Lightweight fog computing-based authentication protocols using physically unclonable functions for internet of medical things

Abstract The Internet of Medical Things (IoMT) is a network of connections between a medical information system and medical equipment. Fog computing for IoMT is a model for extending cloud computing and medical services to the edge of the network, but the conventional fog computing model does not support some necessary features, such as device-to-device (D2D) communications for the effective exchange of data and processing thereof between devices in the IoMT. This investigation develops a secure authentication scheme for the fog computing model with cooperative D2D communication support. Since the power and resources of the medical sensors are limited, the proposed protocols use lightweight cryptographic operations, including a one-way cryptographic hash function, the Barrel Shifter Physically Unclonable Function (BS-PUF), to ensure the security of the sensors and fog nodes and to avoid a computational burden on devices. The proposed protocols not only resist possible attacks and provide more security than related schemes, but also are more efficient.

[1]  Akhilesh Tyagi,et al.  Barrel Shifter Physical Unclonable Function Based Encryption , 2018, Cryptogr..

[2]  Cheng Huang,et al.  Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges , 2017, IEEE Communications Magazine.

[3]  Rongxing Lu,et al.  From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework , 2017, IEEE Access.

[4]  Biplab Sikdar,et al.  An Efficient Privacy-Preserving Authenticated Key Agreement Scheme for Edge-Assisted Internet of Drones , 2020, IEEE Transactions on Vehicular Technology.

[5]  Mu-En Wu,et al.  A secure authenticated and key exchange scheme for fog computing , 2020, Enterp. Inf. Syst..

[6]  Niall Twomey,et al.  Bridging e-Health and the Internet of Things: The SPHERE Project , 2015, IEEE Intelligent Systems.

[7]  Chih-Hsien Hsia,et al.  VLSI implementation of an ultra-low-cost and low-power image compressor for wireless camera networks , 2018, Journal of Real-Time Image Processing.

[8]  Sotiris Ioannidis,et al.  Review of Security and Privacy for the Internet of Medical Things (IoMT) , 2019, 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS).

[9]  Hung-Min Sun,et al.  Improvement of a novel mutual authentication scheme based on quadratic residues for RFID systems , 2008, 2009 Joint Conferences on Pervasive Computing (JCPC).

[10]  R. Somasundaram,et al.  Review of security challenges in healthcare internet of things , 2020, Wireless Networks.

[11]  Jian Shen,et al.  Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing , 2018, Peer-to-Peer Netw. Appl..

[12]  Chih-Hsien Hsia,et al.  Finger-vein recognition based on parametric-oriented corrections , 2016, Multimedia Tools and Applications.

[13]  Ong Bi Lynn,et al.  Internet of Things (IoT): Taxonomy of security attacks , 2016, 2016 3rd International Conference on Electronic Design (ICED).

[14]  Ashok Kumar Das,et al.  Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks , 2019, IEEE Transactions on Industrial Informatics.

[15]  Jiang Zhu,et al.  Fog Computing: A Platform for Internet of Things and Analytics , 2014, Big Data and Internet of Things.

[16]  Biplab Sikdar,et al.  A Secure IoT-Based Modern Healthcare System With Fault-Tolerant Decision Making Process , 2020, IEEE Journal of Biomedical and Health Informatics.

[17]  Kenneth H. Rosen Elementary Number Theory: And Its Applications , 2010 .

[18]  Kim-Kwang Raymond Choo,et al.  Authenticated key agreement scheme for fog-driven IoT healthcare system , 2018, Wirel. Networks.

[19]  Tian Fu Lee,et al.  Provably secure extended chaotic map-based three-party key agreement protocols using password authentication , 2015 .

[20]  Jian Shen,et al.  Anonymous and Traceable Group Data Sharing in Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.

[21]  Prosanta Gope,et al.  LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm , 2019, Comput. Secur..

[22]  Klaus Doppler,et al.  Advances in Device-to-Device Communications and Network Coding for IMT-Advanced , 2009 .

[23]  Nan Jiang,et al.  Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts , 2020, Comput. Secur..

[24]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[25]  An Braeken,et al.  Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti–Krawczyk security model , 2019, Wireless Networks.