Skip to main content
Erschienen in: Wireless Personal Communications 2/2023

03.05.2023

A Blockchain-Assisted Lightweight Anonymous Authentication Scheme for Medical Services in Internet of Medical Things

verfasst von: Shu Wu, Aiqing Zhang, Jindou Chen, Guangyu Peng, Ya Gao

Erschienen in: Wireless Personal Communications | Ausgabe 2/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of medical things (IoMT) enable physicians to provide precise care on the Internet for registered patients anywhere, bringing convenience to people’s everyday life. Considering the importance of patient’s privacy in IoMT, data security between patients and medical servers should be protected. Therefore, the authentication of identity and the agreement of a shared secret key are particularly important. In this work, we propose a lightweight anonymous authentication scheme between patients and medical servers in IoMT. We combine blockchain technology with biometric technology in order to form a shared session secret key. It can protect the privacy of patients through mutual authentication between patients and servers. Afterwards, the formal analysis of BAN logic shows that our scheme is secure. Non-formal analysis shows that our scheme achieves designed security objectives. Finally, comprehensive comparative experiments show that our proposed scheme achieves a better performance in both computation and communication efficiency.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wei, F., & Kumar, N. (2021). Privacy-preserving implicit authentication protocol using cosine similarity for internet of things. IEEE Internet of Things Journal, 8(7), 5599–5606.CrossRef Wei, F., & Kumar, N. (2021). Privacy-preserving implicit authentication protocol using cosine similarity for internet of things. IEEE Internet of Things Journal, 8(7), 5599–5606.CrossRef
2.
Zurück zum Zitat Wang, Z. (2018). A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity. Future Generation Computer Systems. pp. 342–348. Wang, Z. (2018). A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity. Future Generation Computer Systems. pp. 342–348.
3.
Zurück zum Zitat Zhang, A., & Chen, J. (2016). SeDS: Secure data sharing strategy for D2D communication in LTE-Advanced networks. IEEE Transactions on Vehicular Technology, 65(4), 2659–2674.CrossRef Zhang, A., & Chen, J. (2016). SeDS: Secure data sharing strategy for D2D communication in LTE-Advanced networks. IEEE Transactions on Vehicular Technology, 65(4), 2659–2674.CrossRef
4.
Zurück zum Zitat Guo, S. (2020). Blockchain meets edge computing: A distributed and trusted authentication system. IEEE Transactions on Industrial Informatics, 16(3), 1972–1983.CrossRef Guo, S. (2020). Blockchain meets edge computing: A distributed and trusted authentication system. IEEE Transactions on Industrial Informatics, 16(3), 1972–1983.CrossRef
5.
Zurück zum Zitat Renuka, K. (2019). Design of a secure three-factor authentication scheme for smart healthcare. Journal of Medical Systems, 43(5), 133.CrossRef Renuka, K. (2019). Design of a secure three-factor authentication scheme for smart healthcare. Journal of Medical Systems, 43(5), 133.CrossRef
6.
Zurück zum Zitat Zhang, A., & Lin, X. (2018). Towards secure and privacy-preserving data sharing in e-Health systems via consortium blockchain. Journal of Medical Systems, 42(256), 1–18. Zhang, A., & Lin, X. (2018). Towards secure and privacy-preserving data sharing in e-Health systems via consortium blockchain. Journal of Medical Systems, 42(256), 1–18.
7.
Zurück zum Zitat Feng, Q., He, D., Zeadally, S., Khan, M. K., & Kumar, N. (2019). A survey on privacy protection in blockchain system. Journal of Network And Computer Applications, 126, 45–58.CrossRef Feng, Q., He, D., Zeadally, S., Khan, M. K., & Kumar, N. (2019). A survey on privacy protection in blockchain system. Journal of Network And Computer Applications, 126, 45–58.CrossRef
8.
Zurück zum Zitat Yang, Y., Wei, L., Wu, L., Long, C., & Li, B. (2022). A blockchain-based multidomain authentication scheme for conditional privacy preserving in vehicular ad-hoc network. IEEE Internet of Things Journal, 9(11), 8078–8090.CrossRef Yang, Y., Wei, L., Wu, L., Long, C., & Li, B. (2022). A blockchain-based multidomain authentication scheme for conditional privacy preserving in vehicular ad-hoc network. IEEE Internet of Things Journal, 9(11), 8078–8090.CrossRef
9.
Zurück zum Zitat Yang, W., & Wang, S. (2022). A privacy-preserving ECG-based authentication system for securing wireless body sensor networks. IEEE Internet of Things Journal, 9(8), 6148–6158.CrossRef Yang, W., & Wang, S. (2022). A privacy-preserving ECG-based authentication system for securing wireless body sensor networks. IEEE Internet of Things Journal, 9(8), 6148–6158.CrossRef
10.
Zurück zum Zitat Zhang, J., Cui, J., & Zhong, H. (2021). PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks. IEEE Transactions On Dependable And Secure Computing, 18(2), 722–735.CrossRef Zhang, J., Cui, J., & Zhong, H. (2021). PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks. IEEE Transactions On Dependable And Secure Computing, 18(2), 722–735.CrossRef
11.
Zurück zum Zitat Srinivas, J., Das, A. K., & Li, X. (2021). Designing anonymous signature-based authenticated key exchange scheme for internet of things-enabled smart grid systems. IEEE Transactions on Industrial Informatics, 17(7), 4425–4436.CrossRef Srinivas, J., Das, A. K., & Li, X. (2021). Designing anonymous signature-based authenticated key exchange scheme for internet of things-enabled smart grid systems. IEEE Transactions on Industrial Informatics, 17(7), 4425–4436.CrossRef
12.
Zurück zum Zitat Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772.CrossRef Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772.CrossRef
13.
Zurück zum Zitat Malasri, K., & Wang, L. (2009). Design and implementation of a securewireless mote-based medical sensor network. Sensors, 9, 6273–6297.CrossRef Malasri, K., & Wang, L. (2009). Design and implementation of a securewireless mote-based medical sensor network. Sensors, 9, 6273–6297.CrossRef
14.
Zurück zum Zitat Chuang, M., & Chen, M. (2014). An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Systems with Applications, 41(4), 1411–1418.CrossRef Chuang, M., & Chen, M. (2014). An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Systems with Applications, 41(4), 1411–1418.CrossRef
15.
Zurück zum Zitat Mishra, D., Das, A., & Mukhopadhyay, S. (2014). A secure user anonymity-preserving biometric-based multiserver authenticated key agreement scheme using smart cards. Expert Systems with Applications, 41(18), 8129–8143.CrossRef Mishra, D., Das, A., & Mukhopadhyay, S. (2014). A secure user anonymity-preserving biometric-based multiserver authenticated key agreement scheme using smart cards. Expert Systems with Applications, 41(18), 8129–8143.CrossRef
16.
Zurück zum Zitat He, D., & Kumar, N. (2015). A secure temporal credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences. pp. 263–277. He, D., & Kumar, N. (2015). A secure temporal credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences. pp. 263–277.
17.
Zurück zum Zitat Odelu, V., & Goswami, A. (2015). A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Transactions on Information Forensics and Security, 10(9), 1953–1966.CrossRef Odelu, V., & Goswami, A. (2015). A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Transactions on Information Forensics and Security, 10(9), 1953–1966.CrossRef
18.
Zurück zum Zitat Jia, X., He, D., & Kumar, N. (2018). Authenticated key agreement scheme for fog-driven IoT healthcare system. Wireless Networks, 25, 4737–4750.CrossRef Jia, X., He, D., & Kumar, N. (2018). Authenticated key agreement scheme for fog-driven IoT healthcare system. Wireless Networks, 25, 4737–4750.CrossRef
19.
Zurück zum Zitat Irshad, A., Chaudhry, S,A., Alomari, O.A. (2020). “A novel pairing-free lightweight authentication protocol for mobile cloud computing framework”. IEEE Systems Journal. Irshad, A., Chaudhry, S,A., Alomari, O.A. (2020). “A novel pairing-free lightweight authentication protocol for mobile cloud computing framework”. IEEE Systems Journal.
20.
Zurück zum Zitat Kumari, S., Li, X., Wu, F., & Das, A. K. (2017). Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Generation Computer Systems, 68, 320–330.CrossRef Kumari, S., Li, X., Wu, F., & Das, A. K. (2017). Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Generation Computer Systems, 68, 320–330.CrossRef
21.
Zurück zum Zitat Feng, Q., He, D., Zeadally, S., & Wang, H. (2018). DAnonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment. Future Generation Computer Systems, 84, 239–251.CrossRef Feng, Q., He, D., Zeadally, S., & Wang, H. (2018). DAnonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment. Future Generation Computer Systems, 84, 239–251.CrossRef
22.
Zurück zum Zitat Ali, R., & Pal, A.K. (2018). An efficient three factorCbased authentication scheme in multiserver environment using ECC. International Journal of Communication Systems. 31(4). Ali, R., & Pal, A.K. (2018). An efficient three factorCbased authentication scheme in multiserver environment using ECC. International Journal of Communication Systems. 31(4).
23.
Zurück zum Zitat Wang, F., Xu, G., Wang, C., & Peng, J. (2019). A provably secure biometrics-based authentication scheme for multiserver environment. Security and Communication Networks. 1–15. Wang, F., Xu, G., Wang, C., & Peng, J. (2019). A provably secure biometrics-based authentication scheme for multiserver environment. Security and Communication Networks. 1–15.
24.
Zurück zum Zitat Wu, T., Yang, L., & Lee Z. (2021). Improved ECC-based three-factor multiserver authentication scheme. Security and Communication Networks. Article ID 6627956. Wu, T., Yang, L., & Lee Z. (2021). Improved ECC-based three-factor multiserver authentication scheme. Security and Communication Networks. Article ID 6627956.
25.
Zurück zum Zitat Ekblaw, A. (2016). A case study for blockchain in healthcare: MedRec prototype for electronic health records and medical research data. IEEE Open Big Data Conf: Proc. Ekblaw, A. (2016). A case study for blockchain in healthcare: MedRec prototype for electronic health records and medical research data. IEEE Open Big Data Conf: Proc.
26.
Zurück zum Zitat Jiang, S., Cao, J., Wu, H., Yang, Y., Ma, M., & He, J. (2018). BlocHIE: A blokchain-based platform for healthcare information exchange. In 2018 IEEE international conference on smart computing (smartcomp). pp. 49-56. Jiang, S., Cao, J., Wu, H., Yang, Y., Ma, M., & He, J. (2018). BlocHIE: A blokchain-based platform for healthcare information exchange. In 2018 IEEE international conference on smart computing (smartcomp). pp. 49-56.
27.
Zurück zum Zitat Wang, J., Wu, L. (2019). Blockchain based anonymous authentication with key management for smart grid edge computing infrastructure. IEEE Transactions on Industrial Informatics. Wang, J., Wu, L. (2019). Blockchain based anonymous authentication with key management for smart grid edge computing infrastructure. IEEE Transactions on Industrial Informatics.
28.
Zurück zum Zitat Vivekanandan, M., Sastry, V.N., & Srinivasulu Reddy, U. (2021). Blockchain based privacy preserving user authentication protocol for distributed mobile cloud environment. Peer-to-Peer Networking and Applications. 14, 1572–1595. Vivekanandan, M., Sastry, V.N., & Srinivasulu Reddy, U. (2021). Blockchain based privacy preserving user authentication protocol for distributed mobile cloud environment. Peer-to-Peer Networking and Applications. 14, 1572–1595.
29.
Zurück zum Zitat Siyal, A., Junejo, A., Zawish, M., Ahmed, K., Khalil, A., & Soursou, G. (2019). Applications of blockchain technology in medicine and healthcare: Challenges and future perspectives. Cryptography, 3(1), 3–19.CrossRef Siyal, A., Junejo, A., Zawish, M., Ahmed, K., Khalil, A., & Soursou, G. (2019). Applications of blockchain technology in medicine and healthcare: Challenges and future perspectives. Cryptography, 3(1), 3–19.CrossRef
30.
Zurück zum Zitat Vivekanandan, M., & Sastry, V.N. (2019). Biometric based user authentication protocol for mobile cloud environment. In 2019 IEEE 5th international conference on identity, security, and behavior analysis (ISBA) (pp. 1–6). Vivekanandan, M., & Sastry, V.N. (2019). Biometric based user authentication protocol for mobile cloud environment. In 2019 IEEE 5th international conference on identity, security, and behavior analysis (ISBA) (pp. 1–6).
31.
Zurück zum Zitat Yazdinejad, A., Srivastava, G., Choo, K., Parizi, R., Dehghantanha, A., & Aledhari, M. (2020). Decentralized authentication of distributed patients in hospital networks using blockchain. IEEE Journal of Biomedical and Health Informatics, 24(8), 2146–2156.CrossRef Yazdinejad, A., Srivastava, G., Choo, K., Parizi, R., Dehghantanha, A., & Aledhari, M. (2020). Decentralized authentication of distributed patients in hospital networks using blockchain. IEEE Journal of Biomedical and Health Informatics, 24(8), 2146–2156.CrossRef
32.
Zurück zum Zitat Fan, K., Pan, Q., & Zhang, K. (2020). A secure and verifiable data sharing scheme based on blockchain in vehicular social networks. IEEE Transactions on Vehicular Technology, 69, 5826–5835.CrossRef Fan, K., Pan, Q., & Zhang, K. (2020). A secure and verifiable data sharing scheme based on blockchain in vehicular social networks. IEEE Transactions on Vehicular Technology, 69, 5826–5835.CrossRef
33.
Zurück zum Zitat Zhang, A., Zhang, P., Wang, H., & Lin, X. (2021). Application-oriented block generation for consortium blockchain-based IoT systems with dynamic device management. IEEE Internet of Things Journal, 8, 7874–7888.CrossRef Zhang, A., Zhang, P., Wang, H., & Lin, X. (2021). Application-oriented block generation for consortium blockchain-based IoT systems with dynamic device management. IEEE Internet of Things Journal, 8, 7874–7888.CrossRef
34.
Zurück zum Zitat Burrows, M., Abadi, M., & Needham, R. M. (1989). A logic of authentication. Proceedings of Royal Society London A Mathematical Physics Science, 426(1871), 233–271.MathSciNetCrossRefMATH Burrows, M., Abadi, M., & Needham, R. M. (1989). A logic of authentication. Proceedings of Royal Society London A Mathematical Physics Science, 426(1871), 233–271.MathSciNetCrossRefMATH
35.
Zurück zum Zitat Chuang, M., & Chen, M. (2014). An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Systems with Applications, 41, 1411–1418.CrossRef Chuang, M., & Chen, M. (2014). An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Systems with Applications, 41, 1411–1418.CrossRef
36.
Zurück zum Zitat Arshad, H., & Nikooghadam, M. (2014). Three-factor anonymous authentication and key agreement scheme for telecare medicine information system. Journal of Medical Systems, 38(12), 1–12.CrossRef Arshad, H., & Nikooghadam, M. (2014). Three-factor anonymous authentication and key agreement scheme for telecare medicine information system. Journal of Medical Systems, 38(12), 1–12.CrossRef
37.
Zurück zum Zitat Kilinc, H., & Yanik, T. (2014). A survey of sip authentication and key agreement schemes.IEEE Communications Surveys and Tutorials 16(2), 1005–1023. Kilinc, H., & Yanik, T. (2014). A survey of sip authentication and key agreement schemes.IEEE Communications Surveys and Tutorials 16(2), 1005–1023.
38.
Zurück zum Zitat He, D., & Kumar, N. (2018). Efficient privacy-aware authentication schemen for mobile cloud computing services. IEEE Systems Journal. 12(2). He, D., & Kumar, N. (2018). Efficient privacy-aware authentication schemen for mobile cloud computing services. IEEE Systems Journal. 12(2).
39.
Zurück zum Zitat Tsai, J., & Lo, N. (2015). A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal, 9(3), 805–815.CrossRef Tsai, J., & Lo, N. (2015). A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal, 9(3), 805–815.CrossRef
40.
Zurück zum Zitat Lwamo, N., & Zhu, L. (2019). SUAA: A secure user authentication scheme with anonymity for the single & multi-server environments. Inform. Sciences, 477, 369–385.CrossRef Lwamo, N., & Zhu, L. (2019). SUAA: A secure user authentication scheme with anonymity for the single & multi-server environments. Inform. Sciences, 477, 369–385.CrossRef
Metadaten
Titel
A Blockchain-Assisted Lightweight Anonymous Authentication Scheme for Medical Services in Internet of Medical Things
verfasst von
Shu Wu
Aiqing Zhang
Jindou Chen
Guangyu Peng
Ya Gao
Publikationsdatum
03.05.2023
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2023
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-023-10457-6

Weitere Artikel der Ausgabe 2/2023

Wireless Personal Communications 2/2023 Zur Ausgabe

Neuer Inhalt