Secure Identity Authentication of Community Medical Internet of Things

In the community medical Internet of Things (IoT) environment, there exist a large number of device nodes, network nodes and user nodes which form a heterogeneous network. In order to ensure smooth data exchange, some gateway nodes are adopted to connect different network spaces. Therefore, how to identify and authenticate the identities of heterogeneous nodes is an urgent problem to be solved. In this paper, we start with node security identity authentication, make uses of the mechanism of elliptic curve encryption algorithm signature and session key symmetric encryption, design an efficient community medical IoT node secure two-way identity authentication method, and propose a secure and reliable update mechanism for the update of authentication keys and session keys. These measures can effectively ensure the legality of nodes and communication security in the community medical IoT system. Through the analysis and comparison of experimental performance, this scheme is more suitable for the scene of community medical Internet of Things.

[1]  Ashutosh Saxena,et al.  A dynamic ID-based remote user authentication scheme , 2004, IEEE Transactions on Consumer Electronics.

[2]  Prashant Pandey,et al.  Cloud computing , 2010, ICWET.

[3]  Jan E. Gewehr,et al.  Smart Medical Information Technology for Healthcare (SMITH) , 2018, Methods of Information in Medicine.

[4]  Feng Yang,et al.  Distributed node authentication in wireless sensor networks , 2010, 2010 2nd International Conference on Future Computer and Communication.

[5]  Tad Hogg,et al.  Refining the Phase Transition in Combinatorial Search , 1996, Artif. Intell..

[6]  Imrich Chlamtac,et al.  Intermediate-node initiated reservation (IIR): a new signaling scheme for wavelength-routed networks , 2003, IEEE J. Sel. Areas Commun..

[7]  Rajaram Ramasamy,et al.  New Remote Mutual Authentication Scheme using Smart Cards , 2009, Trans. Data Priv..

[8]  Eun-Jun Yoon,et al.  A user friendly authentication scheme with anonymity for wireless communications , 2011, Comput. Electr. Eng..

[9]  Jing Li,et al.  CHIME-Trust: A Trusted Third Party Service for Healthcare , 2000, AMIA.

[10]  Fulong Chen,et al.  IPv6-Based Architecture of Community Medical Internet of Things , 2018, IEEE Access.

[11]  Ramjee Prasad,et al.  Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things , 2012, J. Cyber Secur. Mobil..

[12]  Sandeep K. Sood,et al.  Secure Dynamic Identity-Based Authentication Scheme Using Smart Cards , 2011, Inf. Secur. J. A Glob. Perspect..

[13]  Aiqing Zhang,et al.  Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems , 2017, IEEE Transactions on Information Forensics and Security.

[14]  Fuw-Yi Yang,et al.  Password Authentication Scheme Preserving Identity Privacy , 2014, 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation.

[15]  Jing-Jang Hwang,et al.  Improvement on Peyravian-Zunic's Password Authentication Schemes , 2002 .

[16]  Eun-Jun Yoon,et al.  A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography , 2016, IEEE Access.

[17]  Xiong Li,et al.  A novel user authentication scheme with anonymity for wireless communications , 2014, Secur. Commun. Networks.

[18]  Yunhao Liu,et al.  PLP: Protecting Location Privacy Against Correlation-Analysis Attack in Crowdsensing , 2015, 2015 44th International Conference on Parallel Processing.

[19]  Kazuo Yamazaki,et al.  Study on LD-VHDL conversion for FPGA-based PLC implementation , 2009 .

[20]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[21]  Yu-Fang Chung,et al.  A Password-Based User Authentication Scheme for the Integrated EPR Information System , 2012, Journal of Medical Systems.

[22]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.