Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System
The Internet of things (IoT) has been widely used for various applications including medical and transportation systems, among others. Smart medical systems have become the most effective and practical solutions to provide users with low-cost, noninvasive, and long-term continuous health monitoring....
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2021-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2021/6658041 |
id |
doaj-2f29d548c7b04963a5312b4dcd4df6f8 |
---|---|
record_format |
Article |
spelling |
doaj-2f29d548c7b04963a5312b4dcd4df6f82021-02-15T12:52:42ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222021-01-01202110.1155/2021/66580416658041Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare SystemTsu-Yang Wu0Tao Wang1Yu-Qi Lee2Weimin Zheng3Saru Kumari4Sachin Kumar5College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, ChinaSchool of Information Science and Engineering, Fujian University of Technology, Fuzhou 350118, ChinaSchool of Information Science and Engineering, Fujian University of Technology, Fuzhou 350118, ChinaCollege of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, ChinaDepartment of Mathematics, Chaudhary Charan Singh University, Meerut, Uttar Pradesh 250004, IndiaDepartment of Computer Science and Engineering, Ajay Kumar Garg Engineering College, Ghaziabad 201009, IndiaThe Internet of things (IoT) has been widely used for various applications including medical and transportation systems, among others. Smart medical systems have become the most effective and practical solutions to provide users with low-cost, noninvasive, and long-term continuous health monitoring. Recently, Jia et al. proposed an authentication and key agreement scheme for smart medical systems based on fog computing and indicated that it is safe and can withstand a variety of known attacks. Nevertheless, we found that it consists of several flaws, including known session-specific temporary information attacks and lack of per-verification. The opponent can readily recover the session key and user identity. In this paper, we propose a secure authentication and key agreement scheme, which compensates for the imperfections of the previously proposed. For a security evaluation of the proposed authentication scheme, informal security analysis and the Burrows–Abadi–Needham (BAN) logic analysis are implemented. In addition, the ProVerif tool is used to normalize the security verification of the scheme. Finally, the performance comparisons with the former schemes show that the proposed scheme is more applicable and secure.http://dx.doi.org/10.1155/2021/6658041 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Tsu-Yang Wu Tao Wang Yu-Qi Lee Weimin Zheng Saru Kumari Sachin Kumar |
spellingShingle |
Tsu-Yang Wu Tao Wang Yu-Qi Lee Weimin Zheng Saru Kumari Sachin Kumar Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System Security and Communication Networks |
author_facet |
Tsu-Yang Wu Tao Wang Yu-Qi Lee Weimin Zheng Saru Kumari Sachin Kumar |
author_sort |
Tsu-Yang Wu |
title |
Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System |
title_short |
Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System |
title_full |
Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System |
title_fullStr |
Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System |
title_full_unstemmed |
Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System |
title_sort |
improved authenticated key agreement scheme for fog-driven iot healthcare system |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2021-01-01 |
description |
The Internet of things (IoT) has been widely used for various applications including medical and transportation systems, among others. Smart medical systems have become the most effective and practical solutions to provide users with low-cost, noninvasive, and long-term continuous health monitoring. Recently, Jia et al. proposed an authentication and key agreement scheme for smart medical systems based on fog computing and indicated that it is safe and can withstand a variety of known attacks. Nevertheless, we found that it consists of several flaws, including known session-specific temporary information attacks and lack of per-verification. The opponent can readily recover the session key and user identity. In this paper, we propose a secure authentication and key agreement scheme, which compensates for the imperfections of the previously proposed. For a security evaluation of the proposed authentication scheme, informal security analysis and the Burrows–Abadi–Needham (BAN) logic analysis are implemented. In addition, the ProVerif tool is used to normalize the security verification of the scheme. Finally, the performance comparisons with the former schemes show that the proposed scheme is more applicable and secure. |
url |
http://dx.doi.org/10.1155/2021/6658041 |
work_keys_str_mv |
AT tsuyangwu improvedauthenticatedkeyagreementschemeforfogdriveniothealthcaresystem AT taowang improvedauthenticatedkeyagreementschemeforfogdriveniothealthcaresystem AT yuqilee improvedauthenticatedkeyagreementschemeforfogdriveniothealthcaresystem AT weiminzheng improvedauthenticatedkeyagreementschemeforfogdriveniothealthcaresystem AT sarukumari improvedauthenticatedkeyagreementschemeforfogdriveniothealthcaresystem AT sachinkumar improvedauthenticatedkeyagreementschemeforfogdriveniothealthcaresystem |
_version_ |
1714867234464071680 |