Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 4/2023

27-06-2023

A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System

Authors: Ravi Raushan Kumar Chaudhary, Kakali Chatterjee

Published in: Peer-to-Peer Networking and Applications | Issue 4/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The Internet of Things is gaining popularity throughout the world. With the growth of digital communication, healthcare 4.0 are being implemented by many businesses industry in order to establish a more resilient, competent, and intelligent smart healthcare system. Healthcare monitoring services are the part of smart healthcare system. These types of monitoring systems are mainly based on the Internet of Things (IoT). IoT helps to integrate multiple sensors and objects that can directly communicate with each other without human intervention. This type of IoT based systems are vulnerable to different adversarial threats such as cloning attack, impersonation attack etc. Hence medical IoT device authentication is essential in smart healthcare to verify user legitimacy. One way to verify user legitimacy is using physical unclonable function (PUF). The PUF protects sensor nodes from tampering, cloning attack. In this paper, we have proposed a lightweight PUF based authentication mechanism for embedded IoT devices in e-healthcare system. The proposed authentication technique helps to authenticate IoT sensor nodes which are responsible for transmitting sensitive health data in a health monitoring system. The performance comparison shows that the protocol is efficient with high through put and low computational load. The security analysis of the authentication scheme shows it would resist different types of network attacks. The proposed authentication provides a facility that no one except that the primary users can have access to the raw challenge response pair of integrated PUF circuits so that adversary will unable to build another same PUF model. Also the success probability is \(2^{-76}\) for recovering the transformed 128 bit challenge and responses.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Nikooghadam M, Amintoosi H (2020) An improved secure authentication and key agreement scheme for healthcare applications in, (2020) 25th International Computer Conference, Computer Society of Iran (CSICC). IEEE 2020:1–7 Nikooghadam M, Amintoosi H (2020) An improved secure authentication and key agreement scheme for healthcare applications in, (2020) 25th International Computer Conference, Computer Society of Iran (CSICC). IEEE 2020:1–7
3.
go back to reference Binu P, Thomas K, Varghese NP (2017) Highly secure and efficient architectural model for iot based health care systems in 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE 2017 pp. 487–493 Binu P, Thomas K, Varghese NP (2017) Highly secure and efficient architectural model for iot based health care systems in 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE 2017 pp. 487–493
4.
go back to reference Abdussami M, Amin R, Vollala S (2023) Provably secured lightweight authenticated key agreement protocol for modern health industry Ad Hoc Networks p. 103094 Abdussami M, Amin R, Vollala S (2023) Provably secured lightweight authenticated key agreement protocol for modern health industry Ad Hoc Networks p. 103094
5.
go back to reference Lin H, Garg S, Hu J, Wang X, Piran MJ, Hossain MS (2020) Privacy-enhanced data fusion for covid-19 applications in intelligent internet of medical things. IEEE Internet of Things Journal 8(21):15683–15693CrossRef Lin H, Garg S, Hu J, Wang X, Piran MJ, Hossain MS (2020) Privacy-enhanced data fusion for covid-19 applications in intelligent internet of medical things. IEEE Internet of Things Journal 8(21):15683–15693CrossRef
6.
go back to reference Hossain MS (2015) Cloud-supported cyber-physical localization framework for patients monitoring. IEEE Systems Journal 11(1):118–127CrossRef Hossain MS (2015) Cloud-supported cyber-physical localization framework for patients monitoring. IEEE Systems Journal 11(1):118–127CrossRef
7.
go back to reference Gaba GS, Kumar G, Monga H, Kim TH, Kumar P (2020) Robust and lightweight mutual authentication scheme in distributed smart environments. IEEE Access 8(69):722–733 Gaba GS, Kumar G, Monga H, Kim TH, Kumar P (2020) Robust and lightweight mutual authentication scheme in distributed smart environments. IEEE Access 8(69):722–733
8.
go back to reference Braeken A (2018) Puf based authentication protocol for iot. Symmetry 10(8):352CrossRef Braeken A (2018) Puf based authentication protocol for iot. Symmetry 10(8):352CrossRef
9.
go back to reference Ahmed MI, Kannan G (2021) Cloud-based remote rfid authentication for security of smart internet of things applications. Journal of Information & Knowledge Management 20(supp01):2140004CrossRef Ahmed MI, Kannan G (2021) Cloud-based remote rfid authentication for security of smart internet of things applications. Journal of Information & Knowledge Management 20(supp01):2140004CrossRef
10.
go back to reference Quadir SE, Chandy JA (2019) Low pass filter puf: Authentication of printed circuit boards based on resistor and capacitor variations in High Performance Logic And Circuits For High-speed Electronic Systems. World Scientific pp. 113–127 Quadir SE, Chandy JA (2019) Low pass filter puf: Authentication of printed circuit boards based on resistor and capacitor variations in High Performance Logic And Circuits For High-speed Electronic Systems. World Scientific pp. 113–127
11.
go back to reference Sajid A, Abbas H, Saleem K (2016) Cloud-assisted iot-based scada systems security: A review of the state of the art and future challenges. IEEE Access 4:1375–1384CrossRef Sajid A, Abbas H, Saleem K (2016) Cloud-assisted iot-based scada systems security: A review of the state of the art and future challenges. IEEE Access 4:1375–1384CrossRef
12.
go back to reference Lim D (2004) Extracting secret keys from integrated circuits in master thesis. Massachusetts Institute of Technology Lim D (2004) Extracting secret keys from integrated circuits in master thesis. Massachusetts Institute of Technology
13.
go back to reference Mahalat MH, Saha S, Mondal A, Sen B (2018) A puf based light weight protocol for secure wifi authentication of IOT devices. In 8th International symposium on embedded computing and system design (ISED) IEEE 183–187 Mahalat MH, Saha S, Mondal A, Sen B (2018) A puf based light weight protocol for secure wifi authentication of IOT devices. In 8th International symposium on embedded computing and system design (ISED) IEEE 183–187
14.
go back to reference Yao J, Pang L, Su Y, Zhang Z, Yang W, Fu A, Gao Y (2022) Design and evaluate recomposited or-and-xor-puf. IEEE Transactions on Emerging Topics in Computing 10(2):662–677 Yao J, Pang L, Su Y, Zhang Z, Yang W, Fu A, Gao Y (2022) Design and evaluate recomposited or-and-xor-puf. IEEE Transactions on Emerging Topics in Computing 10(2):662–677
15.
go back to reference Majzoobi M, Koushanfar F, Potkonjak M (2008) Lightweight secure pufs. In 2008 IEEE/ACM International Conference on Computer-Aided Design. IEEE pp. 670–673 Majzoobi M, Koushanfar F, Potkonjak M (2008) Lightweight secure pufs. In 2008 IEEE/ACM International Conference on Computer-Aided Design. IEEE pp. 670–673
16.
go back to reference Sahoo DP, Mukhopadhyay D, Chakraborty RS, Nguyen PH (2017) A multiplexer-based arbiter puf composition with enhanced reliability and security. IEEE Transactions on Computers 67(3):403–417MathSciNetCrossRefMATH Sahoo DP, Mukhopadhyay D, Chakraborty RS, Nguyen PH (2017) A multiplexer-based arbiter puf composition with enhanced reliability and security. IEEE Transactions on Computers 67(3):403–417MathSciNetCrossRefMATH
17.
go back to reference Nguyen PH, Sahoo DP, Jin C, Mahmood K, Rührmair U, van Dijk M (2018) The interpose puf: Secure puf design against state-of-the-art machine learning attacks Cryptology ePrint Archive Nguyen PH, Sahoo DP, Jin C, Mahmood K, Rührmair U, van Dijk M (2018) The interpose puf: Secure puf design against state-of-the-art machine learning attacks Cryptology ePrint Archive
18.
go back to reference Qureshi MA, Munir A (2020) Puf-ipa: A puf-based identity preserving protocol for internet of things authentication in (2020). IEEE 17th annual consumer communications & networking conference (CCNC) IEEE 2020:1–7 Qureshi MA, Munir A (2020) Puf-ipa: A puf-based identity preserving protocol for internet of things authentication in (2020). IEEE 17th annual consumer communications & networking conference (CCNC) IEEE 2020:1–7
19.
go back to reference Barbareschi M, De Benedictis A, La Montagna E, Mazzeo A, Mazzocca N (2019) A puf-based mutual authentication scheme for cloud-edges iot systems. Future Generation Computer Systems 101:246–261CrossRef Barbareschi M, De Benedictis A, La Montagna E, Mazzeo A, Mazzocca N (2019) A puf-based mutual authentication scheme for cloud-edges iot systems. Future Generation Computer Systems 101:246–261CrossRef
20.
go back to reference Muhal MA, Luo X, Mahmood Z, Ullah A (2018) Physical unclonable function based authentication scheme for smart devices in internet of things in 2018 IEEE International Conference on Smart Internet of Things (SmartIoT). IEEE 2018 pp. 160–165 Muhal MA, Luo X, Mahmood Z, Ullah A (2018) Physical unclonable function based authentication scheme for smart devices in internet of things in 2018 IEEE International Conference on Smart Internet of Things (SmartIoT). IEEE 2018 pp. 160–165
21.
go back to reference Zalivaka SS, Ivaniuk AA, Chang C-H (2018) Reliable and modeling attack resistant authentication of arbiter puf in fpga implementation with trinary quadruple response. IEEE Transactions on Information Forensics and Security 14(4):1109–1123CrossRef Zalivaka SS, Ivaniuk AA, Chang C-H (2018) Reliable and modeling attack resistant authentication of arbiter puf in fpga implementation with trinary quadruple response. IEEE Transactions on Information Forensics and Security 14(4):1109–1123CrossRef
22.
go back to reference Mustapa M, Niamat MY, Nath APD, Alam M (2016) Hardware-oriented authentication for advanced metering infrastructure. IEEE Transactions on Smart Grid 9(2):1261–1270CrossRef Mustapa M, Niamat MY, Nath APD, Alam M (2016) Hardware-oriented authentication for advanced metering infrastructure. IEEE Transactions on Smart Grid 9(2):1261–1270CrossRef
23.
go back to reference Gao Y, Ma H, Al-Sarawi SF, Abbott D, Ranasinghe DC (2017) Puf-fsm: a controlled strong puf. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 37(5):1104–1108 Gao Y, Ma H, Al-Sarawi SF, Abbott D, Ranasinghe DC (2017) Puf-fsm: a controlled strong puf. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 37(5):1104–1108
24.
go back to reference Chatterjee U, Govindan V, Sadhukhan R, Mukhopadhyay D, Chakraborty RS, Mahata D, Prabhu MM (2018) Building puf based authentication and key exchange protocol for iot without explicit crps in verifier database. IEEE transactions on dependable and secure computing 16(3):424–437CrossRef Chatterjee U, Govindan V, Sadhukhan R, Mukhopadhyay D, Chakraborty RS, Mahata D, Prabhu MM (2018) Building puf based authentication and key exchange protocol for iot without explicit crps in verifier database. IEEE transactions on dependable and secure computing 16(3):424–437CrossRef
25.
go back to reference Zerrouki F, Ouchani S, Bouarfa H (2022) Puf-based mutual authentication and session key establishment protocol for IoT devices. J Amb Intell Human Comput pp. 1–19 Zerrouki F, Ouchani S, Bouarfa H (2022) Puf-based mutual authentication and session key establishment protocol for IoT devices. J Amb Intell Human Comput pp. 1–19
26.
go back to reference Santikellur P, Bhattacharyay A, Chakraborty RS (2019) Deep learning based model building attacks on arbiter puf compositions. Cryptology ePrint Archive Santikellur P, Bhattacharyay A, Chakraborty RS (2019) Deep learning based model building attacks on arbiter puf compositions. Cryptology ePrint Archive
27.
go back to reference Chaterjee U, Mukhopadhyay D, Chakraborty RS (2020) 3paa: A private puf protocol for anonymous authentication. IEEE Transactions on Information Forensics and Security 16:756–769CrossRef Chaterjee U, Mukhopadhyay D, Chakraborty RS (2020) 3paa: A private puf protocol for anonymous authentication. IEEE Transactions on Information Forensics and Security 16:756–769CrossRef
28.
go back to reference Chatterjee U, Chakraborty RS, Mukhopadhyay D (2017) A puf-based secure communication protocol for iot. ACM Transactions on Embedded Computing Systems (TECS) 16(3):1–25CrossRef Chatterjee U, Chakraborty RS, Mukhopadhyay D (2017) A puf-based secure communication protocol for iot. ACM Transactions on Embedded Computing Systems (TECS) 16(3):1–25CrossRef
29.
go back to reference Sadhu P, Yanambaka VP, Abdelgawad A, Yelamarthi K (2022) Nahap: Puf-based three factor authentication system for internet of medical things. IEEE Consumer Electronics Magazine Sadhu P, Yanambaka VP, Abdelgawad A, Yelamarthi K (2022) Nahap: Puf-based three factor authentication system for internet of medical things. IEEE Consumer Electronics Magazine
30.
go back to reference Gope P, Millwood O, Sikdar B (2021) A scalable protocol level approach to prevent machine learning attacks on physically unclonable function based authentication mechanisms for internet of medical things. IEEE Transactions on Industrial Informatics 18(3):1971–1980CrossRef Gope P, Millwood O, Sikdar B (2021) A scalable protocol level approach to prevent machine learning attacks on physically unclonable function based authentication mechanisms for internet of medical things. IEEE Transactions on Industrial Informatics 18(3):1971–1980CrossRef
31.
go back to reference Dubrova E, Näslund O, Degen B, Gawell A, Yu Y (2019) Crc-puf: A machine learning attack resistant lightweight puf construction in 2019 IEEE European symposium on security and privacy workshops (EuroS & PW). IEEE pp. 264–271 Dubrova E, Näslund O, Degen B, Gawell A, Yu Y (2019) Crc-puf: A machine learning attack resistant lightweight puf construction in 2019 IEEE European symposium on security and privacy workshops (EuroS & PW). IEEE pp. 264–271
32.
go back to reference Byun JW (2019) An efficient multi-factor authenticated key exchange with physically unclonable function in 2019 International Conference on Electronics, Information, and Communication (ICEIC). IEEE pp. 1–4 Byun JW (2019) An efficient multi-factor authenticated key exchange with physically unclonable function in 2019 International Conference on Electronics, Information, and Communication (ICEIC). IEEE pp. 1–4
33.
go back to reference Masud M, Gaba GS, Alqahtani S, Muhammad G, Gupta B, Kumar P, Ghoneim A (2020) A lightweight and robust secure key establishment protocol for internet of medical things in covid-19 patients care. IEEE Int Things J 8(21):15694–15703 Masud M, Gaba GS, Alqahtani S, Muhammad G, Gupta B, Kumar P, Ghoneim A (2020) A lightweight and robust secure key establishment protocol for internet of medical things in covid-19 patients care. IEEE Int Things J 8(21):15694–15703
34.
go back to reference Canetti R, Jain A, Scafuro A (2014) Practical UC security with a global random oracle. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security pp. 597–608 Canetti R, Jain A, Scafuro A (2014) Practical UC security with a global random oracle. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security pp. 597–608
35.
go back to reference Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inform Theory 29(2):198–208 Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inform Theory 29(2):198–208
Metadata
Title
A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System
Authors
Ravi Raushan Kumar Chaudhary
Kakali Chatterjee
Publication date
27-06-2023
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 4/2023
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01509-6

Other articles of this Issue 4/2023

Peer-to-Peer Networking and Applications 4/2023 Go to the issue

Premium Partner