{"title":"EMAKAS:适用于物联网环境的高效三因素相互认证和密钥协议方案","authors":"Tinashe Magara , Yousheng Zhou","doi":"10.1016/j.csa.2024.100066","DOIUrl":null,"url":null,"abstract":"<div><p>The adoption of IoT in healthcare revolutionizes remote patient monitoring and healthcare efficiency. Yet, it brings notable security and privacy challenges, particularly in resource-constrained environment. We propose a secure and efficient three-factor lightweight mutual authentication and key agreement scheme, designed for IoT-based smart healthcare systems, addressing these critical concerns. The scheme employs a fuzzy extractor, a one-way hash function, Elliptic Curve Discrete Logarithm and XOR operations for efficient cryptographic transformations, creating a robust framework for secure data handling. The scheme's design focuses on security and privacy while minimizing computational demands, making it ideal for resource-constrained IoT devices. We utilized both informal and formal security analyses to validate our scheme, employing the Random Oracle Model (ROM), Scyther tool and Burrows-Abadi-Needham (BAN) logic. The security and performance analysis showed that our scheme offers more security features across 15 defined criteria with minimal communication and computational costs compared to other related schemes. The scheme is not only robust against security threats but also practical for implementation in IoT healthcare environment, offering a solution for secure IoT communication by achieving mutual authentication and key agreement with minimized computational requirements.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100066"},"PeriodicalIF":0.0000,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000328/pdfft?md5=d75e8e032da3467ecc69f9f1bed90b00&pid=1-s2.0-S2772918424000328-main.pdf","citationCount":"0","resultStr":"{\"title\":\"EMAKAS: An efficient three-factor mutual authentication and key-agreement scheme for IoT environment\",\"authors\":\"Tinashe Magara , Yousheng Zhou\",\"doi\":\"10.1016/j.csa.2024.100066\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>The adoption of IoT in healthcare revolutionizes remote patient monitoring and healthcare efficiency. Yet, it brings notable security and privacy challenges, particularly in resource-constrained environment. We propose a secure and efficient three-factor lightweight mutual authentication and key agreement scheme, designed for IoT-based smart healthcare systems, addressing these critical concerns. The scheme employs a fuzzy extractor, a one-way hash function, Elliptic Curve Discrete Logarithm and XOR operations for efficient cryptographic transformations, creating a robust framework for secure data handling. The scheme's design focuses on security and privacy while minimizing computational demands, making it ideal for resource-constrained IoT devices. We utilized both informal and formal security analyses to validate our scheme, employing the Random Oracle Model (ROM), Scyther tool and Burrows-Abadi-Needham (BAN) logic. The security and performance analysis showed that our scheme offers more security features across 15 defined criteria with minimal communication and computational costs compared to other related schemes. The scheme is not only robust against security threats but also practical for implementation in IoT healthcare environment, offering a solution for secure IoT communication by achieving mutual authentication and key agreement with minimized computational requirements.</p></div>\",\"PeriodicalId\":100351,\"journal\":{\"name\":\"Cyber Security and Applications\",\"volume\":\"3 \",\"pages\":\"Article 100066\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-08-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.sciencedirect.com/science/article/pii/S2772918424000328/pdfft?md5=d75e8e032da3467ecc69f9f1bed90b00&pid=1-s2.0-S2772918424000328-main.pdf\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Cyber Security and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2772918424000328\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cyber Security and Applications","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2772918424000328","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
EMAKAS: An efficient three-factor mutual authentication and key-agreement scheme for IoT environment
The adoption of IoT in healthcare revolutionizes remote patient monitoring and healthcare efficiency. Yet, it brings notable security and privacy challenges, particularly in resource-constrained environment. We propose a secure and efficient three-factor lightweight mutual authentication and key agreement scheme, designed for IoT-based smart healthcare systems, addressing these critical concerns. The scheme employs a fuzzy extractor, a one-way hash function, Elliptic Curve Discrete Logarithm and XOR operations for efficient cryptographic transformations, creating a robust framework for secure data handling. The scheme's design focuses on security and privacy while minimizing computational demands, making it ideal for resource-constrained IoT devices. We utilized both informal and formal security analyses to validate our scheme, employing the Random Oracle Model (ROM), Scyther tool and Burrows-Abadi-Needham (BAN) logic. The security and performance analysis showed that our scheme offers more security features across 15 defined criteria with minimal communication and computational costs compared to other related schemes. The scheme is not only robust against security threats but also practical for implementation in IoT healthcare environment, offering a solution for secure IoT communication by achieving mutual authentication and key agreement with minimized computational requirements.