A privacy and session key based authentication scheme for medical IoT networks

Due to rapid increase rate of smart medical devices, the existing security internet of things (IoT) protocols cannot guaranty to perform better in-term of various threats. In this paper, the Secure Addressing and Mutual Authentication protocol (SAMA) scheme is proposed to protect the network from mu...

Full description

Saved in:
Bibliographic Details
Published inComputer communications Vol. 166; pp. 154 - 164
Main Authors Kumar, Pankaj, Chouhan, Lokesh
Format Journal Article
LanguageEnglish
Published Elsevier B.V 15.01.2021
Subjects
Online AccessGet full text
ISSN0140-3664
1873-703X
DOI10.1016/j.comcom.2020.11.017

Cover

Loading…
Abstract Due to rapid increase rate of smart medical devices, the existing security internet of things (IoT) protocols cannot guaranty to perform better in-term of various threats. In this paper, the Secure Addressing and Mutual Authentication protocol (SAMA) scheme is proposed to protect the network from multiple attacks. The SAMA scheme uses the unique addressing and identification method to authenticates the smart medical monitoring devices, so that they can uniquely identifies in medical IoT network. Additionally, the proposed scheme also preserves anonymity with the help of session key establishment to secure communication between the user and medical server. The performance of SAMA scheme has been evaluated in-term of functionality, computation and communication cost, and results are compared with existing schemes. Finally for security, the proposed scheme is also analyzed formally and informally using AVISPA tool and widely-accepted BAN logic model. The security analysis shows that the SAMA scheme ensures security against, such as, impersonation, password guessing, man-in-the-middle attack replay, etc.
AbstractList Due to rapid increase rate of smart medical devices, the existing security internet of things (IoT) protocols cannot guaranty to perform better in-term of various threats. In this paper, the Secure Addressing and Mutual Authentication protocol (SAMA) scheme is proposed to protect the network from multiple attacks. The SAMA scheme uses the unique addressing and identification method to authenticates the smart medical monitoring devices, so that they can uniquely identifies in medical IoT network. Additionally, the proposed scheme also preserves anonymity with the help of session key establishment to secure communication between the user and medical server. The performance of SAMA scheme has been evaluated in-term of functionality, computation and communication cost, and results are compared with existing schemes. Finally for security, the proposed scheme is also analyzed formally and informally using AVISPA tool and widely-accepted BAN logic model. The security analysis shows that the SAMA scheme ensures security against, such as, impersonation, password guessing, man-in-the-middle attack replay, etc.
Author Kumar, Pankaj
Chouhan, Lokesh
Author_xml – sequence: 1
  givenname: Pankaj
  surname: Kumar
  fullname: Kumar, Pankaj
  email: Pankaj@nith.ac.in, Pankajdhiman12508@gmail.com
– sequence: 2
  givenname: Lokesh
  surname: Chouhan
  fullname: Chouhan, Lokesh
  email: Lokesh@nith.ac.in
BookMark eNqFkM9KAzEQh4NUsK2-gYe8wK6TbHaz9SCU4p9C0UsFbyFNZmna7kaStdK3N7WePCgMDMzw_Zj5RmTQ-Q4JuWaQM2DVzSY3vk2Vc-BpxHJg8owMWS2LTELxNiBDYAKyoqrEBRnFuAEAIWUxJM9T-h7cXpsD1Z2lEWN0vqNbPNCVjmip_ujX2PXO6P64iGaNLdLGB9qiTdMdnfsl7bD_9GEbL8l5o3cRr376mLw-3C9nT9ni5XE-my4yU0DVZ4YBb6xuWI281pyBNsIiWs2MnADIsrHVik9EqXmNE4Gl1FxAKYuKcwOSFWNye8o1wccYsFHG9d8X9kG7nWKgjmbURp3MqKMZxZhKZhIsfsFJQavD4T_s7oRhemzvMKhoHHYmaQhoemW9-zvgC17Kgjs
CitedBy_id crossref_primary_10_12677_CSA_2021_119233
crossref_primary_10_1016_j_procs_2024_03_201
crossref_primary_10_1016_j_phycom_2023_102084
crossref_primary_10_1111_exsy_12788
crossref_primary_10_3390_s25030821
crossref_primary_10_1155_2022_5642026
crossref_primary_10_1007_s11042_024_19898_y
crossref_primary_10_1038_s41598_023_44101_x
crossref_primary_10_1016_j_comcom_2023_07_042
crossref_primary_10_1016_j_comcom_2021_11_021
crossref_primary_10_32604_cmc_2025_060372
crossref_primary_10_1016_j_comcom_2022_05_002
crossref_primary_10_1155_2021_5533843
crossref_primary_10_1016_j_future_2023_03_014
crossref_primary_10_3390_s21041488
crossref_primary_10_3390_su132111645
crossref_primary_10_3390_app122412688
crossref_primary_10_3390_electronics12081901
crossref_primary_10_1002_ett_4479
crossref_primary_10_1109_JIOT_2024_3420719
crossref_primary_10_1016_j_jisa_2022_103377
crossref_primary_10_32604_cmc_2024_049017
crossref_primary_10_4018_IJSSCI_285593
crossref_primary_10_2174_0123520965267339230928061410
crossref_primary_10_1007_s42979_022_01300_z
crossref_primary_10_3390_su15043317
crossref_primary_10_3390_app12157487
crossref_primary_10_1109_ACCESS_2022_3212735
crossref_primary_10_1016_j_adhoc_2023_103159
crossref_primary_10_1109_JIOT_2023_3252051
crossref_primary_10_1016_j_comnet_2024_110450
crossref_primary_10_1007_s42979_024_03375_2
Cites_doi 10.17487/rfc3971
10.1007/s13369-019-03752-7
10.1016/j.adhoc.2015.05.014
10.1016/j.pmcj.2015.12.003
10.1109/JSYST.2013.2260942
10.1007/s10916-014-0136-8
10.1007/s11042-017-4390-x
10.1109/ACCESS.2017.2695525
10.1142/S0129626411000047
10.1109/ECS.2014.6892510
10.1145/3098954.3098975
10.1016/j.mcm.2012.06.033
10.1016/j.adhoc.2014.03.003
10.1109/JSEN.2015.2475298
10.1016/j.jnca.2012.03.011
10.1007/s12652-017-0520-6
10.4218/etrij.10.1510.0134
10.1007/s12652-016-0345-8
10.1109/MSP.2012.28
10.1109/TETC.2015.2392380
10.1109/LSENS.2019.2905020
10.1002/dac.2644
10.1007/s10916-016-0521-6
10.1002/dac.2368
10.1016/j.comcom.2005.09.002
10.1109/ACCESS.2017.2676119
10.1007/s11227-017-2048-0
10.3390/s100302450
10.1007/s10916-018-0921-x
10.1007/s12083-014-0324-9
10.17487/rfc7136
10.1007/s10916-015-0307-2
10.1016/j.pmcj.2015.08.001
10.3390/s120201625
10.1109/TMC.2013.134
10.1109/JSYST.2014.2301517
ContentType Journal Article
Copyright 2020 Elsevier B.V.
Copyright_xml – notice: 2020 Elsevier B.V.
DBID AAYXX
CITATION
DOI 10.1016/j.comcom.2020.11.017
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1873-703X
EndPage 164
ExternalDocumentID 10_1016_j_comcom_2020_11_017
S014036642032003X
GroupedDBID --K
--M
.DC
.~1
0R~
1B1
1~.
1~5
4.4
457
4G.
5GY
5VS
7-5
71M
77K
8P~
9JN
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
AAYFN
ABBOA
ABFNM
ABMAC
ABYKQ
ACDAQ
ACGFS
ACRLP
ACZNC
ADBBV
ADEZE
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
AXJTR
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EO8
EO9
EP2
EP3
FDB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
IHE
J1W
JJJVA
KOM
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
ROL
RPZ
RXW
SDF
SDG
SDP
SES
SPC
SPCBC
SST
SSV
SSZ
T5K
WH7
ZMT
~G-
07C
29F
AAQXK
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ABWVN
ABXDB
ACNNM
ACRPL
ACVFH
ADCNI
ADJOM
ADMUD
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AI.
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
ASPBG
AVWKF
AZFZN
BNPGV
CITATION
EJD
F0J
FEDTE
FGOYB
HLZ
HVGLF
HZ~
R2-
RIG
SBC
SEW
SSH
TAE
UHS
VH1
VOH
WUQ
XPP
ZY4
ID FETCH-LOGICAL-c306t-c102fdaf18e28a210ac4deeda1c790075fd6b2945a28e94e57a240573622c0713
IEDL.DBID .~1
ISSN 0140-3664
IngestDate Tue Jul 01 02:43:06 EDT 2025
Thu Apr 24 23:05:27 EDT 2025
Fri Feb 23 02:48:21 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Extended unique identifier
Medical cloud server
Interface identifier
Medical internet of things
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c306t-c102fdaf18e28a210ac4deeda1c790075fd6b2945a28e94e57a240573622c0713
PageCount 11
ParticipantIDs crossref_citationtrail_10_1016_j_comcom_2020_11_017
crossref_primary_10_1016_j_comcom_2020_11_017
elsevier_sciencedirect_doi_10_1016_j_comcom_2020_11_017
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-01-15
PublicationDateYYYYMMDD 2021-01-15
PublicationDate_xml – month: 01
  year: 2021
  text: 2021-01-15
  day: 15
PublicationDecade 2020
PublicationTitle Computer communications
PublicationYear 2021
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Kumar, Lee, Lee (b31) 2012; 12
Xu, Wu (b58) 2019; 44
Pecorella (b50) 2014
Chang, Wu, Sun (b35) 2017; 38
Kalra, Sood (b36) 2015; 24
Wu, Xu, Kumari, Li (b42) 2017; 8
M.F. Ayub, K. Mahmood, S. Kumari, A.K. Sangaiah, et al. Lightweight authentication protocol for e-health clouds in iot based applications through 5g technology, Digital Communications and Networks.
P. Kumar, L. Chouhan, Design of secure session key using unique addressing and identification scheme for smart home internet of things network, Trans. Emerg. Telecommun. Technol., e3993.
Carpenter, Jiang (b16) 2014
Dey, Hossain (b53) 2019; 3
Dunlop, Groat, Urbanski, Marchany, Tront (b12) 2012; 10
J. Lim, M. Han, J. Kim, Implementation of light-weight IKE protocol for IPsec VPN within router, in: The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005. 1, 2005, pp. 81–84.
Wang, Wang (b32) 2014; 20
Lee, Li, Chen (b26) 2011; 21
V.K. Yadav, S. Batham, M. Jain, S. Sharma, An approach to electronic voting system using UIDAI, in: 2014 International Conference on Electronics and Communication Systems (ICECS), 2014, pp. 1–4.
Chen, Shih (b23) 2010; 32
He, Gao, Chan, Chen, Bu (b24) 2010; 10
C. Bhatt, N. Dey, A.S. Ashour, Internet of things and big data technologies for next generation healthcare.
Chen, Thombre, Järvinen, Lohan, Alén-Savikko, Leppäkoski, Bhuiyan, Bu-Pasha, Ferrara, Honkala, Lindqvist, Ruotsalainen, Korpisaari, Kuusniemi (b1) 2017; 5
F. Gont, A. Cooper, D. Thaler, W. Liu, Recommendation on stable ipv6 interface identifiers, The Internet Engineering Task Force, RFC 8064.
Kumar, Chouhan (b9) 2020
Beijnum (b3) 2005
Agrawal, Zhou, Chang (b8) 2019
Dey, Ashour, Shi, Fong, Tavares (b21) 2018; 42
Das, Sharma, Chatterjee, Sing (b30) 2012; 35
Amin, Islam, Biswas, Khan, Obaidat (b41) 2015; 39
D.Evans (b2) 2011; 1
Han, Hwang (b19) 2006; 29
Khan, Alghathbar (b25) 2010; 10
Vaidya, Makrakis, Mouftah (b27) 2010
Das (b39) 2016; 9
Jo, Paik, Lee (b48) 2013; 13
F. Gont, et al. A method for generating semantically opaque interface identifiers with ipv6 stateless address autoconfiguration (slaac), IETF RFC 7217.
Siddiqui, Singh (b17) 2015; 6
Dey, Tamane (b7) 2018
Challa, Wazid, Das, Kumar, Reddy, Yoon, Yoo (b55) 2017; 5
Farash, Nawaz, Mahmood, Chaudhry, Khan (b33) 2016; 40
Jiang, Ma, Li, Li (b37) 2015; 28
Chikouche, Cayrel, Boidje (b56) 2019
Dey, Ashour, Bhatt (b22) 2017
Saxena, Shaw, Verma (b40) 2019
Farash, Turkanović, Kumari, Hölbl (b43) 2016; 36
Kumari, Karuppiah, Das, Li, Wu, Kumar (b57) 2018; 74
G. Malkin, R. Minnear, Ripng for ipv6, IETF RFC 2080.
Riley, Henderson (b47) 2010
Nicanfar, Jokar, Beznosov, Leung (b34) 2013; 8
Kumari, Das, Li, Wu, Khan, Jiang, Islam (b45) 2018; 77
Li, Ma, Wang, Xiong, Zhang (b28) 2013; 58
Tseng, Huang, Tsai, Ke (b49) 2015; 4
Sarowar, Kamal, Dey (b4) 2019
Arshad, Nikooghadam (b29) 2014; 38
Arkko, Kempf (b15) 2005
Kumar, Gurtov, Iinatti, Ylianttila, Sain (b52) 2015; 16
He, Wang (b59) 2014; 9
Elhayatmy, Dey, Ashour (b5) 2018
Chen, Kuo, Wuu (b38) 2014; 27
Verma, Sood, Kalra (b44) 2018; 9
AVISPA (b54) 2015
A. Judmayer, J. Ullrich, G. Merzdovnik, A.G. Voyiatzis, E. Weippl, Lightweight address hopping for defending the ipv6 iot, in: Proceedings of the 12th International Conference on Availability, Reliability and Security, 2017, pp. 1–10.
Elhayatmy (10.1016/j.comcom.2020.11.017_b5) 2018
Dey (10.1016/j.comcom.2020.11.017_b7) 2018
Amin (10.1016/j.comcom.2020.11.017_b41) 2015; 39
AVISPA (10.1016/j.comcom.2020.11.017_b54) 2015
Carpenter (10.1016/j.comcom.2020.11.017_b16) 2014
Challa (10.1016/j.comcom.2020.11.017_b55) 2017; 5
Chen (10.1016/j.comcom.2020.11.017_b38) 2014; 27
Dunlop (10.1016/j.comcom.2020.11.017_b12) 2012; 10
Chikouche (10.1016/j.comcom.2020.11.017_b56) 2019
Verma (10.1016/j.comcom.2020.11.017_b44) 2018; 9
Jo (10.1016/j.comcom.2020.11.017_b48) 2013; 13
Kumar (10.1016/j.comcom.2020.11.017_b9) 2020
Han (10.1016/j.comcom.2020.11.017_b19) 2006; 29
10.1016/j.comcom.2020.11.017_b46
Chen (10.1016/j.comcom.2020.11.017_b1) 2017; 5
Arshad (10.1016/j.comcom.2020.11.017_b29) 2014; 38
Dey (10.1016/j.comcom.2020.11.017_b21) 2018; 42
Wang (10.1016/j.comcom.2020.11.017_b32) 2014; 20
Kalra (10.1016/j.comcom.2020.11.017_b36) 2015; 24
Agrawal (10.1016/j.comcom.2020.11.017_b8) 2019
He (10.1016/j.comcom.2020.11.017_b59) 2014; 9
10.1016/j.comcom.2020.11.017_b18
Chen (10.1016/j.comcom.2020.11.017_b23) 2010; 32
Wu (10.1016/j.comcom.2020.11.017_b42) 2017; 8
Khan (10.1016/j.comcom.2020.11.017_b25) 2010; 10
Sarowar (10.1016/j.comcom.2020.11.017_b4) 2019
10.1016/j.comcom.2020.11.017_b14
Riley (10.1016/j.comcom.2020.11.017_b47) 2010
10.1016/j.comcom.2020.11.017_b13
D.Evans (10.1016/j.comcom.2020.11.017_b2) 2011; 1
Das (10.1016/j.comcom.2020.11.017_b30) 2012; 35
Tseng (10.1016/j.comcom.2020.11.017_b49) 2015; 4
Dey (10.1016/j.comcom.2020.11.017_b22) 2017
Xu (10.1016/j.comcom.2020.11.017_b58) 2019; 44
Lee (10.1016/j.comcom.2020.11.017_b26) 2011; 21
Kumari (10.1016/j.comcom.2020.11.017_b57) 2018; 74
Chang (10.1016/j.comcom.2020.11.017_b35) 2017; 38
Das (10.1016/j.comcom.2020.11.017_b39) 2016; 9
Dey (10.1016/j.comcom.2020.11.017_b53) 2019; 3
Siddiqui (10.1016/j.comcom.2020.11.017_b17) 2015; 6
10.1016/j.comcom.2020.11.017_b10
10.1016/j.comcom.2020.11.017_b11
Farash (10.1016/j.comcom.2020.11.017_b33) 2016; 40
10.1016/j.comcom.2020.11.017_b51
Li (10.1016/j.comcom.2020.11.017_b28) 2013; 58
Jiang (10.1016/j.comcom.2020.11.017_b37) 2015; 28
Vaidya (10.1016/j.comcom.2020.11.017_b27) 2010
Pecorella (10.1016/j.comcom.2020.11.017_b50) 2014
Kumari (10.1016/j.comcom.2020.11.017_b45) 2018; 77
Beijnum (10.1016/j.comcom.2020.11.017_b3) 2005
He (10.1016/j.comcom.2020.11.017_b24) 2010; 10
Farash (10.1016/j.comcom.2020.11.017_b43) 2016; 36
Kumar (10.1016/j.comcom.2020.11.017_b31) 2012; 12
Nicanfar (10.1016/j.comcom.2020.11.017_b34) 2013; 8
Kumar (10.1016/j.comcom.2020.11.017_b52) 2015; 16
10.1016/j.comcom.2020.11.017_b6
Saxena (10.1016/j.comcom.2020.11.017_b40) 2019
Arkko (10.1016/j.comcom.2020.11.017_b15) 2005
10.1016/j.comcom.2020.11.017_b20
References_xml – start-page: 1
  year: 2019
  end-page: 12
  ident: b40
  article-title: A novel hash-based mutual rfid tag authentication protocol
  publication-title: Data and Communication Networks
– volume: 1
  start-page: 1
  year: 2011
  end-page: 11
  ident: b2
  article-title: The internet of things how the next evolution of the internet is changing everything
  publication-title: CISCO white paper
– year: 2005
  ident: b3
  article-title: Ipv4 address consumption
  publication-title: The Internet Protocol J.
– volume: 58
  start-page: 85
  year: 2013
  end-page: 95
  ident: b28
  article-title: A novel smart card and dynamic id based remote user authentication scheme for multi-server environments
  publication-title: Math. Comput. Modelling
– volume: 9
  start-page: 223
  year: 2016
  end-page: 244
  ident: b39
  article-title: A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
  publication-title: Peer-to-peer Netw. Appl.
– year: 2015
  ident: b54
  article-title: Automated validation of internet security protocols and applications
– volume: 42
  start-page: 74
  year: 2018
  ident: b21
  article-title: Medical cyber-physical systems: A survey
  publication-title: J. Med. Syst.
– year: 2014
  ident: b50
  article-title: Ripng Simple Network
– volume: 6
  start-page: 40
  year: 2015
  end-page: 43
  ident: b17
  article-title: Aadhar management system
  publication-title: IITM J. Manage. IT
– volume: 39
  start-page: 137
  year: 2015
  ident: b41
  article-title: Design and analysis of an enhanced patient-server mutual authentication protocol for telecare medical information system
  publication-title: J. Med. Syst.
– reference: M.F. Ayub, K. Mahmood, S. Kumari, A.K. Sangaiah, et al. Lightweight authentication protocol for e-health clouds in iot based applications through 5g technology, Digital Communications and Networks.
– volume: 29
  start-page: 1422
  year: 2006
  end-page: 1432
  ident: b19
  article-title: Care-of address provisioning for efficient ipv6 mobility support
  publication-title: Comput. Commun.
– reference: A. Judmayer, J. Ullrich, G. Merzdovnik, A.G. Voyiatzis, E. Weippl, Lightweight address hopping for defending the ipv6 iot, in: Proceedings of the 12th International Conference on Availability, Reliability and Security, 2017, pp. 1–10.
– volume: 12
  start-page: 1625
  year: 2012
  end-page: 1647
  ident: b31
  article-title: E-sap: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks
  publication-title: Sensors
– volume: 13
  start-page: 1469
  year: 2013
  end-page: 1481
  ident: b48
  article-title: Efficient privacy-preserving authentication in wireless mobile networks
  publication-title: IEEE Trans. Mob. Comput.
– reference: C. Bhatt, N. Dey, A.S. Ashour, Internet of things and big data technologies for next generation healthcare.
– volume: 28
  start-page: 383
  year: 2015
  end-page: 393
  ident: b37
  article-title: Improvement of robust smart-card-based password authentication scheme
  publication-title: Int. J. Commun. Syst.
– volume: 10
  start-page: 361
  year: 2010
  end-page: 371
  ident: b24
  article-title: An enhanced two-factor user authentication scheme in wireless sensor networks
  publication-title: Ad Hoc Sens. Wirel. Netw.
– volume: 3
  start-page: 1
  year: 2019
  end-page: 4
  ident: b53
  article-title: Session-key establishment and authentication in a smart home network using public key cryptography
  publication-title: IEEE Sensors Lett.
– start-page: 1
  year: 2019
  end-page: 31
  ident: b56
  article-title: A privacy-preserving code-based authentication protocol for internet of things
  publication-title: J. Supercomput.
– volume: 5
  start-page: 3028
  year: 2017
  end-page: 3043
  ident: b55
  article-title: Secure signature-based authenticated key establishment scheme for future iot applications
  publication-title: IEEE Access
– reference: V.K. Yadav, S. Batham, M. Jain, S. Sharma, An approach to electronic voting system using UIDAI, in: 2014 International Conference on Electronics and Communication Systems (ICECS), 2014, pp. 1–4.
– start-page: 1
  year: 2020
  end-page: 19
  ident: b9
  article-title: A secure authentication scheme for iot application in smart home
  publication-title: Peer-to-Peer Netw. Appl.
– volume: 9
  start-page: 816
  year: 2014
  end-page: 823
  ident: b59
  article-title: Robust biometrics-based authentication scheme for multiserver environment
  publication-title: IEEE Systems J.
– volume: 4
  start-page: 102
  year: 2015
  end-page: 112
  ident: b49
  article-title: List-free id-based mutual authentication and key agreement protocol for multiserver architectures
  publication-title: IEEE Trans. Emerg. Top. Comput.
– year: 2018
  ident: b7
  article-title: Big Data Analytics for Smart and Connected Cities
– reference: P. Kumar, L. Chouhan, Design of secure session key using unique addressing and identification scheme for smart home internet of things network, Trans. Emerg. Telecommun. Technol., e3993.
– volume: 20
  start-page: 1
  year: 2014
  end-page: 15
  ident: b32
  article-title: Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
  publication-title: Ad Hoc Netw.
– volume: 35
  start-page: 1646
  year: 2012
  end-page: 1656
  ident: b30
  article-title: A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
  publication-title: J. Netw. Comput. Appl.
– volume: 24
  start-page: 210
  year: 2015
  end-page: 223
  ident: b36
  article-title: Secure authentication scheme for iot and cloud servers
  publication-title: Pervasive Mob. Comput.
– volume: 9
  start-page: 1293
  year: 2018
  end-page: 1309
  ident: b44
  article-title: Cloud-centric iot based student healthcare monitoring framework
  publication-title: J. Ambient Intell. Humaniz. Comput.
– start-page: 71
  year: 2019
  end-page: 94
  ident: b8
  article-title: A survey on lightweight authenticated encryption and challenges for securing industrial iot
  publication-title: Security and Privacy Trends in the Industrial Internet of Things
– volume: 10
  start-page: 2450
  year: 2010
  end-page: 2459
  ident: b25
  article-title: Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’
  publication-title: Sensors
– volume: 77
  start-page: 2359
  year: 2018
  end-page: 2389
  ident: b45
  article-title: A provably secure biometrics-based authenticated key agreement scheme for multi-server environments
  publication-title: Multimedia Tools Appl.
– volume: 32
  start-page: 704
  year: 2010
  end-page: 712
  ident: b23
  article-title: A robust mutual authentication protocol for wireless sensor networks
  publication-title: ETRI J.
– year: 2005
  ident: b15
  article-title: Secure neighbor discovery (send)
– start-page: 600
  year: 2010
  end-page: 606
  ident: b27
  article-title: Improved two-factor user authentication in wireless sensor networks
  publication-title: 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications
– reference: J. Lim, M. Han, J. Kim, Implementation of light-weight IKE protocol for IPsec VPN within router, in: The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005. 1, 2005, pp. 81–84.
– start-page: 3
  year: 2017
  end-page: 12
  ident: b22
  article-title: Internet of things driven connected healthcare
  publication-title: Internet of Things and Big Data Technologies for Next Generation Healthcare
– volume: 10
  start-page: 35
  year: 2012
  end-page: 43
  ident: b12
  article-title: The blind man’s bluff approach to security using ipv6
  publication-title: IEEE Security Privacy
– year: 2014
  ident: b16
  article-title: Significance of ipv6 interface identifiers
– reference: F. Gont, A. Cooper, D. Thaler, W. Liu, Recommendation on stable ipv6 interface identifiers, The Internet Engineering Task Force, RFC 8064.
– volume: 8
  start-page: 101
  year: 2017
  end-page: 116
  ident: b42
  article-title: A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security
  publication-title: J. Ambient Intell. Humaniz. Comput.
– volume: 44
  start-page: 3977
  year: 2019
  end-page: 3993
  ident: b58
  article-title: A lightweight authentication scheme for multi-gateway wireless sensor networks under iot conception
  publication-title: Arab. J. Sci. Eng.
– volume: 8
  start-page: 629
  year: 2013
  end-page: 640
  ident: b34
  article-title: Efficient authentication and key management mechanisms for smart grid communications
  publication-title: IEEE Syst. J.
– start-page: 3
  year: 2018
  end-page: 20
  ident: b5
  article-title: Internet of things based wireless body area network in healthcare
  publication-title: Internet of Things and Big Data Analytics Toward Next-Generation Intelligence
– volume: 36
  start-page: 152
  year: 2016
  end-page: 176
  ident: b43
  article-title: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment
  publication-title: Ad Hoc Netw.
– reference: F. Gont, et al. A method for generating semantically opaque interface identifiers with ipv6 stateless address autoconfiguration (slaac), IETF RFC 7217.
– volume: 74
  start-page: 6428
  year: 2018
  end-page: 6453
  ident: b57
  article-title: A secure authentication scheme based on elliptic curve cryptography for iot and cloud servers
  publication-title: J. Supercomput.
– reference: G. Malkin, R. Minnear, Ripng for ipv6, IETF RFC 2080.
– volume: 38
  start-page: 136
  year: 2014
  ident: b29
  article-title: Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems
  publication-title: J. Med. Syst.
– start-page: 15
  year: 2010
  end-page: 34
  ident: b47
  article-title: The NS-3 network simulator
  publication-title: Modeling and Tools for Network Simulation
– volume: 27
  start-page: 377
  year: 2014
  end-page: 389
  ident: b38
  article-title: Robust smart-card-based remote user password authentication scheme
  publication-title: Int. J. Commun. Syst.
– volume: 5
  start-page: 8956
  year: 2017
  end-page: 8977
  ident: b1
  article-title: Robustness, security and privacy in location-based services for future iot: A survey
  publication-title: IEEE Access
– volume: 40
  start-page: 165
  year: 2016
  ident: b33
  article-title: A provably secure rfid authentication protocol based on elliptic curve for healthcare environments
  publication-title: J. Med. Syst.
– volume: 38
  start-page: 275
  year: 2017
  end-page: 278
  ident: b35
  article-title: Notes on secure authentication scheme for iot and cloud servers
  publication-title: Pervasive Mob. Comput.
– start-page: 103
  year: 2019
  end-page: 136
  ident: b4
  article-title: Internet of things and its impacts in computing intelligence: a comprehensive review–iot application for big data
  publication-title: Big Data Analytics for Smart and Connected Cities
– volume: 21
  start-page: 21
  year: 2011
  end-page: 26
  ident: b26
  article-title: Two attacks on a two-factor user authentication in wireless sensor networks
  publication-title: Parallel Process. Lett.
– volume: 16
  start-page: 254
  year: 2015
  end-page: 264
  ident: b52
  article-title: Lightweight and secure session-key establishment scheme in smart home environments
  publication-title: IEEE Sens. J.
– year: 2005
  ident: 10.1016/j.comcom.2020.11.017_b15
  article-title: Secure neighbor discovery (send)
  doi: 10.17487/rfc3971
– ident: 10.1016/j.comcom.2020.11.017_b11
– start-page: 3
  year: 2017
  ident: 10.1016/j.comcom.2020.11.017_b22
  article-title: Internet of things driven connected healthcare
– volume: 44
  start-page: 3977
  issue: 4
  year: 2019
  ident: 10.1016/j.comcom.2020.11.017_b58
  article-title: A lightweight authentication scheme for multi-gateway wireless sensor networks under iot conception
  publication-title: Arab. J. Sci. Eng.
  doi: 10.1007/s13369-019-03752-7
– volume: 36
  start-page: 152
  year: 2016
  ident: 10.1016/j.comcom.2020.11.017_b43
  article-title: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment
  publication-title: Ad Hoc Netw.
  doi: 10.1016/j.adhoc.2015.05.014
– year: 2005
  ident: 10.1016/j.comcom.2020.11.017_b3
  article-title: Ipv4 address consumption
  publication-title: The Internet Protocol J.
– volume: 38
  start-page: 275
  year: 2017
  ident: 10.1016/j.comcom.2020.11.017_b35
  article-title: Notes on secure authentication scheme for iot and cloud servers
  publication-title: Pervasive Mob. Comput.
  doi: 10.1016/j.pmcj.2015.12.003
– volume: 8
  start-page: 629
  issue: 2
  year: 2013
  ident: 10.1016/j.comcom.2020.11.017_b34
  article-title: Efficient authentication and key management mechanisms for smart grid communications
  publication-title: IEEE Syst. J.
  doi: 10.1109/JSYST.2013.2260942
– year: 2014
  ident: 10.1016/j.comcom.2020.11.017_b50
– year: 2018
  ident: 10.1016/j.comcom.2020.11.017_b7
– volume: 1
  start-page: 1
  year: 2011
  ident: 10.1016/j.comcom.2020.11.017_b2
  article-title: The internet of things how the next evolution of the internet is changing everything
  publication-title: CISCO white paper
– volume: 38
  start-page: 136
  issue: 12
  year: 2014
  ident: 10.1016/j.comcom.2020.11.017_b29
  article-title: Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems
  publication-title: J. Med. Syst.
  doi: 10.1007/s10916-014-0136-8
– start-page: 3
  year: 2018
  ident: 10.1016/j.comcom.2020.11.017_b5
  article-title: Internet of things based wireless body area network in healthcare
– volume: 77
  start-page: 2359
  issue: 2
  year: 2018
  ident: 10.1016/j.comcom.2020.11.017_b45
  article-title: A provably secure biometrics-based authenticated key agreement scheme for multi-server environments
  publication-title: Multimedia Tools Appl.
  doi: 10.1007/s11042-017-4390-x
– start-page: 71
  year: 2019
  ident: 10.1016/j.comcom.2020.11.017_b8
  article-title: A survey on lightweight authenticated encryption and challenges for securing industrial iot
– volume: 5
  start-page: 8956
  year: 2017
  ident: 10.1016/j.comcom.2020.11.017_b1
  article-title: Robustness, security and privacy in location-based services for future iot: A survey
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2695525
– volume: 21
  start-page: 21
  issue: 01
  year: 2011
  ident: 10.1016/j.comcom.2020.11.017_b26
  article-title: Two attacks on a two-factor user authentication in wireless sensor networks
  publication-title: Parallel Process. Lett.
  doi: 10.1142/S0129626411000047
– ident: 10.1016/j.comcom.2020.11.017_b18
  doi: 10.1109/ECS.2014.6892510
– volume: 10
  start-page: 361
  issue: 4
  year: 2010
  ident: 10.1016/j.comcom.2020.11.017_b24
  article-title: An enhanced two-factor user authentication scheme in wireless sensor networks
  publication-title: Ad Hoc Sens. Wirel. Netw.
– ident: 10.1016/j.comcom.2020.11.017_b20
  doi: 10.1145/3098954.3098975
– start-page: 600
  year: 2010
  ident: 10.1016/j.comcom.2020.11.017_b27
  article-title: Improved two-factor user authentication in wireless sensor networks
– start-page: 1
  year: 2019
  ident: 10.1016/j.comcom.2020.11.017_b56
  article-title: A privacy-preserving code-based authentication protocol for internet of things
  publication-title: J. Supercomput.
– start-page: 1
  year: 2019
  ident: 10.1016/j.comcom.2020.11.017_b40
  article-title: A novel hash-based mutual rfid tag authentication protocol
– ident: 10.1016/j.comcom.2020.11.017_b51
– volume: 58
  start-page: 85
  issue: 1–2
  year: 2013
  ident: 10.1016/j.comcom.2020.11.017_b28
  article-title: A novel smart card and dynamic id based remote user authentication scheme for multi-server environments
  publication-title: Math. Comput. Modelling
  doi: 10.1016/j.mcm.2012.06.033
– volume: 20
  start-page: 1
  year: 2014
  ident: 10.1016/j.comcom.2020.11.017_b32
  article-title: Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
  publication-title: Ad Hoc Netw.
  doi: 10.1016/j.adhoc.2014.03.003
– volume: 16
  start-page: 254
  issue: 1
  year: 2015
  ident: 10.1016/j.comcom.2020.11.017_b52
  article-title: Lightweight and secure session-key establishment scheme in smart home environments
  publication-title: IEEE Sens. J.
  doi: 10.1109/JSEN.2015.2475298
– volume: 35
  start-page: 1646
  issue: 5
  year: 2012
  ident: 10.1016/j.comcom.2020.11.017_b30
  article-title: A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2012.03.011
– ident: 10.1016/j.comcom.2020.11.017_b13
– start-page: 1
  year: 2020
  ident: 10.1016/j.comcom.2020.11.017_b9
  article-title: A secure authentication scheme for iot application in smart home
  publication-title: Peer-to-Peer Netw. Appl.
– volume: 9
  start-page: 1293
  issue: 5
  year: 2018
  ident: 10.1016/j.comcom.2020.11.017_b44
  article-title: Cloud-centric iot based student healthcare monitoring framework
  publication-title: J. Ambient Intell. Humaniz. Comput.
  doi: 10.1007/s12652-017-0520-6
– volume: 32
  start-page: 704
  issue: 5
  year: 2010
  ident: 10.1016/j.comcom.2020.11.017_b23
  article-title: A robust mutual authentication protocol for wireless sensor networks
  publication-title: ETRI J.
  doi: 10.4218/etrij.10.1510.0134
– volume: 8
  start-page: 101
  issue: 1
  year: 2017
  ident: 10.1016/j.comcom.2020.11.017_b42
  article-title: A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security
  publication-title: J. Ambient Intell. Humaniz. Comput.
  doi: 10.1007/s12652-016-0345-8
– volume: 10
  start-page: 35
  issue: 4
  year: 2012
  ident: 10.1016/j.comcom.2020.11.017_b12
  article-title: The blind man’s bluff approach to security using ipv6
  publication-title: IEEE Security Privacy
  doi: 10.1109/MSP.2012.28
– volume: 4
  start-page: 102
  issue: 1
  year: 2015
  ident: 10.1016/j.comcom.2020.11.017_b49
  article-title: List-free id-based mutual authentication and key agreement protocol for multiserver architectures
  publication-title: IEEE Trans. Emerg. Top. Comput.
  doi: 10.1109/TETC.2015.2392380
– volume: 3
  start-page: 1
  issue: 4
  year: 2019
  ident: 10.1016/j.comcom.2020.11.017_b53
  article-title: Session-key establishment and authentication in a smart home network using public key cryptography
  publication-title: IEEE Sensors Lett.
  doi: 10.1109/LSENS.2019.2905020
– volume: 28
  start-page: 383
  issue: 2
  year: 2015
  ident: 10.1016/j.comcom.2020.11.017_b37
  article-title: Improvement of robust smart-card-based password authentication scheme
  publication-title: Int. J. Commun. Syst.
  doi: 10.1002/dac.2644
– volume: 40
  start-page: 165
  issue: 7
  year: 2016
  ident: 10.1016/j.comcom.2020.11.017_b33
  article-title: A provably secure rfid authentication protocol based on elliptic curve for healthcare environments
  publication-title: J. Med. Syst.
  doi: 10.1007/s10916-016-0521-6
– volume: 27
  start-page: 377
  issue: 2
  year: 2014
  ident: 10.1016/j.comcom.2020.11.017_b38
  article-title: Robust smart-card-based remote user password authentication scheme
  publication-title: Int. J. Commun. Syst.
  doi: 10.1002/dac.2368
– volume: 29
  start-page: 1422
  issue: 9
  year: 2006
  ident: 10.1016/j.comcom.2020.11.017_b19
  article-title: Care-of address provisioning for efficient ipv6 mobility support
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2005.09.002
– volume: 5
  start-page: 3028
  year: 2017
  ident: 10.1016/j.comcom.2020.11.017_b55
  article-title: Secure signature-based authenticated key establishment scheme for future iot applications
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2676119
– ident: 10.1016/j.comcom.2020.11.017_b10
– ident: 10.1016/j.comcom.2020.11.017_b6
– ident: 10.1016/j.comcom.2020.11.017_b14
– volume: 74
  start-page: 6428
  issue: 12
  year: 2018
  ident: 10.1016/j.comcom.2020.11.017_b57
  article-title: A secure authentication scheme based on elliptic curve cryptography for iot and cloud servers
  publication-title: J. Supercomput.
  doi: 10.1007/s11227-017-2048-0
– start-page: 103
  year: 2019
  ident: 10.1016/j.comcom.2020.11.017_b4
  article-title: Internet of things and its impacts in computing intelligence: a comprehensive review–iot application for big data
– volume: 10
  start-page: 2450
  issue: 3
  year: 2010
  ident: 10.1016/j.comcom.2020.11.017_b25
  article-title: Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’
  publication-title: Sensors
  doi: 10.3390/s100302450
– volume: 42
  start-page: 74
  issue: 4
  year: 2018
  ident: 10.1016/j.comcom.2020.11.017_b21
  article-title: Medical cyber-physical systems: A survey
  publication-title: J. Med. Syst.
  doi: 10.1007/s10916-018-0921-x
– volume: 6
  start-page: 40
  issue: 1
  year: 2015
  ident: 10.1016/j.comcom.2020.11.017_b17
  article-title: Aadhar management system
  publication-title: IITM J. Manage. IT
– volume: 9
  start-page: 223
  issue: 1
  year: 2016
  ident: 10.1016/j.comcom.2020.11.017_b39
  article-title: A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
  publication-title: Peer-to-peer Netw. Appl.
  doi: 10.1007/s12083-014-0324-9
– year: 2014
  ident: 10.1016/j.comcom.2020.11.017_b16
  article-title: Significance of ipv6 interface identifiers
  doi: 10.17487/rfc7136
– volume: 39
  start-page: 137
  issue: 11
  year: 2015
  ident: 10.1016/j.comcom.2020.11.017_b41
  article-title: Design and analysis of an enhanced patient-server mutual authentication protocol for telecare medical information system
  publication-title: J. Med. Syst.
  doi: 10.1007/s10916-015-0307-2
– ident: 10.1016/j.comcom.2020.11.017_b46
– start-page: 15
  year: 2010
  ident: 10.1016/j.comcom.2020.11.017_b47
  article-title: The NS-3 network simulator
– year: 2015
  ident: 10.1016/j.comcom.2020.11.017_b54
– volume: 24
  start-page: 210
  year: 2015
  ident: 10.1016/j.comcom.2020.11.017_b36
  article-title: Secure authentication scheme for iot and cloud servers
  publication-title: Pervasive Mob. Comput.
  doi: 10.1016/j.pmcj.2015.08.001
– volume: 12
  start-page: 1625
  issue: 2
  year: 2012
  ident: 10.1016/j.comcom.2020.11.017_b31
  article-title: E-sap: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks
  publication-title: Sensors
  doi: 10.3390/s120201625
– volume: 13
  start-page: 1469
  issue: 7
  year: 2013
  ident: 10.1016/j.comcom.2020.11.017_b48
  article-title: Efficient privacy-preserving authentication in wireless mobile networks
  publication-title: IEEE Trans. Mob. Comput.
  doi: 10.1109/TMC.2013.134
– volume: 9
  start-page: 816
  issue: 3
  year: 2014
  ident: 10.1016/j.comcom.2020.11.017_b59
  article-title: Robust biometrics-based authentication scheme for multiserver environment
  publication-title: IEEE Systems J.
  doi: 10.1109/JSYST.2014.2301517
SSID ssj0004773
Score 2.5069242
Snippet Due to rapid increase rate of smart medical devices, the existing security internet of things (IoT) protocols cannot guaranty to perform better in-term of...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 154
SubjectTerms Extended unique identifier
Interface identifier
Medical cloud server
Medical internet of things
Title A privacy and session key based authentication scheme for medical IoT networks
URI https://dx.doi.org/10.1016/j.comcom.2020.11.017
Volume 166
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEF5KvehBfOKz7MHrtnlsHnssxdIq9NRCb2Gzu4GKTUsbBS_-dmeyG60gCl7DbgiTyXzfZL-ZIeQuBMwAHAkZoLlkXPo-E1GUMykKkeQ6hwyiVltM4tGMP8yjeYsMmloYlFW62G9jeh2t3ZWes2ZvvVj0allSGAN_xhngXjjHCnaeoJd3379kHjyxp8woY8TVTflcrfGCe6NmJADO1MVenvXYsh_gaQdyhkfk0HFF2rePc0xapjwhBzsdBE_JpE_Xm8WrVG9UlppubZcNCl8mRXzSVKKCvazcnzkKuaxZGgpMlS7tEQ0dr6a0tGLw7RmZDe-ngxFzIxKYAq5fMQX8oNCy8FMTpBLSN6m4BtiTvkoE0oFCx3kgeCSD1AhuokQGSNEAtgKFCeo5aZer0lxg8TYW2RouICPiJo0k155Rwis0vGYTp5ckbCyTKdc_HMdYPGeNUOwps_bM0J6QWmRgz0vCPnetbf-MP9YnjdGzb36QQYj_defVv3dek_0AlSqez_zohrSrzYu5BapR5Z3alzpkrz9-HE0-AFpI0qA
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEF5qe1AP4hPrcw9e1-a1SfZYiqW1NacWels2mw1UbFraKPjvnclDK4iC15AJYbI73zfZb2YIuXMBMwBHXAZorpinbJsJzmOmRCqCOIkhgyjUFpE_mHqPMz5rkF5dC4Oyyir2lzG9iNbVlU7lzc5qPu8UsiTXB_6MM8Atd7ZDWtidijdJqzscDaKv8sigPGhGJSMa1BV0hcwLHo-yEQdo0z228ywml_2AUFuo0z8kBxVdpN3yjY5Iw2THZH-rieAJibp0tZ6_Kf1OVZbQTdlog8LmpAhRCVUoYs_y6ucchXTWLAwFskoX5SkNHS4nNCv14JtTMu0_THoDVk1JYBrofs40UIQ0UakdGidUkMEp7SWAfMrWgUBGkCZ-7AiPKyc0wjM8UA6yNEAuR2OOekaa2TIz51i_jXW2xhOQFHkm5MpLLKOFlSbwpY0ftolbe0bqqoU4TrJ4kbVW7FmW_pToT8guJPizTdin1apsofHH_UHtdPltKUiI8r9aXvzb8pbsDiZPYzkeRqNLsuegcMWymc2vSDNfv5prYB55fFOtrA-g89VR
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+privacy+and+session+key+based+authentication+scheme+for+medical+IoT+networks&rft.jtitle=Computer+communications&rft.au=Kumar%2C+Pankaj&rft.au=Chouhan%2C+Lokesh&rft.date=2021-01-15&rft.issn=0140-3664&rft.volume=166&rft.spage=154&rft.epage=164&rft_id=info:doi/10.1016%2Fj.comcom.2020.11.017&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_comcom_2020_11_017
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0140-3664&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0140-3664&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0140-3664&client=summon