Secure-user sign-in authentication for IoT-based eHealth systems

Abstract Sustainable Computing has advanced the technological evolution of the Internet and information-based communication technology. It is nowadays emerging in the form of the Cloud of Medical Things (CoMT) to develop smart healthcare systems. The academic community has lately made great strides...

Full description

Bibliographic Details
Main Authors: B. D. Deebak, Fadi Al-Turjman
Format: Article
Language:English
Published: Springer 2021-01-01
Series:Complex & Intelligent Systems
Subjects:
Online Access:https://doi.org/10.1007/s40747-020-00231-7
_version_ 1797806436763303936
author B. D. Deebak
Fadi Al-Turjman
author_facet B. D. Deebak
Fadi Al-Turjman
author_sort B. D. Deebak
collection DOAJ
description Abstract Sustainable Computing has advanced the technological evolution of the Internet and information-based communication technology. It is nowadays emerging in the form of the Cloud of Medical Things (CoMT) to develop smart healthcare systems. The academic community has lately made great strides for the development of security for the CoMT based application systems, such as e-healthcare systems, industrial automation systems, military surveillance systems, and so on. To the architecture of CoMT based Smart Environment, Chebyshev Chaotic-Map based single-user sign-in (S-USI) is found as a significant security-control mechanism. To ensure the fidelity, the S-USI assigns a unary-token to the legal users to access the various services, provided by a service provider over an IP-enabled distributed networks. Numerous authentication mechanisms have been presented for the cloud-based distributed networks. However, most of the schemes are still persuasible to security threats, such as user-anonymity, privileged-insider, mutual authentication, and replay type of attacks. This paper applies a sensor/sensor-tag based smart healthcare environment that uses S-USI to provide security and privacy. To strengthen the authentication process, a robust secure based S-USI mechanism and a well-formed coexistence protocol proof for pervasive services in the cloud are proposed. Using the formal security analysis, the prominence of the proposed strategies is proven to show the security efficiency of proposed S-USI. From the formal verification, the comparison results demonstrate that the proposed S-USI consumes less computation overhead; and thus it can be more suitable for the telecare medical information systems.
first_indexed 2024-03-13T06:07:18Z
format Article
id doaj.art-6852cdc25b2c4398bf0ba06e9e735b26
institution Directory Open Access Journal
issn 2199-4536
2198-6053
language English
last_indexed 2024-03-13T06:07:18Z
publishDate 2021-01-01
publisher Springer
record_format Article
series Complex & Intelligent Systems
spelling doaj.art-6852cdc25b2c4398bf0ba06e9e735b262023-06-11T11:29:48ZengSpringerComplex & Intelligent Systems2199-45362198-60532021-01-01932629264910.1007/s40747-020-00231-7Secure-user sign-in authentication for IoT-based eHealth systemsB. D. Deebak0Fadi Al-Turjman1School of Computer Science and Engineering, Vellore Institute of TechnologyArtificial Intelligence Department, Research Center for AI and IoT, Near East UniversityAbstract Sustainable Computing has advanced the technological evolution of the Internet and information-based communication technology. It is nowadays emerging in the form of the Cloud of Medical Things (CoMT) to develop smart healthcare systems. The academic community has lately made great strides for the development of security for the CoMT based application systems, such as e-healthcare systems, industrial automation systems, military surveillance systems, and so on. To the architecture of CoMT based Smart Environment, Chebyshev Chaotic-Map based single-user sign-in (S-USI) is found as a significant security-control mechanism. To ensure the fidelity, the S-USI assigns a unary-token to the legal users to access the various services, provided by a service provider over an IP-enabled distributed networks. Numerous authentication mechanisms have been presented for the cloud-based distributed networks. However, most of the schemes are still persuasible to security threats, such as user-anonymity, privileged-insider, mutual authentication, and replay type of attacks. This paper applies a sensor/sensor-tag based smart healthcare environment that uses S-USI to provide security and privacy. To strengthen the authentication process, a robust secure based S-USI mechanism and a well-formed coexistence protocol proof for pervasive services in the cloud are proposed. Using the formal security analysis, the prominence of the proposed strategies is proven to show the security efficiency of proposed S-USI. From the formal verification, the comparison results demonstrate that the proposed S-USI consumes less computation overhead; and thus it can be more suitable for the telecare medical information systems.https://doi.org/10.1007/s40747-020-00231-7Pervasive servicesCloud of Medical ThingsChebyshev Chaotic-MapSingle user sign-inSecurityPrivacy
spellingShingle B. D. Deebak
Fadi Al-Turjman
Secure-user sign-in authentication for IoT-based eHealth systems
Complex & Intelligent Systems
Pervasive services
Cloud of Medical Things
Chebyshev Chaotic-Map
Single user sign-in
Security
Privacy
title Secure-user sign-in authentication for IoT-based eHealth systems
title_full Secure-user sign-in authentication for IoT-based eHealth systems
title_fullStr Secure-user sign-in authentication for IoT-based eHealth systems
title_full_unstemmed Secure-user sign-in authentication for IoT-based eHealth systems
title_short Secure-user sign-in authentication for IoT-based eHealth systems
title_sort secure user sign in authentication for iot based ehealth systems
topic Pervasive services
Cloud of Medical Things
Chebyshev Chaotic-Map
Single user sign-in
Security
Privacy
url https://doi.org/10.1007/s40747-020-00231-7
work_keys_str_mv AT bddeebak secureusersigninauthenticationforiotbasedehealthsystems
AT fadialturjman secureusersigninauthenticationforiotbasedehealthsystems