j.comcom.2005.09.002 – volume: 5 start-page: 3028 year: 2017 ident: 10.1016/j.comcom.2020.11.017_b55 article-title: Secure signature-based authenticated key establishment scheme for future iot applications publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2676119 – ident: 10.1016/j.comcom.2020.11.017_b10 – ident: 10.1016/j.comcom.2020.11.017_b6 – ident: 10.1016/j.comcom.2020.11.017_b14 – volume: 74 start-page: 6428 issue: 12 year: 2018 ident: 10.1016/j.comcom.2020.11.017_b57 article-title: A secure authentication scheme based on elliptic curve cryptography for iot and cloud servers publication-title: J. Supercomput. doi: 10.1007/s11227-017-2048-0 – start-page: 103 year: 2019 ident: 10.1016/j.comcom.2020.11.017_b4 article-title: Internet of things and its impacts in computing intelligence: a comprehensive review–iot application for big data – volume: 10 start-page: 2450 issue: 3 year: 2010 ident: 10.1016/j.comcom.2020.11.017_b25 article-title: Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’ publication-title: Sensors doi: 10.3390/s100302450 – volume: 42 start-page: 74 issue: 4 year: 2018 ident: 10.1016/j.comcom.2020.11.017_b21 article-title: Medical cyber-physical systems: A survey publication-title: J. Med. Syst. doi: 10.1007/s10916-018-0921-x – volume: 6 start-page: 40 issue: 1 year: 2015 ident: 10.1016/j.comcom.2020.11.017_b17 article-title: Aadhar management system publication-title: IITM J. Manage. IT – volume: 9 start-page: 223 issue: 1 year: 2016 ident: 10.1016/j.comcom.2020.11.017_b39 article-title: A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks publication-title: Peer-to-peer Netw. Appl. doi: 10.1007/s12083-014-0324-9 – year: 2014 ident: 10.1016/j.comcom.2020.11.017_b16 article-title: Significance of ipv6 interface identifiers doi: 10.17487/rfc7136 – volume: 39 start-page: 137 issue: 11 year: 2015 ident: 10.1016/j.comcom.2020.11.017_b41 article-title: Design and analysis of an enhanced patient-server mutual authentication protocol for telecare medical information system publication-title: J. Med. Syst. doi: 10.1007/s10916-015-0307-2 – ident: 10.1016/j.comcom.2020.11.017_b46 – start-page: 15 year: 2010 ident: 10.1016/j.comcom.2020.11.017_b47 article-title: The NS-3 network simulator – year: 2015 ident: 10.1016/j.comcom.2020.11.017_b54 – volume: 24 start-page: 210 year: 2015 ident: 10.1016/j.comcom.2020.11.017_b36 article-title: Secure authentication scheme for iot and cloud servers publication-title: Pervasive Mob. Comput. doi: 10.1016/j.pmcj.2015.08.001 – volume: 12 start-page: 1625 issue: 2 year: 2012 ident: 10.1016/j.comcom.2020.11.017_b31 article-title: E-sap: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks publication-title: Sensors doi: 10.3390/s120201625 – volume: 13 start-page: 1469 issue: 7 year: 2013 ident: 10.1016/j.comcom.2020.11.017_b48 article-title: Efficient privacy-preserving authentication in wireless mobile networks publication-title: IEEE Trans. Mob. Comput. doi: 10.1109/TMC.2013.134 – volume: 9 start-page: 816 issue: 3 year: 2014 ident: 10.1016/j.comcom.2020.11.017_b59 article-title: Robust biometrics-based authentication scheme for multiserver environment publication-title: IEEE Systems J. doi: 10.1109/JSYST.2014.2301517 |
SSID | ssj0004773 |
Score | 2.5069242 |
Snippet | Due to rapid increase rate of smart medical devices, the existing security internet of things (IoT) protocols cannot guaranty to perform better in-term of... |
SourceID | crossref elsevier |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 154 |
SubjectTerms | Extended unique identifier Interface identifier Medical cloud server Medical internet of things |
Title | A privacy and session key based authentication scheme for medical IoT networks |
URI | https://dx.doi.org/10.1016/j.comcom.2020.11.017 |
Volume | 166 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEF5KvehBfOKz7MHrtnlsHnssxdIq9NRCb2Gzu4GKTUsbBS_-dmeyG60gCl7DbgiTyXzfZL-ZIeQuBMwAHAkZoLlkXPo-E1GUMykKkeQ6hwyiVltM4tGMP8yjeYsMmloYlFW62G9jeh2t3ZWes2ZvvVj0allSGAN_xhngXjjHCnaeoJd3379kHjyxp8woY8TVTflcrfGCe6NmJADO1MVenvXYsh_gaQdyhkfk0HFF2rePc0xapjwhBzsdBE_JpE_Xm8WrVG9UlppubZcNCl8mRXzSVKKCvazcnzkKuaxZGgpMlS7tEQ0dr6a0tGLw7RmZDe-ngxFzIxKYAq5fMQX8oNCy8FMTpBLSN6m4BtiTvkoE0oFCx3kgeCSD1AhuokQGSNEAtgKFCeo5aZer0lxg8TYW2RouICPiJo0k155Rwis0vGYTp5ckbCyTKdc_HMdYPGeNUOwps_bM0J6QWmRgz0vCPnetbf-MP9YnjdGzb36QQYj_defVv3dek_0AlSqez_zohrSrzYu5BapR5Z3alzpkrz9-HE0-AFpI0qA |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEF5qe1AP4hPrcw9e1-a1SfZYiqW1NacWels2mw1UbFraKPjvnclDK4iC15AJYbI73zfZb2YIuXMBMwBHXAZorpinbJsJzmOmRCqCOIkhgyjUFpE_mHqPMz5rkF5dC4Oyyir2lzG9iNbVlU7lzc5qPu8UsiTXB_6MM8Atd7ZDWtidijdJqzscDaKv8sigPGhGJSMa1BV0hcwLHo-yEQdo0z228ywml_2AUFuo0z8kBxVdpN3yjY5Iw2THZH-rieAJibp0tZ6_Kf1OVZbQTdlog8LmpAhRCVUoYs_y6ucchXTWLAwFskoX5SkNHS4nNCv14JtTMu0_THoDVk1JYBrofs40UIQ0UakdGidUkMEp7SWAfMrWgUBGkCZ-7AiPKyc0wjM8UA6yNEAuR2OOekaa2TIz51i_jXW2xhOQFHkm5MpLLKOFlSbwpY0ftolbe0bqqoU4TrJ4kbVW7FmW_pToT8guJPizTdin1apsofHH_UHtdPltKUiI8r9aXvzb8pbsDiZPYzkeRqNLsuegcMWymc2vSDNfv5prYB55fFOtrA-g89VR |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+privacy+and+session+key+based+authentication+scheme+for+medical+IoT+networks&rft.jtitle=Computer+communications&rft.au=Kumar%2C+Pankaj&rft.au=Chouhan%2C+Lokesh&rft.date=2021-01-15&rft.issn=0140-3664&rft.volume=166&rft.spage=154&rft.epage=164&rft_id=info:doi/10.1016%2Fj.comcom.2020.11.017&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_comcom_2020_11_017 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0140-3664&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0140-3664&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0140-3664&client=summon |