Skip to main content
Bioengineering logoLink to Bioengineering
. 2023 Jul 15;10(7):839. doi: 10.3390/bioengineering10070839

Securing Group Patient Communication in 6G-Aided Dynamic Ubiquitous Healthcare with Real-Time Mobile DNA Sequencing

Tuan-Vinh Le 1,2
Editors: Mihaela Hnatiuc, Larbi Boubchir, Victor Hugo C De Albuquerque
PMCID: PMC10376143  PMID: 37508866

Abstract

(1) Background: With an advanced technique, third-generation sequencing (TGS) provides services with long deoxyribonucleic acid (DNA) reads and super short sequencing time. It enables onsite mobile DNA sequencing solutions for enabling ubiquitous healthcare (U-healthcare) services with modern mobile technology and smart entities in the internet of living things (IoLT). Due to some strict requirements, 6G technology can efficiently facilitate communications in a truly intelligent U-healthcare IoLT system. (2) Research problems: conventional single user–server architecture is not able to enable group conversations where “multiple patients–server” communication or “patient–patient” communication in the group is required. The communications are carried out via the open Internet, which is not a trusted channel. Since heath data and medical information are very sensitive, security and privacy concerns in the communication systems have become extremely important. (3) Purpose: the author aims to propose a dynamic group-based patient-authenticated key distribution protocol for 6G-aided U-healthcare services enabled by mobile DNA sequencing. In the protocol, an authenticated common session key is distributed by the server to the patients. Using the key, patients in a healthcare group are allowed to securely connect with the service provider or with each other for specific purposes of communication. (4) Results: the group key distribution process is protected by a secure three-factor authentication mechanism along with an efficient sequencing-device-based single sign-on (SD-SSO) solution. Based on traceable information stored in the server database, the proposed approach can provide patient-centered services which are available on multiple mobile devices. Security robustness of the proposed protocol is proven by well-known verification tools and a detailed semantic discussion. Performance evaluation shows that the protocol provides more functionality and incurs a reasonable overhead in comparison with the existing works.

Keywords: 6G technology, third-generation sequencing (TGS), DNA-reading biosensor, ubiquitous healthcare (U-healthcare), patient-centric care, internet of living things (IoLT), dynamic group patient communication, sequencing-device-based single sign-on (SD-SSO), biometric authentication, elliptic curve cryptography (ECC)

1. Introduction

Third-generation sequencing (TGS) provides services with long deoxyribonucleic acid (DNA) reads and super short sequencing time [1,2,3]. In this technique, since single DNA molecules are sequenced directly, the sequencing time is reduced to a few hours, and even real-time data analysis process is enabled. In addition, TGS-based sequencers can be miniaturized while its DNA-reading biosensors are placed on the body to monitor human health and vital signs via blood, sweat, saliva, tissue, etc. [3]. This enables an onsite mobile DNA sequencing solution for facilitating ubiquitous healthcare (U-healthcare) services with modern mobile technology and smart systems in the internet of living things (IoLT) [3,4]. For instance, as shown in Figure 1, the SmidgION sequencer is a tiny device designed by the Oxford Nanopore [5] to be run on mobile devices (e.g., smart phones) using small batteries and apps [3]. The biosensors load biological samples into the sequencer, and the genomic data (e.g., FAST5 file, FASTQ file, or TXT file [5]) along with its analytical results are produced, building a sort of “lab-on-a-chip (LOC)” system [3,5,6,7]. Therefore, medical providers can rapidly screen for new viruses, paving a way for further discovering the IoLT. The researchers can also obtain onsite DNA sequences for specific end-to-end analysis. The U-healthcare is directly concerned with patient-centric therapies. To this end, a real-time mobile DNA sequencing service is completely a good fit as it can provide personalized treatments and holds promise for precision medicine research.

Figure 1.

Figure 1

New innovative sequencers of the Oxford Nanopore [8].

Due to its excellent mobility, high operating frequency, high data transfer rate, and super low end-to-end communication delay, 6G mobile technology is attracting much attention in various application fields [9,10,11]. Strict requirements of 6G, which cannot be achieved by 5G, were particularly introduced for the healthcare sector, including an operating frequency of ≥1 THz, data transfer rate of ≥1 Tbps, communication delay of ≤1 ms, mobility of ≥1000 km/h, reliability of 109, and a wavelength of ≤300 µm [10]. Due to such advances, 6G can efficiently support artificial intelligence (AI) functionalities [12] with seamless communications. As a matter of fact, it has certain advantages in establishing a truly intelligent U-healthcare IoLT system enabled by real-time mobile NDA sequencing techniques and advanced medical analysis. Patients and healthcare providers are allowed to communicate with each other in a reliable and high-speed network environment, possibly sharing large files or a huge amount of data.

1.1. Research Problems

Apart from individual services, healthcare providers may provide some special treatments for groups of patients (e.g., family). These patients may have similar diseases, signs, or symptoms. They can also be persons those who need similar procedures in the healthcare processes or medical treatments. Traditional single user–server architecture is not able to provide such group conversations where “multiple patients–server” communications and “patient–patient” communications are required.

The communications are carried out via the open Internet, which is not a trusted channel. Because heath data and medical information are very sensitive, security and privacy concerns in the communication systems have become extremely important. Cyber criminals may perform various attacks that can steal personal information of patients, violate user privacy, or disrupt services (e.g., impersonation attacks). During communication, care providers (e.g., medical professionals, physicians, doctors, etc.) also need to verified as a legitimate entity to avoid possibly fraudulent services or fake behaviors.

The U-healthcare services may be provided by different institutions, including hospitals, clinics, etc.; the number of services (e.g., hematologist, cardiologist, gastroenterologist, etc. [13]) is increasing over time. Therefore, the traditional single-server system model would be unable to satisfy the demand of users once they wish to enjoy massive medical services. When using services from multiple providers, remembering massive amounts of credentials (especially user passwords) for the login will certainly induce inconvenience and directly affect the efficiency of communications. In these systems, how to alleviate computational overhead and communicational overhead is also an important concern that needs to be considered.

1.2. Goals and Contributions

This paper proposes a dynamic group-based patient-authenticated key distribution protocol for 6G-aided U-healthcare services enabled by real-time mobile DNA sequencing. In the protocol, an authenticated common session key is distributed by the server to the patients. Using the key, patients in a healthcare group are allowed to securely connect with the service provider or with each other for specific purposes of communication. The author aims to introduce a protocol that achieves multiple innovative functionalities, high security robustness, and reasonable communication overhead. The main contributions of the paper are presented as follows.

  • (1)

    This work is the first to introduce 6G-assisted group-based U-healthcare services enabled by a real-time DNA sequencing technique constructed in IoLT environments. A patient-grouping solution helps in accelerating service communications and achieving better medical-centered services. With the assistance of 6G technology, onsite sequencing data produced by a portable TGS-based sequencer (connected to a patient’s mobile device) is transmitted to the server in a real-time manner for further healthcare processes. Thereafter, the server shares analytical results and related medical information with the patients. These procedures are secured by common group keys generated by the proposed protocol. The server is also allowed to trace the users based on their registered information for achieving a truly patient-centric service.

  • (2)

    In the proposed protocol, a sequencing-device-based single sign-on (SD-SSO) function is introduced for the first time. Patients are allowed to store a single set of credentials (registered with multiple servers) on their DNA sequencers directly. Due to the SSO property, the patients only need to login to the system once per session to communicate with multiple providers. In addition, the proposed SD-SSO function is designed without the participation of a third-party center, which can reduce communication overhead and address the risk of adversaries hacking into the registration center and compromising all servers.

  • (3)

    A three-factor authentication mechanism is enabled in the protocol through the integration of password (the first factor), sequencing device (the second factor), and biometrics (the third factor). Lacking only one of the three factors will result in failure of the authentication. In this way, better patient privacy and perfect forward secrecy of group keys are assured for securing U-healthcare communications. In the protocol, patient password and patient biometrics are changeable, which further enhances the security robustness.

  • (4)

    The author introduces dynamic U-healthcare services enabled by a time-bound function. In this design, different services of a provider or multiple healthcare processes in a single service can be allotted in respective time ranges in accordance with specific requests. This solution makes providers flexibly adjust service time in order to provide more efficient medical processes as well as more convenient treatments for different kinds of patients. Controlling such access to the services using the time bounds can also address possible bottleneck issues where the services are requested at the same time by massive patients. Furthermore, a fast synchronizable key-derivation procedure is provided, which can rapidly reset communication keys for addressing desynchronization problems that could possibly occur in such a dynamic environment.

1.3. Paper Organization

The remainder of this article is structured as follows. Section 2 presents related works of the proposed protocol. Some technical preliminaries used in the work are provided in Section 3. In Section 4, the problem formulation describes the architecture model and formal security model of the proposed work. Section 5 details the design of the proposed protocol. Security evaluation and performance analysis of the proposed protocol are provided in Section 6 and Section 7, respectively. The author concludes the proposal and discusses some of his future research works in the last section of the article.

2. Related Works

2.1. 5G, 6G, and U-Healthcare

In many countries, 5G mobile technology has been successfully developed and deployed as an enabler for supporting various sorts of networks and diverse applications [14]. However, in the era of digital transformation and emerging smart internet of things (IoT) applications, 5G needs some more advances to improve service delivery and business [15]. Moreover, 5G has some drawbacks and limitations in terms of functionalities in healthcare sector; for instance, it cannot provide holographic communication for medical applications due to its lower data rate [9,16]. To this end, 6G was introduced to fully address escalating technical demands, e.g., remote robotic surgery or other truly intelligent healthcare services enabled by the Intelligent Radio (IR) technique [17]. It achieves an ultra-high bandwidth (three times higher than that of 5G [18,19]) and a highly dynamic environment with a terahertz (THz) signal [18]. Therefore, 6G offers an ultra-high data transfer rate for revolutionizing U-healthcare communications. It is also fully backed by satellite [20], which completely facilitates ubiquitous care activities in medical networks at every geographical location. This article introduces a construction of 6G wireless technology for a time-bound-enabled DNA-based group healthcare application via IoLT-based biosensor networks. In addition, to the best of the author’s knowledge, this is the first work to address security and privacy issues in a dynamic U-healthcare communication environment.

2.2. User Authentication and Key Negotiation Solutions

User authentication and key agreement solutions were discussed in many previously published works. Deebak and Al-Turjman [21] introduced a patient authentication scheme used in healthcare systems with cloud services; it overcame several security challenges that had been not successfully addressed in the protocol of Chiou et al. [22], e.g., lost device attacks or server impersonation attacks. Wang et al. [23] also proposed an improved key agreement mechanism for wireless body area networks (WBANs) that resolved some similar issues of Farash et al. [24]’s work. Kumar et al. [25] discussed a single-factor password-based patient authentication solution for cloud-based healthcare systems in the internet of medical things (IoMT). A two-factor data authentication scheme with access control was proposed by Gupta et al. [26] for an industrial healthcare infrastructure. Alam and Kumar [27] designed a session key establishment protocol for ensuring confidentiality of IoMT-based communications in COVID-19 and future pandemic scenarios. In addition, Thakare and Kim [28] discussed another two-factor cryptographic approach for user authentication in IoT networks, and Yu et al. [29] introduced a biometrics-based multi-server user authentication and key agreement mechanism using extended chaotic maps. Wong et al. [30] introduced a three-factor identification model applied to 5G-enabled e-health environments with multi-server architecture. However, Le and Hsu [31] indicated that biometrics noise had not been discussed and resolved in Wong et al. [30]’s work, which always makes the authentication procedure incorrect. Le and Hsu [31] then discussed various solutions [32] (error-correcting codes, fuzzy extractor, biohash function, etc.) for remedying this issue and proposed an improved protocol for securing communications in group e-health services. The author found the protocol of Le and Hsu [31] is not robust against stolen smart-card attacks as adversaries can obtain patients’ passwords in unmasked forms using the power analysis method [33]. Another design of lightweight group key agreement presented by Harn et al. [34] exploited some basic cryptographic operations and explained its potentials in several application networks. Based on principles of elliptic-curve cryptography (ECC), Tselikis et al. [35] also introduced an group key distribution scheme that provided privacy protection for communications. Both Harn et al. [34] and Tselikis et al. [35] did not include either biometric authentication function or three-factor authentication solutions in their designs. Meshram et al. [36] proposed a remote user password-based key negotiation scheme for application in smart cities based on smart cards and extended chaotic maps. Nevertheless, the service provider in Meshram et al. [36]’s scheme has to update a dynamic parameter in the database before each authentication is completed. This would sometimes result in unexpected desynchronization problems in the system. Based on the author’s observation, although Thakare and Kim [28] and Meshram et al. [36] achieved user anonymity in their works, both are not able to assure user untraceability. Communicated transcripts in their proposed schemes contain fixed parameters that give adversaries opportunities to trace users’ identities. Le [37] recently introduced a cross-server-authenticated patient key exchange protocol for U-healthcare in IoLT networks. Apart from its security robustness, Le [37]’s protocol cannot provide truly patient-centric services, as the server does not store any information of patients after its registration procedure finishes. In the registration phase of Le [37]’s approach, some credentials of the patients are stored in a single mobile entity, which cannot make U-healthcare services available on multiple devices. Furthermore, none of the above works discussed dynamic healthcare communication in group-based services.

3. Preliminaries

This section discusses some important technical aspects and mathematical preliminaries employed in the proposed approach, including sequencing biosensor technology, the biohash function, the time-bound function, and security complexity assumptions.

3.1. Sequencing Biosensor Technology

Second-generation sequencing (SGS) techniques, also known as next-generation sequencing (NGS) techniques, enable the process where millions of short deoxyribonucleic acid (DNA) fragments are sequenced in parallel [38]. Nevertheless, SGS comes with some drawbacks, including short read lengths and nonportability of the sequencers. In recent years, innovative healthcare services and medical research have required longer reads and shorter sequencing times, which led to the advent of TGS [3] and fourth-generation sequencing (FGS) [39]. From TGS, single DNA molecules are sequenced directly, reducing processing time from a few days to a few hours and enabling real-time analysis with sequence-based ultrarapid pathogen identification [3]. Sequencing devices can be miniaturized (for instance, SmidgION sequencer), and built-in DNA-reading biosensors on each tiny TGS-based sequencer can collect biological samples for monitoring human health and vital signs. In the proposed protocol, besides the sequencing function, the sequencer also serves as a token that stores user credentials used for authentication process, enabling service availability on multiple mobile devices including smart phones, smart tablets, etc. It is employed as the second authentication factor (something you have) in the proposed approach.

3.2. Biohash Function

As we know, biometric samples are enrolled via a noisy channel. The input biometrics samples in each authentication session are not identical; as a result, it causes false positive errors of the authentication. To this end, the biohash function can map the individuals’ biometrics to specific binary strings and effectively tolerate noise [32]. Security of the biohash function is similar to conventional one-way hash functions [31]. The function also resolves the efficiency issue, which is a drawback of some related ideas, for instance, fuzzy extractor [32].

Definition 1. 

Given a biohash function hbio, the original biometrics Bi, and the newly input biometrics Bi of an individual, it is inferred that Bi is different to Bi, but the difference between them is within a certain threshold. Due to the property of hbio, we can achieve hbioBi=hbioBi.

3.3. Time-Bound Function

Definition 2. 

Given three time points t,t1,t2 ∈ {1, 2, …, z} and two values p=ht11() and q=hzt2(), where h is a one-way hash function and “, ” denotes some arbitrary parameters, a value w=h(htt1(p)||ht2tq) is computable if and only if t satisfies t1tt2. Note that z may be 24 (h), 1440 (min), or some value specifying the time of a single day. z may also be set for multiple days or more, based directly on time allocations of specific services and on security level of systems.

3.4. Complexity Assumptions

The ECC is employed in the proposed approach. It is an asymmetric cryptosystem that offers better performance with smaller key space considering the same security level compared with the traditional ones [37]. Therefore, the ECC system is completely suitable for mobile communications in IoLT networks. In the proposed work, the author employs three security assumptions of the ECC including the elliptic curve discrete logarithm problem (ECDLP), the elliptic curve computational Diffie–Hellman problem (ECCDHP), and the elliptic curve factorization problem (ECFP). Suppose there is an elliptic curve Epa,b:y2=x3+ax+b(mod p) over a finite field Fp with a basic point G(x,y)Ep; the assumptions are defined as follows.

Definition 3. 

The ECDLP is to find the scalar kZp such that K(x,y)=k·G(x,y), given G(x,y),K(x,y)Ep.

Definition 4. 

The ECCDHP is to find the point s·t·G(x,y)Ep, given s,tZp and G(x,y),s·Gx,y,t·GEp.

Definition 5. 

The ECFP is to find two points s·G(x,y),t·G(x,y)Ep, given s,tZp and Gx,y,[s+t]·G(x,y)Ep.

4. Problem Formulation

This section discusses in details system model of the proposed approach along with some well-known adversarial capabilities. A well-known security model is also formulated based upon the rule of the protocol. Main cryptographic functions and notations used in the work are tabulated in Table 1.

Table 1.

Notations used in the proposed approach.

Notation Used in the Protocol Explanation
Sj The jth server
Pi The ith patient
prkj,pukj Private key, public key of Sj
P(x,y) Basic point on the curve Ep(a,b) with two coordinates x and y
IDi Identity of Pi
PWi Password of Pi
Bi Biometrics of Pi
MDi Mobile device of Pi
SDi Sequencing device (sequencer) of Pi
T Timestamp
|| Concatenating operation
Exclusive-or (XOR) operation
h·,hbio(·) One-way hash function, biohash function
SEk·,SDk· Symmetric encryption, symmetric decryption using a key k
[·]SDi Storing parameters in SDi
𝒜 Adversary

4.1. System Model and Adversarial Capabilities

As shown in Figure 2, the main communicating entities in the system include patient Pi (in a group of multiple patients) and servers Sj (e.g., private doctors, genomic data scientists, etc.) who communicate with each other for conducting group services. DNA-based U-healthcare includes various services, namely, disease virus control, body fluid monitoring, blood-based prognostic tracking, and so on [3,40]. Taking family healthcare services as an example, multiple members Pi in a family may request a common DNA-based healthcare service provided by Sj. The service allows the family members to obtain medical data shared among them and to know of the health status of each other conveniently. As a spiritual element, family plays an important role in promoting our health as well as in improving quality of life [41]. In case of need, a family member may also render timely assistance to doctors in observing the other members’ states of illness. Thus, it would significantly improve efficiency of long-term care or treatments and help in reducing the risk of medical incidents. To trigger the services, biological samples of Pi (e.g., saliva) are loaded into the sequencer SDi that is inserted into Pi’s mobile device MDi in advance. Next, an onsite sequencing and data analysis process is run directly on SDi; the DNA sequencing data generated is transmitted to Sj for point-of-care services. This procedure is secured by the group session key distributed by Sj to Pi in the proposed protocol. Since all patients receive an identical key from Sj, Pi is also able to share the data with other patients in the group. Thereafter, analytical results and related medical information based on the received DNA data are encrypted by the key before being sent back to a single patient or to multiple patients of the group. In the proposed architecture, these communications are carried out via the IR signal of the 6G technology. Due to its extremely high data transfer rate, 6G can offer a fully seamless experience for real-time U-healthcare services with large data sets produced by onsite mobile DNA sequencing. Pi can enjoy the services without constraints of time and physical location. As mentioned, a dynamic healthcare solution is also introduced in the system which allows the services to be flexibly allotted by separate time-bounds based on specific requests. Furthermore, the author recommends integrating some related advances, e.g., WBAN, into the system to enhance efficiency of the overall healthcare treatment process.

Figure 2.

Figure 2

Architecture model of the proposed protocol.

Prior to starting using the above services, Pi should register with multiple Sj using three factors, namely, password PWi, sequencing device SDi, and his/her biometrics Bi, establishing a multi-server communication environment. In order to receive the group keys, Pi uses a single set of registered credentials stored in SDi to carry out the SD-SSO that sends a login and authentication request to Sj through a public IoLT network. In such an unreliable channel, there are possible security attacks that may induce serious consequences, e.g., violating patient privacy, destructing system architecture, or reducing reliability and quality of service, etc. Based on the author’s observation, an adversary 𝒜 may have the following capabilities to attack the proposed communication system.

  • 𝒜 has full control over the open IoLT, which enables 𝒜 to intercept, insert, delete, or replay any transcripts conveyed between Pi and Sj.

  • 𝒜 may attempt to attack the past communications between Pi and Sj based on secret parameters or on a group session key 𝒜 somehow retrieves from the current communicated messages.

  • 𝒜 may attempt to extract the secret values or registered credentials stored in a compromised SDi and use them to attack the communication.

  • 𝒜 may be a privileged insider (e.g., member of a maintenance team) who can launch even more serious attacks upon a patient’s registered information obtained from DBj.

  • 𝒜 may also be a corrupted Pi or Sj that can trigger similar attacks on the communication.

4.2. Formal Security Model

Real-or-Random (RoR) is a well-known formal model used for analyzing success probability of an adversary in attacking cryptographic protocols [42]. In the model, suppose there are two main entities including a patient P and a server S who are communicating with each other via a public channel. Ç denotes a protocol challenger while the message communicated by P and S is denoted as m. The following queries should be executed by an adversary 𝒜 to make various attacks.

  • (1)

    Send(Ç, m): This query allows 𝒜 to request a message m to Ç; Ç replies to 𝒜 based upon the procedure of the proposed protocol.

  • (2)

    Execute(P,S): In this query, 𝒜 is allowed to eavesdrop the message m conveyed between P and S.

  • (3)

    Reveal(Ç): This query enables 𝒜 to retrieve a session key computed by Ç in accordance with the procedure of the protocol.

  • (4)

    Corrupt(P,w): In a three-factor authentication protocol, this query returns to 𝒜 password PWi, parameters stored in sequencing device SDi, and biometrics Bi if w=1, w=2, and w=3, respectively.

  • (5)

    Test(Ç): This is a statistical test query. 𝒜 is allowed to directly request Ç for the session key; Ç probabilistically replies to 𝒜 upon the outcome of a tossed coin b.

Definition 6. 

Let AdvÇIoLTHC be the advantage of 𝒜 running in polynomial time in a semantically breaking security system of the proposed protocol. We have AdvÇIoLTHC=2Prb=b1, where IoLTHC stands for IoLT-based healthcare and b is denoted as a guessed bit of the key.

5. The Proposed Protocol

There are five procedures in the proposed protocol, including setup; user registration, login, and authentication; synchronizable key derivation; and password and biometrics change. For facilitating NDA-based U-healthcare processes, Sj is allowed to securely distribute a common key to a group of multiple Pi. The design details are as follows.

5.1. Setup Phase

At first, the system selects an elliptic curve over a finite field Fp Epa,b:y2=x3+ax+b(mod p) with a basic point P(x,y) of the order n of an additive cyclic group, where p is k-bit prime and n is a large number. For a neat design, the coordinates x and y of P(x,y) are always ignored during procedures of the protocol. Sm chooses a secret private key prkj and computes its public key pukj=prkj·P.

5.2. Registration Phase

This phase is carried out via a secure channel. Pi registers with Sj to become a legitimate patient for using U-healthcare services. As depicted in Figure 3, Pi and Sj perform the following steps for this procedure.

Figure 3.

Figure 3

Registration procedure of the proposed protocol.

Step R1: Pi inserts SDi into MDi and selects an identity IDi, a password PWi, and a biometrics value Bi. Pi selects a random number σ, and computes PB=h(IDi|PWi|hbio(Bi)||σ). Next, Pi sends {IDi,PB} to Sj.

Step R2: Receiving the message {IDi,PB}, Sj computes CIDi=hIDiprkj and checks if CIDi exists in DBj, which can trace registered users for achieving patient-centered services in the U-healthcare system. Next, Sj computes Wi=[CIDi+PB]P, stores CIDi in DBj, and sends {Wi,puk} to Pi.

Step R3: Upon the received {Wi,pukj}, Pi computes V=h(IDiPBσ) and εi=σh(IDi|PWi|hbio(Bi)). Finally, Pi stores {Wi,V,εi,pukj} in SDi and the registration is completed. In this way, the service availability is enabled on multiple mobile devices MDi.

Remark 1: 

Each Pi has a unique value of CIDi stored in DBj. Based on CIDi, Sj can easily identify Pi, refer to the past records, and focus on the particular care needs of Pi, enabling patient-centered services.

5.3. Login and Authentication Phase

This procedure is carried out via a public channel. Pi uses their registered credentials to login to Sj. Pi and Sj authenticate with each other and compute a secret shared session key used for group healthcare communications. Suppose there are n patients participating in a group communication, Figure 4 presents the procedure where a session key is established.

Figure 4.

Figure 4

Login and authentication procedure of the proposed protocol.

Step A1: Pi inserts SDi into MDi and enters credentials IDi*,PWi*,Bi*. Pi computes σi=εih(IDi*|PWi*|hbio(Bi*)) and PB*=h(IDi*|PWi*|hbio(Bi*)||σ). The check Vh(IDi*||PB*||σ)) is performed. If the check holds, the SD-SSO is completed and Pi is allowed to select a server Sj in the interface of an app installed in MDi for enjoying a specific service. To this end, Pi chooses a random number as and a timestamp Tp, then computes Ri=ai·P=(xRi,yRi), Mi=ai·pukj=(xMi,yMi), TIDi=WiPB*·P=xTi,yTi, DIDi=IDi*yMi, and Authi=h(xTi||xMi||Tp). Pi conveys message {DIDi,Ri,Authi,Tp} to Sj for the purposed of login.

Step A2: Upon receiving the message {DIDi,Ri,Authi,Tp}, Sj checks the timestamp Tp and computes Mi*=prkj·Ri=(xMi*,yMi*) and IDi*=DIDiyMi*. Sj checks CIDih(IDi*prkj) in its database and checks Authih(xTi*xMi*Tp) for confirming the legitimacy of Pi. Next, Sj determines a time bound (t1,t2), chooses two random numbers bj,cj, and computes a group dynamic key at a time point t by gkt=h(ht1(h(prkj|bj)||hzth(prkj||cj)). Sj computes TB1=ht11(h(prkj||bj)), TB2=hzt2(h(prkj||cj)), Yj=bjh(IDi*|yTi*|Ts), ck=(TB1||TB2||t1||t2), and Hj=h(bj||Ts). The value ck is masked by generating multiple x1x2xn=Hj,11Hj,21Hj,12Hj,22Hj,1nHj,2nHj,n1Hj,n2Hj,nn1h(yTi,1*||Ts)h(yTi,2*||Ts)h(yTi,n*||Ts)ckckck. Sj conveys a message {x1,x2,,xn,Yj,Authj,Ts} to Pi.

Step A3: Upon receiving the above message, Pi checks the timestamp Ts and computes bj=Yjh(IDi*||yTi||Ts, Hj=h(bj||Ts), and ck*=h(yTi||Ts)Hj,11Hj,12Hj,1nx1x2xn. Next, Sj checks Authjh(yTi||IDi||bj||ck*). If the check holds, the value ck*=(TB1||TB2||t1||t2) is successfully verified. Sj computes the dynamic group key at the time point t by gkt=h(htt1(TB1)||ht2tTB2). In this way, all members Pi in a group of n patients have received the same key gkt for U-healthcare communications.

Remark 2: 

The design allows the time bound (t1,t2) to be flexibly changed without having to renew the registration. Pi would be notified of the updated time bound through the app’s notification during the communication session or through some channel (e.g., email) before the communication gets started.

Remark 3: 

Upon specific requests, Pi and Sj are allowed to compute multiple group keys at different time point s t by gkt=h(ht1(h(prkj|bj)||hzth(prkj||cj)) and by gkt=h(htt1(TB1)||ht2tTB2), respectively. The key gkt is used as a symmetric encryption key to protect communications between Sj and multiple Pi, and between Pi and Pi.

5.4. Synchronizable Key-Derivation Phase

In this procedure, Pi and Sj are allowed to quickly compute a new group key to enhance security and to address desynchronization problems in patient–patient communications or in patient–server communications. For example, Sj distributes a key gk8 at 8:00 a.m. to the group; then, Sj uses this key for encrypting the data; if a patient Pi joins the communication at 9:00 a.m. and obtains the key gk9, Pi is not able to decrypt the data encrypted using gk8. It is likely that multiple patients would be in this situation or that some similar situations happen at the same time. This causes a serious communicational desynchronization in the system, since multiple keys would be generated at different time points for a single service. To this end, two values TB1 and TB2 should be renewed in order to reset the communication with a new common key computed without having to repeat the many steps of the previous procedure. Figure 5 describes specific steps performed in this phase.

Figure 5.

Figure 5

Synchronizable key-derivation procedure of the proposed protocol.

Step D1: Sj generates a number d, which can be regarded as the number of key derivations. Upon a time point t*, Sj computes a new group key gkt*d=h(ht*1(h(prkj|bj|d)||hzt*(h(prkj|cj|d))) and two new values TB1d=ht11(h(prkj||bj||d)) and TB2d=hzt2(h(prkj|cj||d). Sj generates a symmetric ciphertext Cd=SEgkt(TB1d||TB2d) using previous key gkt, and conveys {Cd} to Pi.

Step D2: Upon receiving the message, Pi decrypts Cd and obtains TB1d,TB2d. Finally, Pi computes the new group key by gkt*d=h(ht*t1(TB1d)||ht2t*TB2d) at the time point t*. In this way, the key gkt computed in the previous phase (Section 5.3) is changed to the key gkt*d for resolving possible desynchronization issues of similar communications.

Remark 4: 

The time point t and the time point t* may or may not be identical based on the time allocation of specific services.

5.5. Password and Biometrics Change Phase

This procedure allows Pi to change their password and biometrics to enhance security. As shown in Figure 6, Pi and SDi perform the following steps for updating these credentials.

Figure 6.

Figure 6

Password and biometrics change procedure of the proposed protocol.

Step C1: Pi inserts SDi and enters IDi,PWi,Bi. MDi computes σ=εih(IDi|PWi|hbio(Bi)) and PB=h(IDi|PWi|hbio(Bi)||σ). It checks Vh(IDi||PB||σ). If the check holds, Pi is requested to enter new password PWinew and new biometrics Binew.

Step C2: Receiving PWinew,Binew from Pi, SDi chooses a new σnew and computes εinew=σnewh(IDi|PWinew|hbio(Binew)), PBnew=h(IDi|PWinew|hbio(Binew)||σnew), Winew=Wi+PBnewPBP, and Vnew=h(IDi||PBnew||σnew). MDi replaces Wi,V,εi with Winew,Vnew,εinew in SDi.

6. Security Certificate

In this section, the author provides the security certificate of the proposed protocol. An informal discussion, a logical analysis using BAN logic, and a formal mathematical proof using the RoR model are included for security evaluation as follows.

6.1. Sematic Security Discussion

In this subsection, the prevention of various well-known attacks in the protocol is presented in a detailed manner. The author also discusses multiple functionalities and security features achieved by the proposed work.

  • (1)

    Replay attacks: Suppose the message {DIDi,Ri,Authi,Tp} is intercepted by 𝒜 and it is resent to Sm to launch a replay attack in the next session. However, timestamp Tp in the protocol is employed to check if the message is resent. Moreover, when receiving the message {x1,x2,,xn,Yj,Authj,Ts}, 𝒜 will also fail to compromise the key gkt since 𝒜 does not know of IDi,yTi for retrieving the number bj. Therefore, the replay attack is prevented in the proposed protocol.

  • (2)

    MITM attacks: On the received message {DIDi,Ri,Authi,Tp}, 𝒜 may insert forged parameters and generate a candidate login message. 𝒜 aims to act as a middle man to compromise the conveyed messages without being noticed by Pi and Sj. However, without the private key prkj, 𝒜 is not able to compute sufficient parameters for the verifications on CIDi and Authi. Similarly, without yTi and IDi, 𝒜 can also not compute a valid message {x1,x2,,xn,Yj,Authj,Ts} for the check on Authj on the patient side. As a result, the protocol is free from MITM attacks.

  • (3)

    Password and biometrics guessing attacks: At first, 𝒜 may attempt to directly enter a candidate password for logging to the system. However, the login request will be immediately rejected by SCi upon the check Vh(IDi*||PB*||σ). Suppose the hash value PB is somehow known to 𝒜, then 𝒜 attempts to guess PWi based on PB. Other than PWi, the values IDi,PWi,hbioBi,σ are also included in the function generating PB. Therefore, it is extremely hard (with a negligible success probability) for 𝒜 to guess the correct PWi by computing candidate hashes and comparing them with the original PB. Using similar arguments, the biometrics Bi is also completely protected during the communication process. Moreover, my work provides password and biometrics update functions that further assure the security of PWi and Bi. Therefore, a robust three-factor authentication mechanism is achieved in the proposed protocol.

  • (4)

    Impersonation attacks: Suppose the identity IDi is somehow disclosed, then 𝒜 obtains and uses it to generate a fake login message for impersonating Pi. However, it is not possible for 𝒜 to launch this impersonation attack without PWi,Bi since the protocol can resist password and biometrics guessing attacks, as stated above. Moreover, without the knowledge of yTi, 𝒜 can also not retrieve bj for further steps upon the known IDi. Thus, impersonation attacks are resisted in the proposed protocol.

  • (5)

    Lost/stolen sequencer attacks: Suppose 𝒜 has somehow stolen the sequencer SDi; then, 𝒜 retrieved all stored parameters. However, the important credentials IDi,PWi,Bi are not stored in SDi directly. Obtaining the parameters Wi,V,εi,pukj inside SDi is not sufficient for passing the verification Vh(IDi*||PB*||σ) and for generating a valid login request message {DIDi,Ri,Authi,Tp}. Thus, my protocol is robust against lost/stolen sequencer attacks.

  • (6)

    Desynchronization attacks: Two acknowledgement values Authi and Authj generated by Pi and Sj, respectively, are used for assuring a robust mutual authentication in the proposed protocol. Authi and Authj are deleted after the login and authentication procedure session is completed. In addition, after each synchronizable key-derivation procedure finishes, Pi and Sj do not update or store any redundant parameters used for the next communication sessions. Hence, desynchronization problems and related attacks are prevented in my work.

  • (7)

    Privileged insider attacks: Suppose there is a privileged insider 𝒜 who can monitor data transmission during the registration and capture message {IDi,PB}. Upon the reception of IDi, it is not possible for 𝒜 to compromise the communication due to the stated resistance to impersonation attacks. Using the value PB, 𝒜 is also not able to compute a correct TIDi for the attack on Authi without Wi stored in the smart card. In another scenario, even if 𝒜 somehow obtains CIDi in the database, 𝒜 still cannot pass the server verification without IDi. Thus, the protocol can resist privileged insider attacks.

  • (8)

    DoS attacks: For analysis of DoS attacks, the author discusses some possible threats that may affect communication performance of the protocol. In the login phase, the system verifies Pi by Vh(IDi*||PB*||σ) upon the newly input credentials IDi*,PWi*,Bi*. If the check is not successful, the session will be immediately terminated. Hence, it is not possible for 𝒜 is not able to flood the login and authentication procedure using multiple subsequent steps. On the other hand, upon the received message from Pi, Sj only operates two minor computations Mi*=prkj·Ri and IDi*=DIDiyMi* before the check CIDih(IDi*prkj) is made. Retransmitting massive messages {DIDi,Ri,Authi,Tp} to Sj for disrupting its services would not be an efficient attack due to the redundant resources of Sj. Moreover, the communication will also be terminated once the check (Tp,Tc) does not hold in the beginning. Therefore, DoS attacks are prevented in the protocol.

  • (9)

    Robust mutual authentication: In the proposed communication, Pi should be authenticated as a legitimate patient for preventing patients’ identities and possibly costly services from being compromised. Upon receiving the login request {DIDi,Ri,Authi,Tp} from Pi, using the private key, Sj computes Mi* and retrieves IDi*,CIDi,DIDi. These parameters are used for the verification Authih(xTi*xMi*Tp) that confirms the legitimacy of the patient Pi. On the other hand, based on the message {x1,x2,,xn,Yj,Authj,Ts}, Pi retrieves the number bj to compute Hj,ck*. These parameters are used for the check Authjh(yTi||IDi||bj||ck*) of the acknowledgement that confirms legitimacy of the server Sj and assures true service provision. If one of the above checks fails, the session will be terminated and the session key will not be established successfully. Hence, a robust mutual authentication is achieved in the proposed protocol.

  • (10)

    Patient anonymity and untraceability: The identity IDi is hidden in the parameter DIDi of the login message {DIDi,Ri,Authi,Tp} requested by Pi. Also, the message {x1,x2,,xn,Yj,Authj,Ts} sent by Sj does not reveal IDi to the public. Therefore, the anonymity of IDi is guaranteed during the login and authentication process. The parameters contained in {DIDi,Ri,Authi,Tp} and {x1,x2,,xn,Yj,Authj,Ts} in respective communication sessions are totally not identical since different random numbers and timestamps are used for the computations. Therefore, 𝒜 is not able to identify any two login messages sent by the same patient Pi. Hence, the proposed protocol achieves patient anonymity and patient untraceability.

  • (11)

    Message unlinkability: When linking the parameters of all messages {DIDi,Ri,Authi,Tp,x1,x2,,xn,Yj,Authj,Ts} to each other, there are not any fixed values found. It means that it will not allow 𝒜 to trace Pi for the purpose of guessing Pi’s identity. Thus, a message unlinkability feature is achieved in the proposed protocol.

  • (12)

    Perfect forward secrecy: Suppose some sensitive data, secret parameters, or even a session key established in the current session are somehow revealed to 𝒜. Upon receiving these vales, 𝒜 attempts to attack the past communications. However, it is not possible for 𝒜 to launch the attack since the values are completely not identical in different communication sessions due to the inclusion of random numbers and timestamp values in the computations. For instance, 𝒜 cannot use the currency key gktcurrent=h(htt1(TB1)||ht2tTB2) to compromise the message encrypted using a key gktpast established in the past session. If the long-term private key prkj of Sj is compromised, the secrecy of gktpast is also not affected, because there are no associated parameters between them. Hence, a perfect forward secrecy is achieved in my protocol.

  • (13)

    Perfect backward secrecy (known-key security): With similar arguments, the protocol is proven not to be vulnerable to a known-key attack, since compromise of the past key gktpast does not allow either a passive 𝒜 to compromise the future key gktfuture or impersonation by an active 𝒜 in the future.

6.2. Logical Analysis Using BAN logic

In this subsection, the well-known BAN logic [43] is employed to further provide a logical analysis on the mutual authentication between Pi and Sj. Some rules and analytical logics in the tool are defined in advance. Next, the analysis demonstrates that Pi and Sj believe the key gkt is a secret value shared between them only. Some notations used for the analysis are provided in Table 2.

Table 2.

Notations used in the analysis with BAN logic.

Notations Used in the BAN Explanation
X |≡ M X believes a statement M
XM X sees the statement M
X |~ M X once said the statement M
XM X has jurisdiction over the statement M
(M, N) M or N is one part of the formula (M, N)
MN The statement M is combined with the formula N
#(M) The formula M is fresh, meaning it has not been sent in any previous messages
XKY Formula K is a secret known only by X and Y; only X and Y can use M to authenticate each other
XGY Value G is known only to X and Y; it is used for their communication

In accordance with the principle of BAN logic and operation rules in my proposed protocol, the mutual authentication proof should satisfy the following four goals. In the protocol, the value ck is utilized by Sj to distribute TB1 and TB2 to Pi for computing the group key gkt. Therefore, authenticity of both ck and gkt should be proven, which can guarantee a completely authenticated key shared between the entities.

Goal 1: Sj |≡ (PigktSj). Sj believes that the key gkt computed is a secret value shared between Pi and Sj. (G1)

Goal 2: Sj |≡ (PickSj). Sj believes that the key ck computed is a secret value shared between Pi and Sj. (G2)

Goal 3: Pi |≡ (PickSj). Pi believes that the key ck computed is a secret value shared between Pi and Sj. (G3)

Goal 4: Pi |≡ (PigktSj). Pi believes that the key gkt computed is a secret value shared between Pi and Sj. (G4)

Two messages communicated in the login and authentication procedure of the protocol are included in the authentication proof.

Message 1: PiSj:(IDi*yMi,xRi,yRi,h(xTi||xMi||Tp),Tp)

Message 2: SjPi:(x1,x2,,xn,bjh(IDi*|yTi*|Ts),h(yTi*||IDi||bj|ck,Ts)

Some logical rules of the tool used in the proof are provided as follows.

  • Seeing rule (R1): XKY,YAKXY~A;

  • Interpretation rule (R2): XY~(A,B)XY~A;

  • Freshness rule (R3): X|#(A)X|#(A,B);

  • Verification rule (R4): X|#A,X|Y|~AX|Y|A;

  • Jurisdiction rule (R5): X|YA,X|Y|AX|A;

  • Belief rule (R6): X|(A,B)X|A.

Along with the rules, the following assumptions are also used in the analysis.

  • Assumption 1 (A1): Sj |≡ PiKijSj;

  • Assumption 2 (A2): Sj |≡ #(Tp);

  • Assumption 3 (A3): Sj|Pi(xTi,xMi,Tp);

  • Assumption 4 (A4): Sj(t1);

  • Assumption 5 (A5): Sj(t2);

  • Assumption 6 (A6): Sj(bj);

  • Assumption 7 (A7): Sj(cj);

  • Assumption 8 (A8): Sj(prkj);

  • Assumption 9 (A9): Pi |≡ #(Ts);

  • Assumption 10 (A10): Pi|Sj(x1,x2,,xn,bj,yTi,Ts);

  • Assumption 11 (A11): Pi(IDi).

In this way, an idealized form of the communicated messages is described as follows.

Message 1: PiSj:(IDi,yMiKij,xRi,yRi,xTi,xMi,TpKij,Tp)

Message 2: SjPi:([x1,x2,,xn],bj,IDi,yTi,TsKij,yTi,IDi,bj,ckKij,Ts)

Based on the specified rules, assumptions, and procedure of the protocol, the logical analysis of mutual authentication between Pi and Sj in the proposed protocol is described by the following steps.

  • Step1: Based on the Message 1, we have Sj(IDi,yMiKij,xRi,yRi,xTi,xMi,TpKij,Tp).

  • Step2: Using A1 and R1, we have Sj |≡ Pi |~ (IDi,yMi,xRi,yRi,xTi,xMi,Tp).

  • Step3: According to R2, we obtain Sj |≡ Pi |~ (xTi,xMi,Tp).

  • Step4: Using R3 and A2, we have Sj |≡ #(xTi,xMi,Tp).

  • Step5: Based on R4, Step3, and Step4, we obtain Sj |≡ Pi |≡ (xTi,xMi,Tp).

  • Step6: According to R5, A3, and Step5, we obtain Sj |≡ (xTi,xMi,Tp).

  • Step7: Based on R6 and Step6, we obtain Sj |≡ xTi, Sj |≡ xMi, and Sj |≡ Tp.

  • Step8: Due to Step7, and Authi=h(xTi||xMi||Tp), we obtain Sm |≡ Authi.

  • Step9: Based on Step8, A4, A5, A6, A7, A8, and gkt=h(ht1(h(prkj|bj)||hzth(prkj||cj)), we can obtain Sj |≡ (PigktSj) (G1 achieved).

  • Step10: Based on Step8, A4, A5, A6, A7, A8, and ck=(ht11(h(prkj||bj))||hzt2(h(prkj||cj))||t1||t2), we can obtain Sj |≡ (PickSj) (G2 achieved).

  • Step11: According to the Message 2, we have Pi([x1,x2,,xn],bj,IDi,yTi,TsKij,yTi,IDi,bj,ckKij,Ts)

  • Step12: In accordance with R1 and A1, we obtain Pi |≡ Sm |~ (x1,x2,,xn,bj,IDi,yTi,ck,Ts).

  • Step13: Based upon R2, we can obtain Pi|Sm|~(x1,x2,,xn,bj,yTi,Ts).

  • Step14: Using R3 and A9, we have Pi|#(x1,x2,,xn,bj,yTi,Ts).

  • Step15: Based on R4, Step13 and Step14, we obtain Pi |≡ Sj |≡ (x1,x2,,xn,bj,yTi,Ts).

  • Step16: According to R5, A10, and Step15, we obtain Pi |≡ (x1,x2,,xn,bj,yTi,Ts).

  • Step17: Based on R6 and Step16, we obtain Pi |≡ x1,x2,,xn, Pi |≡ bj, Pi |≡ yTi, and Pi |≡ Ts.

  • Step18: In accordance with Step17, while Hj=h(bj||Ts) and ck=h(yTi||Ts)Hj,11Hj,12Hj,1nx1x2xn, we can obtain Pi |≡ (PickSj) (G3 achieved).

  • Step19: Due to Step17, Step18, A11, and Authj=h(yTi||IDi||bj|ck, we obtain Pi |≡ Authj.

  • Step20: Based on Step18, Step19, ck=(TB1||TB2||t1||t2), and gkt=h(htt1(TB1)||ht2tTB2), we obtain Pi |≡ (PigktSj) (G4 achieved).

In this way, the proposed protocol achieves all goals—G1, G2, G3, and G4. Therefore, it proves that Pi and Sj can mutually authenticate each other and gkt is an authenticated key shared between them.

6.3. Formal Security Proof with RoR Model

Formal security proof of the proposed protocol is provided using the widely-accepted ROR model. Based on mathematical principles, its idea is to analyze the success probability of 𝒜 in attacking the protocol. The goal is to demonstrate that this probability is a negligible advantage, assuring the sematic security of the approach. Various games are included in the analysis where 𝒜 makes multiple attack queries discussed in Section 4.2 with an increased success probability. Notations used in the proof are described in Table 3.

Table 3.

Notations used in the security proof with RoR Model.

Notations Explanation
lh Size of a hash value
lr Size of a random number
lbio Size of a biometric value
qh Total hash oracle queries
qs Total Send queries
qe Total Execute queries
Lh List of hash oracle outputs
Lr List of random oracle results
Lt List of transcripts conveyed between Pi and Sj
εbio Biometric false-positive probability
C,s Zipf parameters

Definition 7. 

When Ç receives the last communicated message in the protocol, Ç goes to an Accept state. All messages m1={DIDi,Ri,Authi,Tp} and m2={x1,x2,,xn,Yj,Authj,Ts} are orderly concatenated, forming a session with an identification “s_id”.

Definition 8. 

PiTc and SjTc* are defined to be partnered if PiTc and SjTc* simultaneously meet the following conditions: (1) PiTc and SjTc* are in an Accept state; (2) PiTc and SjTc* mutually authenticate each other in the same session s_id; and (3) PiTc and SjTc* are mutually a partner of each other. PiTc and SjTc* are called “partners”.

Definition 9. 

Ç is defined to be fresh if Ç simultaneously meets the following conditions: (1) Ç is in an accepted state; (2) Reveal(Ç) queries have never been submitted; and (3) less than three Corrupt (Pi,n) queries have been submitted. This is called the “freshness” rule.

Definition 10. 

Adv𝒜ECDLP(t𝒜) is denoted as the advantage of 𝒜 in breaking the ECDLP assumption within an execution time t𝒜. Because the assumption holds, Adv𝒜ECDLP(t𝒜) is a negligible probability.

Definition 11. 

Adv𝒜ECCDHP(t𝒜) is denoted as the advantage of 𝒜 in breaking the ECCDHP assumption within an execution time t𝒜. Also, Adv𝒜ECCDHP(t𝒜) is a negligible probability since the assumption holds.

Definition 12. 

Adv𝒜ECFP(t𝒜) is denoted as the advantage of 𝒜 in breaking the ECFP assumption within an execution time t𝒜. Similarly, Adv𝒜ECFP(t𝒜) is a negligible probability as the assumption holds.

Theorem 1. 

AdvÇIoLTHC can be calculated in the following equation.

AdvÇIoLTHC(qs+qe)3+6qs2Lr+qh2+20qh2Lh+2maxC·qss,qs12lbio,εbio+4qhqs+qe+1Adv𝒜ECDLPt𝒜+2qh(qs+qe+1)Adv𝒜ECCDHP(t𝒜)+2qh(qs+qe+1)Adv𝒜ECFP(t𝒜) (1)

Since Equation (1) is obviously a negligible probability, the proposed protocol is semantically secure.

Proof. 

The author considers six games simulated for the proof including G0,G1,G2,G3,G4,G5 with increasing success probabilities of 𝒜 in attacking the protocol. The ultimate goal of 𝒜 is to retrieve the bit b using the Test query after each of the games finishes. Pr[Si] is denoted as success probabilities, in which Ef (f=0,1,2,3,4,5) are events in respective games. I set a simulator Ş to play the role of the challenge Ç in the games. □

Game G0: This is the starting game, which is identical to the real protocol in the RoR model. Ş tosses the coin b and the game is started. We obtain

AdvÇIoLTHC=2PrE01 (2)

Game G1: This game executes all queries that are specified in the model. The queries are simulated in Table 4 in accordance with rules of my proposed protocol. In this way, G1 creates three lists, namely, Lh, Lr, and Lt. Since G0 and G1 are indistinguishable, we have

PrE1=PrE0 (3)

Table 4.

All queries executed in the RoR model.

Hash query is executed as follows, where mi are messages.
If the record (mi, h(mi)) is found in the list Lh, return h(mi);
if not, choose hmiZp* and write (mi, hmi) to Lh;
the list Lr is created by a similar procedure.
Reveal(Ç) query is executed by a simple procedure as follows.
Once Ç is in an Accept state, a session key formed by Ç is returned.
Test(Ç) query is executed as follows.
Ç tosses the coin b. If b=1, the query returns an available key gkt; otherwise, it returns a random number.
Corrupt(Pi,w) query is executed as follows.
If w=1, the query outputs password PWi.
If w=2, the query outputs parameters stored in SDi.
If w=3, the query outputs biometrics Bi.
Execute(Pi, Sj) query is executed in succession with execution of Send(Ç, mi) query. It is presented as follows.
Pi sends m1 to Sj and Sj sends m2 to Pi. we have <IDi*yMi,ai·P,hxTixMiTp,Tp>Send(Pi, start), <x1,x2,,xn,bjh(IDi*|yTi*|Ts),h(yTi*||IDi||bj|ck,Ts>Send(Sj, <IDi*yMi,ai·P,hxTixMiTp,Tp>)
At last, m1=<IDi*yMi,ai·P,hxTixMiTp,Tp> and m2=<x1,x2,,xn,bjh(IDi*|yTi*|Ts),h(yTi*||IDi||bj|ck,Ts> are returned.
Based on the logical procedure of the protocol, the Send query is simulated as follows.
  • 𝒜 runs Send(Pi, start) query and Ç replies to 𝒜 as follows. Ç computes Mi=ai·puk=(xMi,yMi), Ri=ai·P, ci,m22=yi,m2*ri,m1mod p, TIDi=WiPB*·P=xTi,yTi, and Authi=h(xTi||xMi||Tp) and outputs m1=<IDi*yMi,Ri,hxTixMiTp,Tp>.

  • 𝒜 runs Send(Sj, <IDi*yMi,Ri,hxTixMiTp,Tp>) query and Ç replies to 𝒜 as follows. Ç checks Tp; computes Mi*=prk·Ri=(xMi*,yMi*) and IDi*=DIDiyMi*; checks CIDi; computes TIDi* and Authi; computes TB1=ht11(h(prk||bj)), TB2=hzt2(h(prk||cj)), Yj=bjh(IDi*|yTi*|Ts), ck=(TB1||TB2||t1||t2), Authj=h(yTi*||IDi||bj|ck, and Hj=h(bj|Ts; and generates x1,x2,,xn from Hj,yTi,ck. Ç terminates the session if one of the above checks does not hold. Otherwise, Ç outputs m2=<x1,x2,,xn,bjh(IDi*|yTi*|Ts),h(yTi*||IDi||bj|ck,Ts>. The session key Sj obtains is gkt=h(ht1(h(prk|bj)||hzth(prk||cj)).

  • 𝒜 runs Send(Pi, <x1,x2,,xn,bjh(IDi*|yTi*|Ts),h(yTi*||IDi||bj|ck,Ts>) query and Ç replies to 𝒜 as follows. Ç checks Ts; computes bj,Hj,ck* based on some related parameters; and checks Authj. If one of the checks does not hold, Ç terminates the session; otherwise, a session key gkt=h(htt1(TB1)||ht2tTB2) is established, and the session is completed.

Game G2: In this game, the author considers collision probabilities of hash oracle queries and random oracle queries for all transcripts conveyed between Pi and Sj. Based on a property of the birthday paradox, the probability of the hash queries is at most qh22Lh+1. During login and authentication procedures of the protocol, Pi and Sj generate three random numbers {ai,bj,cj} for constructing two messages {DIDi,Ri,Authi,Tp} and {x1,x2,,xn,Yj,Authj,Ts}. Its total collision probability is (qs+qe)32Lr+1. Due to the indistinguishability between G1 and G2, the following equation is obtained:

|PrE2PrE1|(qs+qe)32Lr+1+qh22Lh+1 (4)

Game G3: G3 is similar to G2, but Send(Ç, m) queries are made for each communicated message. This game consists of two cases consistent with two messages sent by Pi and Sj.

+ Case 1: Query Send(Sj,m1) is simulated in this case. Messages m1 is computed from three values IDi*yMi,ai·P,h(xTi||xMi||Tp)Lh. To lauch the attack, the hash value PB should also be revealed to 𝒜. It results in a total probability of 4qh2Lh in total. Meanwhile, the random number ai included in m1 has a probability at most of qs2Lr.

+ Case 2: Query Send(Pi,m2) is executed in this case. To launch the attack, the values bjh(IDi*|yTi*|Ts), h(yTi*||IDi||bj|ck, Hj=h(bj||Ts), h(yTi||Ts), ht11(h(prk||bj)), and hzt2(h(prk||cj)) containing messages m2 should be known to 𝒜. Therefore, its maximum probability is up to 6qh2Lh. Random numbers bj,cj have a probability of, at most, 2qs2Lr.

Since G2 and G3 are identical when these attacks are absent, we obtain

|PrE3PrE2|10qh2Lh+3qs2Lr (5)

Game G4: Guessing attacks executed by 𝒜 are simulated in this game. The author includes five attack cases, which are described as follows.

+ Case 1: 𝒜 runs query Corrupt(Pi,w=1) to guess PWi of Pi. Next, 𝒜 makes query Send(Sj,m1) for the attacks. The probability in this case is at most (C·qss).

+ Case 2: 𝒜 runs the query Corrupt(Pi,w=3) to retrieve Bi of Pi. 𝒜 also executes query Send(Sj,m1) to launch the attack; therefore, the collision probability is up to max{qs(12lbio,εbio)}.

+ Case 3: Suppose 𝒜 employs power analysis to successfully retrieve parameters stored in SCi. Upon Hash oracle queries, 𝒜 aims to break the ECDLP to compromise the values CIDi,PB,ai (based on the points Wi,Ri, respectively) in order to impersonate Pi. The probability in this case is at most 2qhAdv𝒜ECDLP(t𝒜).

+ Case 4: To trigger MITM attacks or impersonation attacks, 𝒜 runs Hash oracle queries that break the ECCDHP assumption to compromise the point Mi=ai·prk·P given the points Ri=ai·P and puk=prk·P. Its maximum collision probability is up to qhAdv𝒜ECCDHP(t𝒜).

+ Case 5: To trigger similar attacks, 𝒜 runs Hash oracle queries to break the ECFP to compromise two points TIDi=CIDi·P and PB·P given the point Wi=[CIDi+PB]P (retrieved from SCi using power analysis). In this case, the collision probability is at most qhAdv𝒜ECFP(t𝒜).

Because G3 and G4 are indistinguishable, we have

PrE4PrE3maxC·qss,qs12lbio,εbio+2qhAdv𝒜ECDLP(t𝒜)+qhAdv𝒜ECCDHP(t𝒜)+qhAdv𝒜ECFP(t𝒜) (6)

Game G5: The author simulates attack scenarios on the forward secrecy property in this last game. Based on the current transcripts, Execute, Send, and Hash oracle queries are executed to retrieve group session keys generated by the old transcripts. The ECDLP assumption, ECCDHP assumption, and ECFP assumption are included in the simulation. To this end, the Test query is made to return the session key to 𝒜. To launch the attacks, 𝒜 has to at least break the ECDLP two times in a row, to break the ECCDHP one time, or to break the ECFP one time; therefore, the following equation is obtained:

|PrE5PrE4|2qh(qs+qe)Adv𝒜ECDLP(t𝒜)+qh(qs+qe)Adv𝒜ECCDHP(t𝒜)+qh(qs+qe)Adv𝒜ECFP(t𝒜) (7)

After all games are made, the bit b is guessed upon the probability of the Test query below:

PrE5=12 (8)

Applying property of the triangular inequality and results of Equations (3)–(8), we have

|PrE012|=|PrE1PrE5|PrE1PrE2+PrE2PrE3+PrE3PrE4+PrE4PrE5 (9)

Applying Equations (2)–(9), the following result is achieved:

12AdvÇIoLTHC=|PrE012|(qs+qe)32Lr+1+qh22Lh+1+10qh2Lh+3qs2Lr+maxC·qss,qs12lbio,εbio+2qhqs+qe+1Adv𝒜ECDLPt𝒜+qh(qs+qe+1)Adv𝒜ECCDHP(t𝒜)+qh(qs+qe+1)Adv𝒜ECFP(t𝒜) (10)

Multiplying two sides of Equation (10) with a factor of 2, we can easily obtain the following final result:

AdvÇIoLTHC(qs+qe)3+6qs2Lr+qh2+20qh2Lh+2maxC·qss,qs12lbio,εbio+4qhqs+qe+1Adv𝒜ECDLPt𝒜+2qh(qs+qe+1)Adv𝒜ECCDHP(t𝒜)+2qh(qs+qe+1)Adv𝒜ECFP(t𝒜) (11)

As can be seen, Equation (1) and Equation (11) are consistent. Hence, Theorem 1 is claimed and the proposed protocol is proven to be secure, as AdvÇIoLTHC is a completely negligible advantage.

7. Performance Evaluation and Comparison

This section provides a detailed performance evaluation and presents a comparative study on multiple aspects of the protocols, including security properties and functionalities, computation overhead, and communication overhead.

7.1. Security Properties and Functionalities

The author provides the results of a comparison of security properties and functionalities of different works discussed in Section 2.2, which are tabulated in Table 5. As can be seen, the proposed protocol provides more functionality and achieves more security properties compared to the others. Especially notable is that only the proposed work introduces a 6G-aided group-based dynamic U-healthcare application. In addition, this work is the first to employ a sequencer to directly store user’s registered credentials as well as use it as a separate factor for the authentication in a key agreement protocol.

Table 5.

Security properties and functionalities of different protocols.

Attributes [21] [23] [25] [26] [27] [28] [29] [30] [31] [36] [37] Mine
Resists replay attacks O O O O O O O O O O O O
Resists MITM attacks O O O O O O O O O O O O
Resists online password guessing attacks O O O O O O O O O O O
Resists offline password guessing attacks O O O O O O O O O O O
Resists impersonation attacks O O O O O O O O O O O O
Resists lost sequencer or smart card attacks O O O O X X O O O
Resists desynchronization attacks O O O O O O O X O X O O
Resists privileged insider attacks O O O O O O O O O O O O
Resists DoS attacks O O O O O O O O O O O O
Provides mutual authentication O O O O O O O O O O O O
Provides user anonymity O O O O O O O X X O O O
Provides user untraceability O O O O O X O O O X O O
Provides message unlinkability O O O O O X O O O X O O
Provides perfect forward secrecy O O O O O O O O O O O O
Provides perfect backward secrecy O O O O O O O O O O O O
Provides password update O O X O O O X X O O O
Provides biometrics update O X X O O
Provides three-factor authentication X X X X X X O O O X O O
Provides SD-SSO X X X X X X X X X X X O
Provides mathematics-based security proof X X O O O X O X O X O O
Provides group-based dynamic services X X X X X X X X X X X O
Provides LOC-based U-healthcare application X X X X X X X X X X O O
Supports patient-centric service O X O X O O X O O O X O

“O”: the protocol achieves a specific attribute; “X”: the protocol does not achieve a specific attribute; “–”: A specific attribute is not available in the protocol.

7.2. Computation Overhead

Six of the eleven existing works above, which are the most relevant to the proposed approach, are included for evaluating the computation overhead and communication overhead. To estimate the overhead, the author calculates the running time of all cryptographic operations in the login and authentication phase of each protocol. Since XOR operations are so fast, its running time is assumed to be negligible. For simplicity, the computing times of a traditional one-way hash function and a biohash function are also considered to be similar, as the difference between them is too small [29,32]. The running time of each cryptographic operation used in the evaluation is tabulated in Table 6. The comparative results of the computation overhead evaluation are described in Table 7 and Figure 7. Giving the support of far fewer functional properties (specified in Table 5), the protocols of Yu et al. [29], Wong et al. [30], Le and Hsu [31], and Meshram et al. [36] incur less computing cost compared to that in the initial authentication procedure of the proposed work. However, overhead consumed in the fast key derivation of the proposed work is less than that of all other protocols, which makes it become the most efficient procedure.

Table 6.

Time estimation of each cryptographic operation [44,45].

Notation Operation Computation Time (ms)
TH Hash function ≈0.00069
TPA EC point addition ≈0.0069
TPM EC point multiplication ≈0.508
TSED Symmetric encryption or decryption ≈0.00054
TM Modular squaring ≈0.00069
TQR Square root module 𝑁 ≈1.169
TCM Chebyshev chaotic polynomial mapping ≈0.02881

Table 7.

Comparison of computation overhead.

Protocols Pi Sj Total Computation Time (ms)
Computation Complexities Computation Time (ms) Computation Complexities Computation Time (ms)
Thakare and Kim [28] 2TH+TPA + 4TPM ≈2.04028 6TH + 2TPA + 5TPM ≈2.55794 ≈4.59822
Yu et al. [29] 10TH + 2TCM ≈0.06452 8TH + 2TCM ≈0.06314 ≈0.12766
Wong et al. [30] 7TH +TSED +TM ≈0.04953 7TH +2TSED +TQR ≈1.17491 ≈1.22444
Le and Hsu [31] 9TH +TSED + TM ≈0.00744 5TH+2TSED + TQR ≈1.17353 ≈1.18097
Meshram et al. [36] 11TH + 2TCM ≈0.06521 9TH + 2TCM ≈0.06383 ≈0.12904
Le [37] 4TH+TSED + 4TPM ≈2.03530 2TH+TSED + 3TPM ≈1.52592 ≈3.56122
Mine Initial authentication 13TH+TPA + 3TPM ≈1.53987 16TH + 2TPM ≈1.02704 ≈2.56691
Fast key derivation 3TH +TSED ≈0.00261 9TH +TSED ≈0.00675 ≈0.00936

Figure 7.

Figure 7

Graphical description of the comparison of computation overhead [28,29,30,31,36,37].

Apart from that, the author considers a scenario in which multiple Sj provide services to a single Pi. Here, the SD-SSO function is helpful since it allows Pi to enjoy multiple services using a single set of credentials for the login. The SD-SSO also save a little bit of computing cost as its operations, including σ=εih(IDi*|PWi*|hbio(Bi*)), PB*=h(IDi*|PWi*|hbio(Bi*)||σ) and VhIDi*PB*σ, only need to be executed once before the communications with multiple Sj. According to the result depicted in Figure 8, when the number of servers Sj increases, both procedures of the proposed protocol (especially the fast key derivation) incur less and less overhead compared with that of the others. Furthermore, due to the group key, Sj in the proposed architecture only needs to encrypt health data once before sending it to all Pi while Sj in the other works (except Le and Hsu [31]) must encrypt the same data multiple times, which results in redundant computation costs. Moreover, the patients in those works are not able to directly communicate with each other without a common key. As a matter of fact, the proposed group communication solution in this work is the best fit for group-based U-healthcare services.

Figure 8.

Figure 8

Computational comparison when the number of servers gradually increases [28,29,30,31,36,37].

7.3. Communication Overhead

In this evaluation, communication overhead includes the number of communication rounds and total length of all transmitted transcripts. Some parameters used for evaluating the overhead are provided in Table 8. In the initial authentication procedure of the proposed protocol, the transcripts of two communication rounds include {DIDi,Ri,Authi,Tp} and {x1,x2,,xn,Yj,Authj,Ts}. For a fair comparison, {x1,x2,,xn,Yj,Authj,Ts} should contain parameters of a single patient, which only results in a single value x in the transcript. {DIDi,Ri,Authi,Tp} and {x,Yj,Authj,Ts} consume a length of (160 bits + 320 bits + 160 bits + 32 bits) and (384 bits + 160 bits + 160 bits + 32 bits), respectively; the total length is (672 bits + 736 bits) = 1408 bits. Similarly, overhead values of all protocols are calculated and provided in Table 9. Figure 9 further provides a graphical description of the comparison. We can observe that the proposed protocol incurs less overhead than the works of Thakare and Kim [28], Le and Hsu [31], and Meshram et al. [36]. Due to providing the support of more functionality, the author’s work consumes more costs compared to that of Yu et al. [29], Wong et al. [30], and Le [37]. Furthermore, when the proposed work executes the fast key-derivation process, its communication only incurs 256 bits (the length of Cd) and only one communication round. As a result, it is the most efficient out of all the protocols.

Table 8.

Single length of multiple parameters [44,45].

Parameters Length (Bits)
Asymmetric encryption or decryption (e.g., Rabin system) 1024
Chebyshev polynomial 1024
Symmetric encryption or decryption 256
Identity 128
Password 128
Biometrics 128
Random number 160
Hash value 160
EC point multiplication 320
Timestamp 32

Table 9.

Comparison of communication overhead.

Protocols No. of Communication Rounds Length of Total Transcripts (Bits)
Thakare and Kim [28] 3 1440
Yu et al. [29] 3 1120
Wong et al. [30] 2 1344
Le and Hsu [31] 2 1440
Meshram et al. [36] 2 3072
Le [37] 2 1088
Mine Initial authentication 2 1408
Fast key derivation 1 256

Figure 9.

Figure 9

Graphical description of the comparison of communication overhead [28,29,30,31,36,37].

8. Conclusions

In this article, the author has proposed a group-based patient-authenticated key distribution protocol for 6G-aided dynamic U-healthcare services enabled by real-time mobile DNA sequencing. Seamless communications are provided by 6G technology regardless of patients’ geographical locations. Sharing mobile DNA data for rapid analysis is a good solution for facilitating drug and vaccine development, which is one of the important concerns in the public health sector. Group service helps in improving medical treatments efficiently and promoting the use of smart health with more people participating. Patients in a healthcare group are allowed to securely connect with the service provider or with each other using a common group key generated from the protocol for the specific purposes of dynamic services. The group key generation process is protected by a three-factor authentication mechanism along with an efficient SD-SSO solution. Since all registered credentials are stored on a separate sequencer, the proposed work can enable service availability on multiple mobile devices. It is also able to facilitate a truly patient-centered service upon storing traceable information in the server database. Security analysis of the proposed protocol is presented using well-known verification tools, namely, the RoR model and BAN logic. A semantic discussion is also provided to further indicate its resistance to multiple security attacks. A detailed performance analysis of computation and communication overhead shows that the proposed approach consumes a rational cost compared to predecessor works.

In future works, performance of the initial authentication procedure can be further improved by including more lightweight cryptographic operations in the protocol. Another patient authentication scheme with a new architecture model where multiple external doctors serving as data users join the healthcare processes will be considered. The author will also consider a new design of attribute-based access control for securing cloud-based U-healthcare services in IoLT networks.

Acknowledgments

The author would like to thank National Science and Technology Council (Taiwan) and Fu Jen Catholic University (Taiwan), for sponsoring this research. The author would also like to thank anonymous referees for their constructive comments, and thank editors for kindly coordinating the review process.

Data Availability Statement

Not available.

Conflicts of Interest

The author declares no conflict of interest.

Funding Statement

This research was funded by National Science and Technology Council (Taiwan), grant number NSTC-112-2222-E-030-001; and by Fu Jen Catholic University (Taiwan), grant number A0211018-1.

Footnotes

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

References

  • 1.Milicchio F., Oliva M., Boucher C., Prosperi M. Third-generation sequencing data analytics on mobile devices: Cache oblivious and out-of-core approaches as a proof-of-concept. Procedia Comput. Sci. 2018;134:219–226. doi: 10.1016/j.procs.2018.07.164. [DOI] [Google Scholar]
  • 2.Hassan S., Bahar R., Johan M.F., Mohamed Hashim E.K., Abdullah W.Z., Esa E., Abdul Hamid F.S., Zulkafli Z. Next-Generation Sequencing (NGS) and Third-Generation Sequencing (TGS) for the Diagnosis of Thalassemia. Diagnostics. 2023;13:373. doi: 10.3390/diagnostics13030373. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 3.Raza K., Qazi S. Chapter 5—Nanopore sequencing technology and Internet of living things: A big hope for U-healthcare. In: Dey N., Chaki J., Kumar R., editors. Sensors for Health Monitoring. Volume 5. Academic Press; Cambridge, MA, USA: 2019. pp. 95–116. [Google Scholar]
  • 4.Pizzolante R., Castiglione A., Carpentieri B., De Santis A., Palmieri F., Castiglione A. On the protection of consumer genomic data in the Internet of Living Things. Comput. Secur. 2018;74:384–400. doi: 10.1016/j.cose.2017.06.003. [DOI] [Google Scholar]
  • 5.Bolognini D., Bartalucci N., Mingrino A., Vannucchi A.M., Magi A. NanoR: A user-friendly R package to analyze and compare nanopore sequencing data. PLoS ONE. 2019;14:e0216471. doi: 10.1371/journal.pone.0216471. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 6.Lacerda J.M.T., Valentim R.A.M., Araújo B.G.d., Morais P.S.G., Dantas M.C.M. Service-oriented biomedical devices; Proceedings of the 2014 IEEE Healthcare Innovation Conference (HIC); Seattle, WA, USA. 8–10 October 2014; pp. 203–206. [Google Scholar]
  • 7.García-Hernández L.A., Martínez-Martínez E., Pazos-Solís D., Aguado-Preciado J., Dutt A., Chávez-Ramírez A.U., Korgel B., Sharma A., Oza G. Optical Detection of Cancer Cells Using Lab-on-a-Chip. Biosensors. 2023;13:439. doi: 10.3390/bios13040439. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 8.Nanopore O. Oxford Nanopore Announces £100 Million ($140M) Fundraising from Global Investors. [(accessed on 12 May 2023)]. Available online: https://nanoporetech.com/about-us/news/oxford-nanopore-announces-ps100-million-140m-fundraising-global-investors.
  • 9.Nayak S., Patgiri R. 6G Communication Technology: A Vision on Intelligent Healthcare. In: Patgiri R., Biswas A., Roy P., editors. Health Informatics: A Computational Perspective in Healthcare. Springer; Singapore: 2021. pp. 1–18. [DOI] [Google Scholar]
  • 10.Chen S., Liang Y.C., Sun S., Kang S., Cheng W., Peng M. Vision, Requirements, and Technology Trend of 6G: How to Tackle the Challenges of System Coverage, Capacity, User Data-Rate and Movement Speed. IEEE Wirel. Commun. 2020;27:218–228. doi: 10.1109/MWC.001.1900333. [DOI] [Google Scholar]
  • 11.Khattak S.B.A., Nasralla M.M., Rehman I.U. The Role of 6G Networks in Enabling Future Smart Health Services and Applications; Proceedings of the 2022 IEEE International Smart Cities Conference (ISC2); Pafos, Cyprus. 26–29 September 2022; pp. 1–7. [Google Scholar]
  • 12.Nayak S., Patgiri R. 6G Communication: Envisioning the Key Issues and Challenges. EAI Endorsed Trans. Internet Things. 2020;6:166959. doi: 10.4108/eai.11-11-2020.166959. [DOI] [Google Scholar]
  • 13.Barman S., Shum H.P.H., Chattopadhyay S., Samanta D. A Secure Authentication Protocol for Multi-Server-Based E-Healthcare Using a Fuzzy Commitment Scheme. IEEE Access. 2019;7:12557–12574. doi: 10.1109/ACCESS.2019.2893185. [DOI] [Google Scholar]
  • 14.Noohani M.Z., Magsi K.U. A Review Of 5G Technology: Architecture, Security and wide Applications. IRJET J. 2020;7:3440–3471. doi: 10.5281/zenodo.3842353. [DOI] [Google Scholar]
  • 15.Yaacoub E., Alouini M. A Key 6G Challenge and Opportunity—Connecting the Base of the Pyramid: A Survey on Rural Connectivity. Proc. IEEE. 2020;108:533–582. doi: 10.1109/JPROC.2020.2976703. [DOI] [Google Scholar]
  • 16.Minglan S., Chaoying Z., Qiaoqiao L., Baolin L., Jianxiu W. Holographic communication technology; Proceedings of the 2021 International Conference on Neural Networks, Information and Communication Engineering; Qingdao, China. 27–28 August 2021. [Google Scholar]
  • 17.Letaief K.B., Chen W., Shi Y., Zhang J., Zhang Y.A. The Roadmap to 6G: AI Empowered Wireless Networks. IEEE Commun. Mag. 2019;57:84–90. doi: 10.1109/MCOM.2019.1900271. [DOI] [Google Scholar]
  • 18.Chen Z., Ma X., Zhang B., Zhang Y., Niu Z., Kuang N., Chen W., Li L., Li S. A survey on terahertz communications. China Commun. 2019;16:1–35. doi: 10.23919/JCC.2019.09.001. [DOI] [Google Scholar]
  • 19.Gui G., Liu M., Tang F., Kato N., Adachi F. 6G: Opening New Horizons for Integration of Comfort, Security, and Intelligence. IEEE Wirel. Commun. 2020;27:126–132. doi: 10.1109/MWC.001.1900516. [DOI] [Google Scholar]
  • 20.Alraih S., Shayea I., Behjati M., Nordin R., Abdullah N.F., Abu-Samah A., Nandi D. Revolution or Evolution? Technical Requirements and Considerations towards 6G Mobile Communications. Sensors. 2022;22:762. doi: 10.3390/s22030762. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 21.Deebak B.D., Al-Turjman F. Smart Mutual Authentication Protocol for Cloud Based Medical Healthcare Systems Using Internet of Medical Things. IEEE J. Sel. Areas Commun. 2021;39:346–360. doi: 10.1109/JSAC.2020.3020599. [DOI] [Google Scholar]
  • 22.Chiou S.-Y., Ying Z., Liu J. Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment. J. Med. Syst. 2016;40:101. doi: 10.1007/s10916-016-0453-1. [DOI] [PubMed] [Google Scholar]
  • 23.Yuanbing W., Wanrong L., Bin L. An Improved Authentication Protocol for Smart Healthcare System Using Wireless Medical Sensor Network. IEEE Access. 2021;9:105101–105117. doi: 10.1109/ACCESS.2021.3099299. [DOI] [Google Scholar]
  • 24.Farash M.S., Turkanović M., Kumari S., Hölbl M. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Netw. 2016;36:152–176. doi: 10.1016/j.adhoc.2015.05.014. [DOI] [Google Scholar]
  • 25.Kumar V., Mahmoud M.S., Alkhayyat A., Srinivas J., Ahmad M., Kumari A. RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure. J. Supercomput. 2022;78:16167–16196. doi: 10.1007/s11227-022-04513-4. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 26.Gupta D.S., Mazumdar N., Nag A., Singh J.P. Secure data authentication and access control protocol for industrial healthcare system. J. Ambient Intell. Humaniz. Comput. 2023;14:4853–4864. doi: 10.1007/s12652-022-04370-2. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 27.Alam I., Kumar M. A novel authentication protocol to ensure confidentiality among the Internet of Medical Things in covid-19 and future pandemic scenario. Internet Things. 2023;22:100797. doi: 10.1016/j.iot.2023.100797. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 28.Thakare A., Kim Y.-G. Secure and Efficient Authentication Scheme in IoT Environments. Appl. Sci. 2021;11:1260. doi: 10.3390/app11031260. [DOI] [Google Scholar]
  • 29.Yu Y., Taylor O., Li R., Sunagawa B. An Extended Chaotic Map-Based Authentication and Key Agreement Scheme for Multi-Server Environment. Mathematics. 2021;9:798. doi: 10.3390/math9080798. [DOI] [Google Scholar]
  • 30.Wong A.-K., Hsu C.-L., Le T.-V., Hsieh M.-C., Lin T.-W. Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks. Sensors. 2020;20:2511. doi: 10.3390/s20092511. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 31.Le T.V., Hsu C.L. An Anonymous Key Distribution Scheme for Group Healthcare Services in 5G-Enabled Multi-Server Environments. IEEE Access. 2021;9:53408–53422. doi: 10.1109/ACCESS.2021.3070641. [DOI] [Google Scholar]
  • 32.Zhang L., Zhang Y., Tang S., Luo H. Privacy Protection for E-Health Systems by Means of Dynamic Authentication and Three-Factor Key Agreement. IEEE Trans. Ind. Electron. 2018;65:2795–2805. doi: 10.1109/TIE.2017.2739683. [DOI] [Google Scholar]
  • 33.Mangard S., Oswald E., Popp T. Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer Science & Business Media; Berlin/Heidelberg, Germany: 2007. [DOI] [Google Scholar]
  • 34.Harn L., Hsu C., Xia Z. Lightweight and flexible key distribution schemes for secure group communications. Wirel. Netw. 2021;27:129–136. doi: 10.1007/s11276-020-02449-2. [DOI] [Google Scholar]
  • 35.Tselikis C., Douligeris C., Maglaras L., Mitropoulos S. On the conference key distribution system with user anonymity. J. Inf. Secur. Appl. 2020;54:102556. doi: 10.1016/j.jisa.2020.102556. [DOI] [Google Scholar]
  • 36.Meshram C., Ibrahim R.W., Deng L., Shende S.W., Meshram S.G., Barve S.K. A robust smart card and remote user password-based authentication protocol using extended chaotic maps under smart cities environment. Soft Comput. 2021;25:10037–10051. doi: 10.1007/s00500-021-05929-5. [DOI] [Google Scholar]
  • 37.Le T.-V. Cross-Server End-to-End Patient Key Agreement Protocol for DNA-Based U-Healthcare in the Internet of Living Things. Mathematics. 2023;11:1638. doi: 10.3390/math11071638. [DOI] [Google Scholar]
  • 38.Normand R., Yanai I. An introduction to high-throughput sequencing experiments: Design and bioinformatics analysis. Methods Mol. Biol. 2013;1038:1–26. doi: 10.1007/978-1-62703-514-9_1. [DOI] [PubMed] [Google Scholar]
  • 39.Mignardi M., Nilsson M. Fourth-generation sequencing in the cell and the clinic. Genome Med. 2014;6:31. doi: 10.1186/gm548. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 40.Jujjavarapu C., Anandasakaran J., Amendola L.M., Haas C., Zampino E., Henrikson N.B., Jarvik G.P., Mooney S.D. ShareDNA: A smartphone app to facilitate family communication of genetic results. BMC Med. Genom. 2021;14:10. doi: 10.1186/s12920-020-00864-0. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 41.Borré Ortiz Y., Suarez M., Expósito M. Importance and Recognition of the Family in Health Care: A Reflection for Nursing. Nurs. Care Open Access J. 2017;3:00084. doi: 10.15406/ncoaj.2017.03.00084. [DOI] [Google Scholar]
  • 42.Liu W., Wang X., Peng W., Xing Q. Center-Less Single Sign-On With Privacy-Preserving Remote Biometric-Based ID-MAKA Scheme for Mobile Cloud Computing Services. IEEE Access. 2019;7:137770–137783. doi: 10.1109/ACCESS.2019.2942987. [DOI] [Google Scholar]
  • 43.Shohaimay F., Ismail E.S. Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement. Mathematics. 2023;11:5. doi: 10.3390/math11010005. [DOI] [Google Scholar]
  • 44.Le T.V., Lu C.F., Hsu C.L., Do T.K., Chou Y.F., Wei W.C. A Novel Three-Factor Authentication Protocol for Multiple Service Providers in 6G-Aided Intelligent Healthcare Systems. IEEE Access. 2022;10:28975–28990. doi: 10.1109/ACCESS.2022.3158756. [DOI] [Google Scholar]
  • 45.Shuai M., Xiong L., Wang C., Yu N. A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem. Comput. Commun. 2020;160:215–227. doi: 10.1016/j.comcom.2020.06.012. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

Not available.


Articles from Bioengineering are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES