Secure-user sign-in authentication for IoT-based eHealth systems
Abstract Sustainable Computing has advanced the technological evolution of the Internet and information-based communication technology. It is nowadays emerging in the form of the Cloud of Medical Things (CoMT) to develop smart healthcare systems. The academic community has lately made great strides...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Springer
2021-01-01
|
Series: | Complex & Intelligent Systems |
Subjects: | |
Online Access: | https://doi.org/10.1007/s40747-020-00231-7 |
_version_ | 1797806436763303936 |
---|---|
author | B. D. Deebak Fadi Al-Turjman |
author_facet | B. D. Deebak Fadi Al-Turjman |
author_sort | B. D. Deebak |
collection | DOAJ |
description | Abstract Sustainable Computing has advanced the technological evolution of the Internet and information-based communication technology. It is nowadays emerging in the form of the Cloud of Medical Things (CoMT) to develop smart healthcare systems. The academic community has lately made great strides for the development of security for the CoMT based application systems, such as e-healthcare systems, industrial automation systems, military surveillance systems, and so on. To the architecture of CoMT based Smart Environment, Chebyshev Chaotic-Map based single-user sign-in (S-USI) is found as a significant security-control mechanism. To ensure the fidelity, the S-USI assigns a unary-token to the legal users to access the various services, provided by a service provider over an IP-enabled distributed networks. Numerous authentication mechanisms have been presented for the cloud-based distributed networks. However, most of the schemes are still persuasible to security threats, such as user-anonymity, privileged-insider, mutual authentication, and replay type of attacks. This paper applies a sensor/sensor-tag based smart healthcare environment that uses S-USI to provide security and privacy. To strengthen the authentication process, a robust secure based S-USI mechanism and a well-formed coexistence protocol proof for pervasive services in the cloud are proposed. Using the formal security analysis, the prominence of the proposed strategies is proven to show the security efficiency of proposed S-USI. From the formal verification, the comparison results demonstrate that the proposed S-USI consumes less computation overhead; and thus it can be more suitable for the telecare medical information systems. |
first_indexed | 2024-03-13T06:07:18Z |
format | Article |
id | doaj.art-6852cdc25b2c4398bf0ba06e9e735b26 |
institution | Directory Open Access Journal |
issn | 2199-4536 2198-6053 |
language | English |
last_indexed | 2024-03-13T06:07:18Z |
publishDate | 2021-01-01 |
publisher | Springer |
record_format | Article |
series | Complex & Intelligent Systems |
spelling | doaj.art-6852cdc25b2c4398bf0ba06e9e735b262023-06-11T11:29:48ZengSpringerComplex & Intelligent Systems2199-45362198-60532021-01-01932629264910.1007/s40747-020-00231-7Secure-user sign-in authentication for IoT-based eHealth systemsB. D. Deebak0Fadi Al-Turjman1School of Computer Science and Engineering, Vellore Institute of TechnologyArtificial Intelligence Department, Research Center for AI and IoT, Near East UniversityAbstract Sustainable Computing has advanced the technological evolution of the Internet and information-based communication technology. It is nowadays emerging in the form of the Cloud of Medical Things (CoMT) to develop smart healthcare systems. The academic community has lately made great strides for the development of security for the CoMT based application systems, such as e-healthcare systems, industrial automation systems, military surveillance systems, and so on. To the architecture of CoMT based Smart Environment, Chebyshev Chaotic-Map based single-user sign-in (S-USI) is found as a significant security-control mechanism. To ensure the fidelity, the S-USI assigns a unary-token to the legal users to access the various services, provided by a service provider over an IP-enabled distributed networks. Numerous authentication mechanisms have been presented for the cloud-based distributed networks. However, most of the schemes are still persuasible to security threats, such as user-anonymity, privileged-insider, mutual authentication, and replay type of attacks. This paper applies a sensor/sensor-tag based smart healthcare environment that uses S-USI to provide security and privacy. To strengthen the authentication process, a robust secure based S-USI mechanism and a well-formed coexistence protocol proof for pervasive services in the cloud are proposed. Using the formal security analysis, the prominence of the proposed strategies is proven to show the security efficiency of proposed S-USI. From the formal verification, the comparison results demonstrate that the proposed S-USI consumes less computation overhead; and thus it can be more suitable for the telecare medical information systems.https://doi.org/10.1007/s40747-020-00231-7Pervasive servicesCloud of Medical ThingsChebyshev Chaotic-MapSingle user sign-inSecurityPrivacy |
spellingShingle | B. D. Deebak Fadi Al-Turjman Secure-user sign-in authentication for IoT-based eHealth systems Complex & Intelligent Systems Pervasive services Cloud of Medical Things Chebyshev Chaotic-Map Single user sign-in Security Privacy |
title | Secure-user sign-in authentication for IoT-based eHealth systems |
title_full | Secure-user sign-in authentication for IoT-based eHealth systems |
title_fullStr | Secure-user sign-in authentication for IoT-based eHealth systems |
title_full_unstemmed | Secure-user sign-in authentication for IoT-based eHealth systems |
title_short | Secure-user sign-in authentication for IoT-based eHealth systems |
title_sort | secure user sign in authentication for iot based ehealth systems |
topic | Pervasive services Cloud of Medical Things Chebyshev Chaotic-Map Single user sign-in Security Privacy |
url | https://doi.org/10.1007/s40747-020-00231-7 |
work_keys_str_mv | AT bddeebak secureusersigninauthenticationforiotbasedehealthsystems AT fadialturjman secureusersigninauthenticationforiotbasedehealthsystems |