An Anonymity, Availability and Security-Ensured Authentication Model of the IoT Control System for Reliable and Anonymous eHealth Services
- 65 Downloads
eHealth is supported by electronic processes and communication. The Internet of Things (IoT) is utilized to realize smart healthcare, backup terminal devices are required for reliable eHealth services, and the IoT control system is essential for the security of IoT applications. In 2013, Yang et al. first added backup terminal devices, a status monitor device and an alarm module to the IoT control system and proposed an authentication mechanism for availability and security. In 2016, Chang et al. found that Yang et al.’s authentication model suffers from some drawbacks. In this paper, we adjust the operation and requirements of the IoT control system and take user anonymity into consideration to propose an authentication model for the IoT control system for reliable and anonymous eHealth services. To ensure anonymity of the user and the accessed service, the real identifiers will not be transmitted for untraceability. The proposed authentication model complies with six essential requirements. Via the proposed authentication model, the IoT control system can ensure reliable and anonymous eHealth services with anonymity, availability and security.
KeywordseHealth The Internet of Things (IoT) RFID Mutual authentication User anonymity
This work was supported in part by Ministry of Science and Technology under the Grants MOST 105-2221E-034-014-, MOST 106-2622-H-025-001-CC3, and MOST 106-2410-H-025-006.
- 4.Henrici, D., & Muller, P. (2004). Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 149–153.Google Scholar
- 9.Cho, J. S., Jeong, Y. S., & Park, S. O. (2015). Consideration on the brute-force attack cost and retrieval cost: a hash-based radio-frequency identification (RFID) tag mutual authentication protocol. Computers and Mathematics with Applications, 69(1), 58–65. https://doi.org/10.1016/j.camwa.2012.02.025.CrossRefzbMATHGoogle Scholar
- 10.Safkhani, M., Peris-Lopez, P., Hernandez-Castro, J. C., & Bagheri, N. (2014). Cryptanalysis of the Cho et al. protocol: a hash-based RFID tag mutual authentication protocol. Journal of Computational and Applied Mathematics, 256(B), 571–577. https://doi.org/10.1016/j.cam.2013.09.073.MathSciNetCrossRefzbMATHGoogle Scholar
- 11.Chang, Y. F., Lo, Y. L., & Tai, W. L. (2016). Comments on an authentication model of IoT control system. In Proceedings of the 4th Annual Conference on Engineering and Information Technology, pp.771–776.Google Scholar
- 14.Farash, M. S., Turkanović, M., Kumari, S., & Hölbl, M. (2015). An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Networks, 36(1), 152–176. https://doi.org/10.1016/j.adhoc.2015.05.014.Google Scholar
- 16.Sutrala, A. K., Das, A. K., Odelu, V., Wazid, M., & Kumari, S. (2016). Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems. Computer Method and Program in Biomedicine, 135, 167–185. https://doi.org/10.1016/j.cmpb.2016.07.028.CrossRefGoogle Scholar
- 17.Amin, R., Islam, S. H., Biswas, G. P., Khan, M. K., & Li, X. (2015). Cryptanalysis and enhancement of anonymity preserving remote user mutual authentication and session key agreement scheme for e-health care systems. Journal of Medical Systems, 39(11), 1–21. https://doi.org/10.1007/s10916-015-0318-z.Google Scholar