We found a match
Your institution may have access to this item. Find your institution then sign in to continue.
- Title
PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks.
- Authors
Patruni, Muralidhara Rao; Humayun, Abdul Gaffar
- Abstract
In 5G, the next generation of technologies like the Internet of Medical Things (IoMT) cooperate with networking artifacts to provide seamless connectivity. To provide effective information sharing, the Internet infrastructure integrates various components of medical information systems such as computing devices, software tools, and application services. The information systems access a massive Internet of Medical Things (mIoMT) to discover a series of network infrastructures with technological innovations to offer remote diagnosis and treatment. In collecting healthcare information, innovative applications utilize medical sensor networks to drive extensive information processing including mobility support. However, the convergence of IoT and the cloud addresses the security gap while centralizing the devices into edge computing systems to protect the transmission flow through the device gateway. Considering this fact, an authentication scheme with privacy preservation was proposed using a key exchange protocol and digital signature by Soleymani et al. to guarantee data confidentiality and integrity. However, this scheme is still incapable of validating the integrity of data with the edge systems properly. Thus, this paper presents privacy-preserving authentication with device verification (PP-ADV) for securing healthcare systems in 5G networks. To protect the device privacy and server identities with registered users, the proposed PP-ADV utilizes two cryptographic primitives namely elliptic curve arithmetic and a collision-free hash function to achieve the significant properties of key agreement protocol including authenticity and confidentiality. Formal and informal analyses show that the proposed PP-ADV can restrict vulnerabilities such as privileged insider and forgery to achieve high-level privacy protection with seamless verification to improve system efficiency compared with other state-of-the-art approaches. Also, a board simulation testbed was designed using Raspberry Pi with Arduino IDE to examine the quality metrics including data transmission ratio, authentication delay, and throughput rate. The testbed analysis demonstrates that the proposed PP-ADV gains less delay ≈ 292.28 s and improved throughput ≈ 87.73 to meet the design criteria of 5G-enabled remote healthcare systems.
- Subjects
KEY agreement protocols (Computer network protocols); 5G networks; COMPUTER systems; TECHNOLOGICAL innovations; INFRASTRUCTURE (Economics); COMMUNICATION infrastructure; TECHNOLOGY convergence
- Publication
International Journal of Information Security, 2024, Vol 23, Issue 1, p679
- ISSN
1615-5262
- Publication type
Article
- DOI
10.1007/s10207-023-00762-3