No Cover Image

Journal article 425 views 85 downloads

A user-centric privacy-preserving authentication protocol for IoT-AmI environments

Mehedi Masud Orcid Logo, Gurjot Singh Gaba, Pardeep Kumar Orcid Logo, Andrei Gurtov

Computer Communications, Volume: 196, Pages: 45 - 54

Swansea University Author: Pardeep Kumar Orcid Logo

  • 61425_VoR.pdf

    PDF | Version of Record

    © 2022 The Author(s). This is an open access article under the CC BY license

    Download (1.97MB)

Abstract

Ambient Intelligence (AmI) in Internet of Things (IoT) has empowered healthcare professionals to monitor, diagnose, and treat patients remotely. Besides, the AmI-IoT has improved patient engagement and gratification as doctors’ interactions have become more comfortable and efficient. However, the be...

Full description

Published in: Computer Communications
ISSN: 0140-3664
Published: Elsevier BV 2022
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa61425
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract: Ambient Intelligence (AmI) in Internet of Things (IoT) has empowered healthcare professionals to monitor, diagnose, and treat patients remotely. Besides, the AmI-IoT has improved patient engagement and gratification as doctors’ interactions have become more comfortable and efficient. However, the benefits of the AmI-IoT-based healthcare applications are not availed entirely due to the adversarial threats. IoT networks are prone to cyber attacks due to vulnerable wireless mediums and the absentia of lightweight and robust security protocols. This paper introduces computationally-inexpensive privacy-assuring authentication protocol for AmI-IoT healthcare applications. The use of blockchain & fog computing in the protocol guarantees unforgeability, non-repudiation, transparency, low latency, and efficient bandwidth utilization. The protocol uses physically unclonable functions (PUF), biometrics, and Ethereum powered smart contracts to prevent replay, impersonation, and cloning attacks. Results prove the resource efficiency of the protocol as the smart contract incurs very minimal gas and transaction fees. The Scyther results validate the robustness of the proposed protocol against cyber-attacks. The protocol applies lightweight cryptography primitives (Hash, PUF) instead of conventional public-key cryptography and scalar multiplications. Consequently, the proposed protocol is better than centralized infrastructure-based authentication approaches.
Keywords: Ambient intelligence; Blockchain; Fog computing; Healthcare; Internet of Things (IoT)
College: Faculty of Science and Engineering
Funders: The research is supported by Taif University Researchers Supporting Project Number (TURSP-2020/10), Taif University, Taif, Saudi Arabia, CENIIT Project 17.01, and the Excellence Center at Linköping-Lund in IT (ELLIIT) Project A4 .
Start Page: 45
End Page: 54