31
views
0
recommends
+1 Recommend
2 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found

      A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care

      research-article

      Read this article at

      ScienceOpenPublisherPMC
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Due to the outbreak of COVID-19, the Internet of Medical Things (IoMT) has enabled the doctors to remotely diagnose the patients, control the medical equipment, and monitor the quarantined patients through their digital devices. Security is a major concern in IoMT because the Internet of Things (IoT) nodes exchange sensitive information between virtual medical facilities over the vulnerable wireless medium. Hence, the virtual facilities must be protected from adversarial threats through secure sessions. This article proposes a lightweight and physically secure mutual authentication and secret key establishment protocol that uses physical unclonable functions (PUFs) to enable the network devices to verify the doctor’s legitimacy (user) and sensor node before establishing a session key. PUF also protects the sensor nodes deployed in an unattended and hostile environment from tampering, cloning, and side-channel attacks. The proposed protocol exhibits all the necessary security properties required to protect the IoMT networks, like authentication, confidentiality, integrity, and anonymity. The formal AVISPA and informal security analysis demonstrate its robustness against attacks like impersonation, replay, a man in the middle, etc. The proposed protocol also consumes fewer resources to operate and is safe from physical attacks, making it more suitable for IoT-enabled medical network applications.

          Related collections

          Most cited references30

          • Record: found
          • Abstract: not found
          • Article: not found

          Two-factor user authentication in wireless sensor networks

            Bookmark
            • Record: found
            • Abstract: found
            • Article: found

            Explainable AI and Mass Surveillance System-Based Healthcare Framework to Combat COVID-I9 Like Pandemics

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion

                Bookmark

                Author and article information

                Contributors
                Journal
                IEEE Internet Things J
                IEEE Internet Things J
                0066700
                JIOT
                IITJAU
                Ieee Internet of Things Journal
                IEEE
                2327-4662
                01 November 2021
                28 December 2020
                : 8
                : 21
                : 15694-15703
                Affiliations
                [1] departmentDepartment of Computer Science, divisionCollege of Computers and Information Technology, institutionTaif University, institutionringgold 125895; Taif 21974 Saudi Arabia
                [2] departmentDepartment of Electronics and Electrical Engineering, institutionLovely Professional University, institutionringgold 126208; Phagwara 144411 India
                [3] departmentDepartment of Computer Engineering, divisionCollege of Computer and Information Sciences, institutionKing Saud University, institutionringgold 37850; Riyadh 11451 Saudi Arabia
                [4] institutionChair of Pervasive and Mobile Computing; Saudi Arabia
                [5] departmentDepartment of Computer Engineering, divisionCollege of Computer and Information Sciences, institutionKing Saud University, institutionringgold 37850; Riyadh 11543 Saudi Arabia
                [6] departmentDepartment of Computer Engineering, institutionNational Institute of Technology Kurukshetra, institutionringgold 29057; Haryana 136119 India
                [7] departmentDepartment of Computer Science and Information Engineering, institutionAsia University, institutionringgold 63267; Taichung 41354 Taiwan
                [8] departmentDepartment of Computer Science, institutionSwansea University, institutionringgold 7759; Swansea SA1 8EN U.K.
                [9] departmentDepartment of Software Engineering, divisionCollege of Computer and Information Sciences, institutionKing Saud University, institutionringgold 37850; Riyadh 51178 Saudi Arabia
                [10] departmentDepartment of Mathematics and Computer Science, divisionFaculty of Science, institutionMenoufia University, institutionringgold 68849; Shebin El-Koom 32511 Egypt
                Article
                10.1109/JIOT.2020.3047662
                8791439
                35782176
                8c10130c-2ddd-4ffc-8462-886e19030364
                Copyright @ 2020

                Personal use is permitted, but republication/redistribution requires IEEE permission. See https://www.ieee.org/publications/rights/index.html for more information.

                History
                : 16 December 2020
                : 22 December 2020
                : 22 October 2021
                Page count
                Figures: 8, Tables: 5, Equations: 429, References: 30, Pages: 10
                Funding
                Funded by: Deanship of Scientific Research at King Saud University, Riyadh, Saudi Arabia, through the Vice Deanship of Scientific Research Chairs: Chair of Pervasive and Mobile Computing, fundref 10.13039/501100011665;
                This work was supported by the Deanship of Scientific Research at King Saud University, Riyadh, Saudi Arabia, through the Vice Deanship of Scientific Research Chairs: Chair of Pervasive and Mobile Computing.
                Categories
                Article

                covid-19,cyber–physical system,internet of medical things (iomt),key management,security

                Comments

                Comment on this article