Chaotic-map based authenticated security framework with privacy preservation for remote point-of-care

The challenge of COVID-19 has become more prevalent across the world. It is highly demanding an intelligent strategy to outline the precaution measures until the clinical trials find a successful vaccine. With technological advancement, Wireless Multimedia Sensor Networks (WMSNs) has extended its significant role in the development of remote medical point-of-care (RM-PoC). WMSN is generally located on a communication device to sense the vital signaling information that may periodically be transmitted to remote intelligent pouch This modern remote system finds a suitable professional system to inspect the environment condition remotely in order to facilitate the intelligent process. In the past, the RM-PoC has gained more attention for the exploitation of real-time monitoring, treatment follow-up, and action report generation. Even though it has additional advantages in comparison with conventional systems, issues such as security and privacy are seriously considered to protect the modern system information over insecure public networks. Therefore, this study presents a novel Single User Sign-In (SUSI) Mechanism that makes certain of privacy preservation to ensure better protection of multimedia data. It can be achieved over the negotiation of a shared session-key to perform encryption or decryption of sensitive data during the authentication phase. To comply with key agreement properties such as appropriate mutual authentication and secure session key-agreement, a proposed system design is incorporated into the chaotic-map. The above assumption claims that it can not only achieve better security efficiencies but also can moderate the computation, communication, and storage cost of some intelligent systems as compared to elliptic-curve cryptography or RSA. Importantly, in order to offer untraceability and user anonymity, the RM-PoC acquires dynamic identities from proposed SUSI. Moreover, the security efficiencies of proposed SUSI are demonstrated using informal and formal analysis of the real-or-random (RoR) model. Lastly, a simulation study using NS3 is extensively conducted to analyze the communication metrics such as transmission delay, throughput rate, and packet delivery ratio that demonstrates the significance of the proposed SUSI scheme.

[1]  Yuhua Lin,et al.  Cryptanalysis and Security Improvement of Two Authentication Schemes for Healthcare Systems Using Wireless Medical Sensor Networks , 2020, Secur. Commun. Networks.

[2]  Fadi Al-Turjman,et al.  Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks , 2017, IEEE Access.

[3]  Robert H. Deng,et al.  A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.

[4]  Saru Kumari,et al.  An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment , 2016, Ad Hoc Networks.

[5]  Preeti Chandrakar A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks , 2019, Int. J. Ambient Comput. Intell..

[6]  Marko Hölbl,et al.  A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.

[7]  Linhua Zhang Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .

[8]  R. Madhusudhan,et al.  Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET , 2020, Peer-to-Peer Netw. Appl..

[9]  Moayad Aloqaily,et al.  An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT , 2019, IEEE Access.

[10]  Hongfeng Zhu,et al.  An Effcient Authenticated Key Agreement Protocol Based on Chaotic Maps with Privacy Protection using Smart Card , 2015, J. Inf. Hiding Multim. Signal Process..

[11]  Thar Baker,et al.  An Edge Computing Based Smart Healthcare Framework for Resource Management , 2018, Sensors.

[12]  Yong Yu,et al.  Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.

[13]  Jianfeng Ma,et al.  A privacy preserving three-factor authentication protocol for e-Health clouds , 2016, The Journal of Supercomputing.

[14]  Ashok Kumar Das,et al.  An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System , 2013, Journal of Medical Systems.

[15]  Jing Chen,et al.  Secure and Lightweight Authentication With Key Agreement for Smart Wearable Systems , 2020, IEEE Internet of Things Journal.

[16]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[17]  Laurence T. Yang,et al.  Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing , 2015, IEEE Transactions on Parallel and Distributed Systems.

[18]  Ashok Kumar Das,et al.  Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks , 2019, IEEE Transactions on Industrial Informatics.

[19]  Chun-Ta Li,et al.  Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems. , 2018, Computer methods and programs in biomedicine.

[20]  Guoai Xu,et al.  A Provably Secure Anonymous Biometrics-Based Authentication Scheme for Wireless Sensor Networks Using Chaotic Map , 2019, IEEE Access.

[21]  Elisa Bertino,et al.  PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones , 2018, IEEE Transactions on Information Forensics and Security.

[22]  Min-Shiang Hwang,et al.  Security enhancement for the timestamp-based password authentication scheme using smart cards , 2003, Comput. Secur..

[23]  Wei-Kuan Shih,et al.  A Robust Mutual Authentication Protocol for Wireless Sensor Networks , 2010 .

[24]  Lili Wang Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography , 2014, J. Appl. Math..

[25]  Sungyoung Lee,et al.  An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare , 2011, J. Networks.

[26]  Wei Liang,et al.  A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity , 2016, Secur. Commun. Networks.

[27]  Dharminder Dharminder,et al.  Security analysis and application of Chebyshev Chaotic map in the authentication protocols , 2019, International Journal of Computers and Applications.

[28]  Tie Qiu,et al.  Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things , 2017, IEEE Internet of Things Journal.

[29]  Rajappa Muthaiah,et al.  Analyzing three-party authentication and key agreement protocol for real time IP multimedia server–client systems , 2015, Multimedia Tools and Applications.

[30]  Lawrence C. Stewart,et al.  HTTP Authentication: Basic and Digest Access Authentication , 1999 .

[31]  Rajappa Muthaiah,et al.  Evaluating Three Party Authentication and Key Agreement Protocols Using IP Multimedia Server–Client Systems , 2015, Wirel. Pers. Commun..

[32]  Deebak Bakkiam David,et al.  A Dynamic-Identity Based Multimedia Server Client Authentication Scheme for Tele-Care Multimedia Medical Information System , 2015 .

[33]  Ashish Singh,et al.  An Enhanced Authentication Scheme for Internet of Things Based E-Healthcare System , 2020 .

[34]  Guoai Xu,et al.  A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure , 2020, Wirel. Commun. Mob. Comput..

[35]  Xiaotie Deng,et al.  Two-factor mutual authentication based on smart cards and passwords , 2008, J. Comput. Syst. Sci..

[36]  Hong Liu,et al.  Cooperative Privacy Preservation for Wearable Devices in Hybrid Computing-Based Smart Health , 2019, IEEE Internet of Things Journal.

[37]  Moayad Aloqaily,et al.  A smart healthcare reward model for resource allocation in smart city , 2018, Multimedia Tools and Applications.

[38]  Tanmoy Maitra,et al.  Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card , 2017, Wirel. Pers. Commun..

[39]  Sourav Mukhopadhyay,et al.  A Mutual Authentication Framework for Wireless Medical Sensor Networks , 2017, Journal of Medical Systems.

[40]  Vanga Odelu,et al.  An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card , 2015, J. Inf. Secur. Appl..

[41]  R. C. Mittal,et al.  An improved timestamp-based remote user authentication scheme , 2011, Comput. Electr. Eng..

[42]  Deebak Bakkiam David Mutual authentication scheme for multimedia medical information systems , 2017 .

[43]  Fan Wu,et al.  Security analysis and Improvement of a Privacy Authentication Scheme for Telecare Medical Information Systems , 2012, Journal of Medical Systems.

[44]  Adesh Kumari,et al.  A secure user authentication protocol using elliptic curve cryptography , 2019 .

[45]  Xiong Li,et al.  A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems , 2020, IEEE Systems Journal.