4.3 Article

Lightweight and efficient privacy-preserving mutual authentication scheme to secure Internet of Things-based smart healthcare

Publisher

WILEY
DOI: 10.1002/ett.4716

Keywords

-

Ask authors/readers for more resources

In recent years, IoT technology has been widely used in various sectors such as healthcare, agriculture, and industrial automation. The adoption of IoT, cloud computing, and machine learning has transformed healthcare systems into smart, automated, and efficient systems. However, the increasing number of cyber-attacks on IoT devices has posed challenges of data security, privacy protection, and authentication. This article proposes a privacy-preserving mutual authentication scheme for IoT-enabled healthcare systems to ensure lightweight and effective authentication of network devices.
In recent years, Internet of Things (IoT) technology has been adopted in numerous application areas, such as healthcare, agriculture, industrial automation, and many more. The use of IoT and other technologies like cloud computing and machine learning has made the modern healthcare system to be smart, automated, and efficient. However, the continuous proliferation of cyber-attacks on IoT devices has increased IoT challenges like data security, privacy protection, authentication, and so forth. In smart healthcare systems, due to the lack of authentication protocols, attackers can undermine the availability, confidentiality, and integrity of both smart healthcare devices and data, which can be life-threatening in some situations. In this article, a privacy-preserving mutual authentication scheme for IoT-enabled healthcare systems is proposed to achieve lightweight and effective authentication of network devices. To support the processing capabilities of the IoT devices, this proposed authentication scheme is designed using lightweight cryptographic primitives, namely XOR, concatenation, and hash operation. The proposed scheme can establish a secure session between an authorized device and a gateway, and prevent unauthorized devices from getting access to healthcare systems. The security analysis and performance analysis assess the proposed authentication technique's effectiveness over existing well-known schemes.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.3
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available