4.6 Article

LAAC: Lightweight Lattice-Based Authentication and Access Control Protocol for E-Health Systems in IoT Environments

期刊

IEEE SYSTEMS JOURNAL
卷 15, 期 3, 页码 3620-3627

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSYST.2020.3016065

关键词

Protocols; Authentication; Lattices; Cryptography; Internet of Things; Access control; Authentication; e-health systems; Internet of Things (IoT); lattice-based cryptography; privacy

向作者/读者索取更多资源

The Internet of Things has been crucial in the design of e-health systems, allowing for remote examination of a patient's health condition. However, security and privacy challenges in IoT-enabled e-health systems need to be addressed, particularly in terms of authentication, data confidentiality, and access control. A lattice-based authentication and access control (LAAC) protocol has been proposed to mitigate quantum attacks, with proven robustness based on the inhomogeneous small integer solution problem. Performance evaluation shows the feasibility of implementing LAAC in IoT devices.
Over the past few years, the Internet of Things (IoT) has played a crucial role in designing e-health systems. An IoT-enabled e-health system allows different entities to examine a patient's health condition anywhere and anytime. However, the deployment of e-health systems in an IoT environment faces various security and privacy challenges. The authentication of participating entities, the confidentiality of information transferred through an insecure channel, and access control are essential issues to be resolved. To settle these challenges, we found many authentication protocols for e-health systems based on the discrete logarithm and integer factorization problems. However, quantum attacks expose all these protocols. In this article, we propose a lattice-based authentication and access control (LAAC) protocol for IoT-enabled e-health systems to mitigate the quantum attacks. We prove that LAAC is robust with the hardness assumption of the inhomogeneous small integer solution problem. Moreover, we provide provable security analysis of LAAC. Besides, performance evaluation shows it is reasonable to execute LAAC in an IoT device.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Hardware & Architecture

DeepAG: Attack Graph Construction and Threats Prediction With Bi-Directional Deep Learning

Teng Li, Ya Jiang, Chi Lin, Mohammad S. S. Obaidat, Yulong Shen, Jianfeng Ma

Summary: Propose DeepAG, a framework that utilizes system logs to detect threats and predict attack paths. DeepAG leverages transformer models to detect APT attack sequences and utilizes LSTM network for bi-directional attack path prediction. It also constructs attack graphs and offers mechanisms for adapting to new attack patterns.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Information Systems

Edge-Assisted Intelligent Device Authentication in Cyber-Physical Systems

Yanrong Lu, Ding Wang, Mohammad S. Obaidat, Pandi Vijayakumar

Summary: Cyber-physical system (CPS) combined with artificial intelligence (AI) is used to extract information from the large volumes of data in the Industrial Internet of Things (IIoT). However, the traditional host-centric communication model of the current Internet faces challenges due to the increasing data traffic and number of IIoT devices. To address this, we propose an information-centric networking (ICN)-based system model that processes data closer to the edge in CPS. We also propose an edge-assisted authentication scheme in CPS to protect against unauthorized access and reduce workload for resource-constrained devices.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

A pairing-free data authentication and aggregation mechanism for Intelligent Healthcare System

Pooja Verma, Daya Sagar Gupta

Summary: The Intelligent Healthcare System aims to collect and analyze health information for improved and cost-effective medical treatment. However, privacy and security issues remain major challenges. To address these challenges, an efficient data authentication and aggregation protocol is introduced.

COMPUTER COMMUNICATIONS (2023)

Article Automation & Control Systems

A Provably Secure Lightweight Key Agreement Protocol for Wireless Body Area Networks in Healthcare System

Maryam Zia, Mohammad S. Obaidat, Khalid Mahmood, Salman Shamshad, Muhammad Asad Saleem, Shehzad Ashraf Chaudhry

Summary: Wireless Body Area Network (WBAN) is a crucial application of IoT, used to gather healthcare information from patients. Ensuring the security of this sensitive information is crucial. This article presents a secure and lightweight authentication protocol for WBAN, which outperforms other competing protocols in terms of scalability, security, and lightweight design. The protocol is proven to be resistant to major attacks and offers improved computation and communication costs efficiency of 20.3% and 12.3% respectively compared to competing protocols. The protocol's practical performance is also evaluated using the NS3 simulation tool.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Information Systems

Edge-Assisted Real-Time Instance Segmentation for Resource-Limited IoT Devices

Yuanyan Xie, Yu Guo, Zhenqiang Mi, Yang Yang, Mohammad S. Obaidat

Summary: This article proposes an edge-assisted instance segmentation method for resource-limited IoT devices. It offloads computation-intensive tasks from IoT devices to edge servers to speed up the inference processes. A data compression method and an adaptive computation offloading strategy are proposed to reduce communication cost and optimize latency requirements under volatile network conditions. Experimental results show that the method achieves lower latency with a slight drop in accuracy compared to existing methods.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

AI-Driven Salient Soccer Events Recognition Framework for Next-Generation IoT-Enabled Environments

Khan Muhammad, Hayat Ullah, Mohammad S. Obaidat, Amin Ullah, Arslan Munir, Muhammad Sajjad, Victor Hugo C. de Albuquerque

Summary: This article proposes an efficient deep-learning-based framework for multiperson salient soccer event recognition in the IoT-enabled FinTech. The framework performs event recognition through frames preprocessing, frame-level discriminative features extraction, and high-level events recognition in soccer videos. The results validate the suitability of the proposed framework for salient event recognition in Nx-IoT environments.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Deep Semantics Sorting of Voice-Interaction-Enabled Industrial Control System

Ke Wang, Chien-Ming Chen, Mohammad S. Obaidat, Saru Kumari, Sachin Kumar, Jinyi Long

Summary: In recent years, voice-interaction-based control systems have gained attention for implementing IIoT technologies in industrial control systems. The development of automated semantic understanding is important for remote voice control and intelligent management and control. Sorting technologies are crucial in voice-interaction-enabled industrial central control systems. Deep learning methods have been popular for optimizing conventional retrieval-based question answering. This study proposes three deep semantic sorting models based on deep learning, which outperformed state-of-the-art text matching methods in candidate document sorting.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Engineering, Multidisciplinary

A Lightweight and Efficient Remote Data Authentication Protocol Over Cloud Storage Environment

Zahid Ghaffar, Salman Shamshad, Khalid Mahmood, Mohammad S. Obaidat, Saru Kumari, Muhammad Khurram Khan

Summary: Cloud storage services require cost-effective, independent, and scalable functionality for efficient data management. Cloud repositories offer a convenient way to manage and access critical data. This article presents a secure authentication protocol that utilizes symmetric encryption and decryption algorithms to control data accessibility by cloud servers. The proposed protocol has been formally evaluated using the Random Oracle Model and implemented on the PythonAnywhere online cloud server, demonstrating its robustness against various attacks and its superior performance compared to related protocols.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

Article Robotics

Indoor Visual Re-Localization for Long-Term Autonomous Robots Based on Object-Level Features and Semantic Relationships

Yuanyan Xie, Yu Guo, Zhenqiang Mi, Xiaokun Wang, Yang Yang, Mohammad S. S. Obaidat

Summary: This letter presents a novel indoor visual re-localization method for long-term autonomous robots. It proposes a scene graph model that incorporates object-level features and semantic relationships to overcome the influence of dynamic objects. The developed visual re-localization method, based on the scene graph model, adopts graph matching technologies to incorporate pairwise object interactions as important features for re-localization and designs a feature reweighting strategy to reduce the impact of outliers in dynamic scenes. The proposed method has been verified in both simulation environments and real-world scenarios, showing higher robustness to diverse object changes and comparable performance to state-of-the-art methods under illumination changes.

IEEE ROBOTICS AND AUTOMATION LETTERS (2023)

Article Engineering, Multidisciplinary

Cloud-Assisted Secure and Cost-Effective Authenticated Solution for Remote Wearable Health Monitoring System

Khalid Mahmood, Mohammad S. Obaidat, Zahid Ghaffar, Bander A. Alzahrani, Salman Shamshad, Muhammad Asad Saleem, Shafiq Hussain

Summary: This article introduces a cost-effective and secure authenticated scheme for cloud-assisted remote wearable health monitoring system and showcases its resistance against known security threats.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

Article Computer Science, Information Systems

A Secure Cloud Gaming System

Chun-I Fan, Hsin-Nan Kuo, Yung-Sheng Tu, Yuan-Chi Chei, Chu-Chia Chuang, Yu-Chun Tseng, Arijit Karati

Summary: Cloud gaming is a new trend in gameplay where users' actions are sent to the gaming server through the internet, game software data is processed in the cloud server, and the gaming screen is sent to the user's computer. It prevents users from spending money on unnecessary hardware upgrades and allows the same game to run on multiple platforms. The increasing popularity of 5G mobile network offers faster internet speed and reduced energy usage, making cloud gaming a more enjoyable experience. However, ensuring safe data access in the cloud and defending against network assaults are important challenges addressed in this paper, which proposes a robust system for secure and authentic game access through the cloud.

JOURNAL OF INFORMATION SCIENCE AND ENGINEERING (2023)

Article Computer Science, Hardware & Architecture

Context-Based Persuasion Analysis of Sentiment Polarity Disambiguation in Social Media Text Streams

Tajinder Singh, Madhu Kumari, Daya Sagar Gupta

Summary: This research proposes an approach inspired by context-based persuasion analysis for sentiment analysis to address the challenges in real-time series prediction and decision making using Bayesian belief network. The study highlights the importance of considering the impact of sentimental contextual polarity in social media and uses various techniques such as pre-processing, dependency parsing, and Bayesian network learning to analyze sentiment polarity. The findings emphasize the complexity and context-dependent mechanism behind sentiment analysis in social media.

NEW GENERATION COMPUTING (2023)

Article Engineering, Multidisciplinary

REORDER plus plus : Enhanced Randomized Real-Time Scheduling Strategy Against Side-Channel Attacks

Jiankang Ren, Zheng Wang, Chi Lin, Mohammad S. Obaidat, Hongrui Xie, Haihui Zhu, Chunxiao Liu, Kaiwen Wang, Guozhen Tan

Summary: With the increasing use of common-off-the-shelf components and the drive towards remote communication, security has become a key consideration in embedded real-time systems. This article introduces an enhanced online randomized scheduling strategy, which breaks the deterministic task execution pattern to counteract timing side-channel attacks.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

Proceedings Paper Computer Science, Information Systems

Robust Three-Factor Lightweight Authentication Based on Extended Chaotic Maps for Portable Resource-Constrained Devices

Arijit Karati, Yu-Sheng Chang, Ting-Yu Chen

Summary: Public-key based authentication and key agreement (AKA) protocols have attracted attention for providing secure access. Existing three-factor AKA protocols often have reduced security, so finding a balance between security and usability and countering cloning risks is a challenge. To address this, we propose a lightweight three-factor AKA protocol for mobile devices that utilizes physical unclonable functions and extended chaotic maps.

PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023 (2023)

暂无数据