Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2022 Jul 20;22(14):5401. doi: 10.3390/s22145401

LAP-IoHT: A Lightweight Authentication Protocol for the Internet of Health Things

Chien-Ming Chen 1, Zhaoting Chen 1, Saru Kumari 2, Meng-Chang Lin 3,*
Editor: Jemal Abawajy
PMCID: PMC9320153  PMID: 35891080

Abstract

The Internet of Health Things (IoHT), which is an extension of the Internet of Things (IoT) in healthcare, has provided a new type of telemedicine approach. In IoHT, wearable sensors are used to collect patient health data, and information is transmitted remotely to doctors who can develop accurate treatment plans and provide timely telemedicine services to patients. However, patient health data are transmitted over a public channel, which means that the privacy and medical data of patients are at significant risk of leakage and can be confronted by serious security problems. We proposed a lightweight authentication protocol known as LAP-IoHT for IoHT environments to overcome the various threats that are currently faced by IoHT. We verified the security of LAP-IoHT using a Real-or-Random model and demonstrated its significant performance advantage by conducting a comparative analysis with other similar protocols for a better adaptation to the IoHT environment.

Keywords: Internet of Health Things, authentication, network security

1. Introduction

The rapid development of communication technologies has resulted in the extensive application of the Internet of Things (IoT) [1,2,3,4]. By using wireless networks to connect devices and various servers, IoT [5] provides a new means of communication that further enables interaction between virtual environments and the real world. Sensors [6,7] are the most common and versatile IoT devices. Wireless sensor networks (WSNs) [8,9,10] consist of numerous sensors to monitor specific areas and collect data. Hence, sensors and WSNs play an essential role in IoT development. At present, IoT is widely deployed in various applications and environments, such as manufacturing [11], environmental protection [12], smart cities [13,14], and intelligent transportation [15,16]. The rapid increase in the number of IoT devices demonstrates the importance and development potential of IoT, which is gradually improving the quality of life and making intelligent living and digital life possible.

Furthermore, the Internet of Health Things (IoHT) [17,18], which is a subset of IoT, is used extensively in healthcare scenarios [19,20,21]. In IoHT, wearable sensors [22,23] are implanted into the human body or set on body surfaces depending on the disease condition, thereby continuously monitoring the physiological indicators of the patient. These wearable sensors collect real-time data from the human body and transmit them to servers. Doctors can remotely analyze these data in order to provide timely medical services to patients. As the development of the healthcare sector is closely linked to people’s lives, IoHT can prevent several chronic diseases, save patient transportation costs, protect the health of healthcare professionals, reduce the possibility of conflicts between doctors and patients, and help family members to remain abreast of patients’ current conditions. IoHT provides higher-quality healthcare services, improves the level and efficiency of services, and optimizes the use of healthcare resources.

Security and privacy [24,25,26,27] have become the primary challenges of IoHT. In an IoHT system, the medical information of patients collected by sensors is transmitted over open networks. Since this information is highly sensitive, it must be protected from unauthorized users or malicious attackers, who may steal, modify, and delete health data, corrupt medical records, and even threaten the lives of patients. Moreover, attackers may target medical devices by hijacking and forging such devices, resulting in the denial of service and, in severe cases, possible damage to medical devices. Therefore, exploring a security mechanism to address the current environment and eliminate threats in IoHT is necessary.

This study proposed a lightweight authentication protocol (LAP) known as LAP-IoHT for IoHT environments. In LAP-IoHT, all participants, including the users and wearable sensors, are authenticated by the gateway. Subsequently, a shared session key is established for each communication session. LAP-IoHT encrypts the biometric features of the users to ensure anonymity. To demonstrate the security and reliability of this approach, we applied the Real-or-Random (ROR) model to analyze LAP-IoHT. The experimental results indicated that LAP-IoHT exhibits improved communication and computationally efficient performance.

The main contributions of this study are as follows:

  • (1)

    To address the current security issues frequently encountered in healthcare IoT systems, we designed a three-factor IoHT-based protocol that incorporates authentication and key negotiation, thereby guaranteeing privacy and access control.

  • (2)

    The introduction of biometrics, which protects the anonymity of users with unique information, can provide better user experience and privacy protection. In addition to using common one-way hash functions and simple XOR operations, we adopted asymmetric encryption and decryption in the protocol to provide higher security.

  • (3)

    Based on a shared ROR model, we performed a formal security analysis to evaluate the security, soundness, and integrity of the session key and protocol. Moreover, the informal security analysis provided strong evidence that the protocol is resistant to currently known security attacks.

  • (4)

    We conducted a comparative study and analyzed the performance of several protocols of the same type, taking into account the computational cost, time efficiency, and security properties. The results demonstrated that our protocol exhibits a significant performance advantage.

The remainder of this paper is organized as follows: Section 2 describes related work. In Section 3, we outlined the proposed LAP-IoHT protocol. Section 4 and Section 5 provide the security analysis and performance evaluation, respectively. Finally, Section 6 concludes the paper.

2. Related Work

IoT is widely adopted in healthcare monitoring systems. Onasanya et al. [28] proposed an IoT healthcare system for cancer care. Sun et al. [29] developed a medical record search protocol for IoT healthcare to ensure privacy preservation. Zhang et al. [30] proposed an isolation computing technology for cloud-based IoT healthcare. In 2020, Selvaraj et al. [31] reviewed the challenges and opportunities in IoT healthcare systems. Furthermore, several researchers have emphasized security and privacy issues. In 2019, Alassaf et al. [32] simulated the implementation of cryptographic functions for data in IoT healthcare. Kumari et al. [33] described a secure framework for medical systems in 2020. In 2021, Hossien et al. [34] introduced a privacy-preserving architecture for IoT healthcare based on blockchain. Wang et al. [35] proposed privacy preservation in IoT-enabled healthcare systems.

Moreover, several authentication protocols are available for IoHT. A summary of the applications of IoT in the medical industry is presented in Table 1. In 2015, Amin et al. [36] argued that elliptic curve cryptography could provide improved security for IoHT, but the protocol was not resistant against offline password-guessing attacks and privileged insider attacks. Challa et al. [37] proposed a three-factor authentication protocol for IoHT in 2018. However, once the sensor node was obtained by a malicious attacker, it broke the security of the protocol [37]. In 2019, Preeti et al. [38] designed a protocol that applied a WSN to IoHT and used a smart card. However, their protocol did not provide perfect forward security or resistance against sensor node capture attacks. Aghili et al. [39] proposed an access control and ownership transfer protocol for IoHT systems. Unfortunately, Amintoosi et al. [40] pointed out that the protocol of Aghili et al. [39] could not provide perfect forward security and was vulnerable to malicious sensor and server spoofing attacks. They also proposed a low-cost protocol for IoHT. In 2019, Gupta et al. [41] proposed a protocol that used wearable medical devices for IoHT to prevent attackers from modifying patient health information. However, Hajian et al. [42] pointed out that this protocol [41] did not protect information against privileged insider attacks, offline password-guessing attacks, and de-synchronization attacks. The proposed protocol of Hajian et al. [42] also could not provide perfect forward security and was vulnerable to session-key disclosure and impersonation attacks. To improve the security of the protocol, Kumar et al. [43] used digital signatures to encrypt the IoHT protocol communication process. Recently, Yu et al. [44] proposed a more realistic application-compliant authentication protocol designed around blockchain and physically unclonable functions while also enhancing mutual authentication between entities.

Table 1.

A summary of the application of the Internet of Things in the medical industry.

Protocols Advantages Limitations
Amin et al. [36] (1) Resist impersonation attack
(2) Resist smart card stolen attack
(3) Resist replay attack
(1) Cannot resist privileged insider attack
(2) Cannot resist offline password guessing attack
Challa et al. [37] (1) Provide user anonymity
(2) Resist offline password guessing attack
(3) Resist man-in-the middle attack
(1) Cannot resist sensor node capture attack
Preeti et al. [38] (1) Provide mutual authentication
(2) Resist DoS attack
(3) Resist known-session-specific
temporary information attack
(1) Cannot provide perfect forward security
(2) Cannot resist sensor node capture attack
Aghili et al. [39] (1) Provide user untraceability
(2) Resist de-synchronization attack
(3) Resist DoS attack
(1) Cannot provide perfect forward security
(2) Cannot resist malicious sensor attack
(3) Cannot resist server impersonation attack
Amintoosi et al. [40] (1) Resist known-session-specific
temporary information attack
(2) Provide perfect forward security
(3) Resist privileged insider attack
Gupta et al. [41] (1) Provide perfect forward security
(2) Resist impersonation attack
(3) Provide anonymity and untraceability
(1) Cannot resist privileged insider attack
(2) Cannot resist offline password guessing attack
(3) Cannot resist de-synchronization attack
Hajian et al. [42] (1) Resist replay attack
(2) Resist privileged insider attack
(3) Resist de-synchronization attack
(1) Cannot provide perfect forward security
(2) Cannot resist session key disclosure attack
(3) Cannot resist impersonation attack
Kumar et al. [43] (1) Resist privileged insider attack
(2) Resist man-in-the-middle attack
(3) Resist replay attack
Yu et al. [44] (1) Provide user untraceability and anonymity
(2) Resist session key disclosure attack
(3) Provide mutual authentication

3. Proposed LAP-IoHT

3.1. Network Model

Figure 1 depicts the overall network model of the proposed protocol. This model describes a typical IoHT environment. The architecture includes three entities: users, a gateway, and wearable sensors:

  • (1)

    Wearable sensors are set on the bodies of patients. They can observe various body indicators, such as the electrocardiogram (ECG), electromyography (EMG), electroencephalogram (EEG), respiratory rate, pulse, blood pressure, blood glucose, and oxygen saturation. These wearable sensors should be registered with a gateway before being deployed to human bodies for precise management.

  • (2)

    Users are organizations or groups of people who can view the health data of patients. For example, users may be hospital administrators, doctors, pharmacists, nurses, families of patients, data analysts, and drug trialists. If a person needs to enter the network and view patient medical data, the person must register with the gateway in advance and become a legitimate user with the appropriate authorities.

  • (3)

    The gateway in our IoHT architecture acts as a trusted server. Prior to entering this network, all wearable sensors and users should register with the gateway. Subsequently, the gateway manages the list of all sensors and legitimate users.

Figure 1.

Figure 1

System model.

Assume that a user desires to obtain data from a specific wearable sensor. This user transmits a request to the gateway and the gateway forwards this request to the sensor. After receiving the request, the wearable sensor sends the data to the user with the help of the gateway. Since medical data are personal and private, all communications among the users, gateway, and sensors should be confidential. The most straightforward method for achieving this is to encrypt the transmitted data.

The gateway can authenticate users and sensors using the proposed protocol. Moreover, a shared session key is established for each session.

3.2. LAP-IoHT

This section presents the proposed LAP-IoHT protocol for IoHT, which consists of three phases: user registration, sensor registration, and login and authentication. The notations and symbols are defined in Table 2.

Table 2.

Notation definitions.

Notations Descriptions
Ui ith user
IDi Identity of Ui
PWi Password of Ui
Bio Biometrics of Ui
SNj jth sensor node
SIDj Identity of SNj
GWN Gateway node
Gj Private key of GWN
pbs Public key of SNj
pvs Private key of SNj
SK Session key
Ts Time stamp, where s = 1, 2, 3, 4
r1,ru,rg,rs Temporary random number
XOR operation
Concatenate operation
h(·) Hash function
Gen(·)/Rep(·) Fuzzy extractor/reproduction function
ENC/DEC Asymmetric encryption/decryption
The public channel
The secure channel
A Adversary

3.3. User Registration Phase

Assume that user Ui desires to become a legitimate user. This user must register with GWN. Figure 2 shows the steps that are involved in this phase. The messages are transmitted through a secure channel.

Figure 2.

Figure 2

User registration phase.

  • (1)

    Ui prepares his or her own IDi and PWi and unique biometric Bio and selects a random number r1. Subsequently, Ui computes HIDi=h(IDir1), Gen(Bio)=(σi,τi), HPWi=h(PWiσi), and N=PWih(IDiσi). Thereafter, Ui transmits {HIDi, HPWi, N} to GWN.

  • (2)

    GWN first verifies whether HIDi has already been registered. Thereafter, GWN calculates D1=h(HIDiN), D2=h(D1Gj)HPWi, D3=D2N, and D4=h(HIDiGj)D1. Subsequently, GWN stores {HIDi,D1} in its database and transmits {D1, D3, D4} to Ui.

  • (3)

    Ui computes Ωi=Nr1 and M=h(Nr1)HIDi, and then stores {D1, D3, D4, Ωi, M} in his or her smart card.

3.4. Sensor Registration Phase

A wearable sensor must also be registered before joining the network. Assume that sensor SNj desires registration with GWN. Figure 3 depicts the detailed steps involved in this phase. The messages are submitted via a secure channel:

  • (1)

    SNj sends its identity SIDj to GWN.

  • (2)

    GWN generates a random number b and calculates the pseudo-identity PIDj of SNj, where PIDj=h(SIDjb). Subsequently, GWN calculates HSIDj=h(SIDjGj) and SG=h(HSIDjGj)PIDj with its own private key Gj. GWN also uses an asymmetric encryption system to encrypt PID with the public key of SNj. At this point, GWN calculates L=ENCpbs(PIDj), sends {SG, L} to SNj, and stores {SIDj, PIDj} in the database.

  • (3)

    SNj stores {SG, L} in its own memory.

Figure 3.

Figure 3

Sensor registration phase.

3.5. Login and Authentication Phase

If Ui requires connection to a specific wearable sensor SNj, GWN needs to verify the legitimacy of the user. Subsequently, Ui, GWN, and SNj build a session key to encrypt the messages among them. In this phase, several parameters (e.g., M, XUG, XGS, XSG, and XGu) are calculated. Figure 4 illustrates this phase, the details of which are as follows:

  • (1)

    Ui inserts his or her smart card into a smart card reader/computer and provides his or her identity IDi, password PWi, and biometrics Bio. This computer calculates σi=Rep(Bio,τi), N=PWih(IDiσi), and M=h(Nr1)HIDi, where r1=ΩiN and HIDi=h(IDir1). Subsequently, it determines whether M is equal to M stored in the smart card. If M=M, the computer generates ru and timestamp T1 and calculates HPWi=h(PWiσi), B1=D3NHPWi, and B2=B1ru. Ui calculates XUG=h(T1ruHIDiB2) and then sends {HIDi,B2,XUG,T1} to GWN.

  • (2)

    GWN first verifies the freshness of T1 and retrieves the corresponding D1 from its own database according to HIDi. Thereafter, GWN calculates B1=h(D1Gj), ru=B1B2, and XUG=h(T1ruHIDiB2). If XUG and the received XUG are equal, GWN generates a random number rg and current timestamp T2. Subsequently, GWN calculates HSIDj=h(SIDjGj), B3=ruh(HSIDjGj), B4=D1h(B3SIDjru), B5=rgh(D1ru), B6=B3PIDj, and XGS=h(T2rurgSIDjB5). Thereafter, GWN transmits {B4, B5, B6, XGS, T2} to SNj.

  • (3)

    SNj verifies the freshness of T2 and then obtains PIDj by decrypting L with his or her private key pus. Thereafter, SNj calculates B3=B6PIDj, ru=B3SGPIDj, D1=B4h(B3SIDjru), rg=B5h(D1ru), and XGS=h(T2rurgSIDjB5). SNJ determines whether XGS is the same as the received XGS. If so, SNj generates T3, r3, and computes B7=rsh(SGD1rg), B8=PIDjB7, XSG=h(T3rgrsB7SG), and XSU=h(rursSIDjD1). Finally, SNj calculates the session key SK as h(rurgrs). At this point, SNj transmits {B8, XSG, XSU, T3} to GWN.

  • (4)

    GWN first verifies the freshness of T3, and calculates B7=B8PIDj, SG=h(HSIDjGj)PIDj, and rs=B7h(SGD1rg). Subsequently, GWN verifies the legitimacy of SNj by determining whether h(T3rgrsB7SG) is equal to XSG. If they are equal, GWN generates a timestamp T4, computes B9=D1B1, B10=B9h(HIDiGj)rs, and B11=SIDjh(B1rs), and produces a session key SK=h(rurgrs). GWN provides XGU=h(T4rurgB10) for mutual authentications with the user and sends {B5,B10, B11, XGU, XSU, T4} to Ui.

  • (5)

    The computer of Ui inspects the timestamp from GWN, and computes rs=B1B10D4 and rg=B5h(D1ru). Thereafter, it calculates XGU and verifies whether XGU=XGU. Subsequently, it calculates XSU=h(rursSIDjD1), where SIDj=B11h(B1rs). At this time, Ui can successfully calculate the session key SK=h(rurgrs). Obviously, Ui, GWN, and SNj have the same session key at this point.

Figure 4.

Figure 4

Login and authentication phase.

4. Security Analysis

This section first describes the capabilities that the attacker A may possess. Subsequently, we demonstrate that our method is secure against different types of attacks. Finally, we use the Real-or-Random (ROR) model to show that our LAP-IoHT protocol is provably secure.

4.1. Adversary Model

We consider the well-known Dolev–Yao (DY) adversary model [45] and assume that an attacker A has the following capabilities:

  • (1)

    A can eavesdrop, block, replay, alter, and delete messages that are sent over a public channel.

  • (2)

    A can steal the smart card or smart device of a user and obtain the information stored therein.

  • (3)

    A can capture a sensor node to extract the information stored therein.

  • (4)

    A can obtain the long-term key of the gateway and acquire the contents stored therein as an internal privileged person.

4.2. Protection against Well-Known Attacks

4.2.1. Replay Attack

In LAP-IoHT, messages that are transmitted via a public channel have timestamps, such as T1, T2, T3, and T4. These timestamps ensure the freshness of the messages and resist replay attacks. Moreover, XUG, XGS, XSG, XSU, and XGU include random numbers. Timestamps and random numbers are two effective means of preventing replay attacks. Thus, LAP-IoHT is resistant against replay attacks.

4.2.2. User Impersonation Attack

Assume that A can obtain the private key Gj of GWN. Even if A intercepts the parameters T1, HIDi, and B2 via a public channel, A still cannot obtain ru because A cannot obtain B1 and D1. Therefore, A fails to calculate XUG, cannot pass the authentication of GWN, and cannot imitate Ui for communication. Thus, LAP-IoHT can effectively resist user impersonation attacks.

4.2.3. Server Impersonation Attack

Suppose that A can obtain a smart card for Ui. However, A does not know the value of SIDj and the private key Gj of the gateway; therefore, A cannot pass the authentication of SNj by computing XGS and cannot successfully imitate the gateway. Hence, our protocol can defend against server impersonation attacks.

4.2.4. Privileged Insider Attack

If A is an insider of GWN, A can obtain HIDi, D1, SIDj, and PIDj, which are stored in the database of GWN. However, A cannot successfully obtain the session key because he or she does not know ru, rg, and rs. Thus, the proposed protocol can defend against privileged insider attacks. Therefore, we can state that the proposed protocol is secure against insider attacks.

4.2.5. Known Session Specific Temporary Information Attack

We assume that the temporary random number ru is obtained using A. If A wishes to calculate the session key SK, three parameters ru,rg, and rs are required. However, A cannot know rg because he or she cannot obtain PIDj. Furthermore, A cannot obtain rs. Thus, our protocol is not affected by temporary information leakage.

4.2.6. Stolen Smart Card Attack

A obtains {D1,D3,D4,Ωi,M} stored in the smart card that he or she has stolen. Even if A knows B2 and D1, A cannot obtain B1 because he or she cannot obtain Gj. This implies that A cannot pass the server verification let alone establish a communication session key with GWN. Thus, LAP-IoHT is resistant against smart card theft attacks.

4.2.7. Perfect Forward Security

If A knows the Gj of the gateway when calculating the random number ru=B1B2, B2 can intercept the transmitted information and the other parameter B1=h(D1Gj). Gj is already known by A, but as D1=h(HIDiN), A cannot obtain N and HIDi and, hence, cannot know D1. Since A cannot calculate ru, he or she cannot obtain session key SK. Therefore, our protocol provides perfect forward security.

4.3. ROR Security Analysis

The ROR (Real-or-Random) model is a widely used security-proof method. The ROR model can obtain the probability of successfully breaking session key SK through several different game rounds. Therefore, we use the ROR model to perform a formal security analysis to demonstrate the security and accuracy of the protocol.

4.3.1. ROR Model

Our protocol comprises three entities: Ui, GWN, and Sj. We use ΠUix, ΠGWNy, and ΠSjz to denote the x-th user, y-th gateway, and z-th sensor nodes, respectively, such that R={ΠUix, ΠGWNy, and ΠSjz}. Suppose that attacker A can execute the following queries:

Execute(R): When this query is executed, A can intercept the messages that are transmitted among entities Ui, GWN, and Sj over the public channel.

Send(R,M): By executing this query, A can send message M to R and receive the response message from R.

Hash(String): Through this operation, A can obtain the hash value of a fixed-length string after inputting it.

Corrupt(R): By executing this query, A obtains the private value of an entity, such as long-term key, generated temporary information, or parameters that are stored in a smart card.

Test(R): Assume that A executes this query and can determine the security of the session key by tossing coin C. If C = 1, A obtains the correct session key. Otherwise, A receives a random string.

Theorem 1: In the ROR model, we use AdvAP as a function of the attacker’s ability to compromise the protocol through query operations; that is, the probability that A can obtain the session key AdvAPqh2/|H|+qs/2t1|D|, where qh and qs represent the number of times to perform the Hash and Send queries, respectively, |H| and |D| represent the space range and dictionary size corresponding to the hash operation, respectively, and t represents the number of bits of biological information in the protocol.

4.3.2. Security Proof

To prove the accuracy of Theorem 1, we performed four rounds of game GMi(i=0,1,2,3), where SuccAGMi denotes the probability of the attacker A winning in each round of the game. The details of the game are as follows.

GM0: At the beginning of the game, A only needs to determine bit b and does not perform any query operation. Therefore, we can obtain

AdvAP=|2Pr[SuccAGM0]1|. (1)

GM1: GM1 performs a wiretap operation on top of GM0. In this round, A can only steal messages that are transmitted on the common channels {HIDi,B2,XUG,T1}, {B4,B5,B6,XGS,T2}, {B8,XSG,XSU,T3}, and {B5,B10,B11,XGU,XSU,T4}. A cannot execute the Test queries to obtain the session key SK=h(rurgrs) during communication because the values of the random numbers ru, rg, and rs cannot be obtained based only on the information in the common channels. Therefore, the probability of A winning the game after performing an Execute query is equal to GM0.

Pr[SuccAGM1]=Pr[SuccAGM0]. (2)

GM2: GM2 is the third round of the game, in which the Hash query and Send operation have already occurred in GM1. During the game, forgery is not possible because B4, XUG, B4, B5, XGS, B11, XSG, XSU, and XGU are encrypted using hash functions. Moreover, the important parameters ru, rg, and rs, which constitute the session key, are random in all sessions and do not cause hash conflicts. Thus, according to the birthday paradox, we obtain

|Pr[SuccAGM2]Pr[SuccAGM1]|qh2/2|H|. (3)

GM3: In this round, the Corrupt query is executed and the attacker A can obtain the private value of an entity, such as {SG,L}, {D1,D3,D4,Ωi,M}, or {SIDj,PIDj,HIDi,D1}. Moreover, A attempts to guess IDi and PWi; however, even if A can successfully guess IDi and PWi simultaneously, he or she still cannot obtain the random number ru. Since ru=B1B2, B1=D3NHPWi, N=PWih(IDiσi), σi=Rep(Bio,τi), and the probability of the biometric being estimated is 1/2t, A cannot obtain the biological eigenvalue Bio. If A can only enter the code a finite number of times, we know that

|Pr[SuccAGM3]Pr[SuccAGM2]|qs/2t|D|. (4)

Since A can only win the game if the correct bit b is guessed, we obtain

|Pr[SuccAGM3]|=1/2. (5)

Using Equations (1)–(5) above, we obtain

1/2AdvAP=|Pr[SuccAGM0]1/2|=|Pr[SuccAGM1]Pr[SuccAGM3]||Pr[SuccAGM2]Pr[SuccAGM1]|+|Pr[SuccAGM3]Pr[SuccAGM2]|=qh2/2|H|+qs/2t|D|. (6)

Ultimately, we can obtain AdvAPqh2/|H|+qs/2t1|D|.

4.4. Security Comparisons

We compare LAP-IoHT with other related protocols with similar architectures, such as those of Kumar et al. [43], Yu et al. [44], Amin et al. [36], Challa et al. [37], Aghili et al. [39], and Preeti et al. [38]. We set the following representations: A1: resist replay attack; A2: resist impersonation attack; A3: resist privileged insider attack; A4: perfect forward security; A5: resist known session specific temporary information attack; A6: resist stolen smart card attack; A7: resist offline password guessing attack; A8: resist sensor node capture attack; A9: resist de-synchronization attack; A10: resist session key disclosure attack. “Y” indicates that the protocol is invulnerable to this attack, and “N” indicates that the protocol is vulnerable to this attack. The results in Table 3 demonstrate that, with the continual development of technology and various attack methods, the other related protocols will be affected by the above attacks. Compared to these protocols, our method exhibits better security and sufficient advantages in resisting the above attacks to guarantee the security of communication sessions.

Table 3.

Comparisons of security.

Protocols A1 A2 A3 A4 A5 A6 A7 A8 A9 A10
Ours Y Y Y Y Y Y Y Y Y Y
Kumar et al. [43] Y Y Y Y Y Y Y Y Y Y
Yu et al. [44] Y Y Y Y Y Y Y Y Y Y
Amin et al. [36] Y Y N Y Y Y N Y Y Y
Challa et al. [37] Y Y Y Y Y Y Y N Y Y
Preeti et al. [38] Y Y Y N Y Y Y N Y Y
Aghili et al. [39] Y N N Y Y Y Y Y Y Y

5. Performance Comparison

In this section, we evaluate the performance of the proposed LAP-IoHT protocol by performing comparisons with other protocols, such as those proposed by Kumar et al. [43], Yu et al. [44], Amin et al. [36], Challa et al. [37], Aghili et al. [39], and Preeti et al. [38], in terms of the computation time and communication cost.

We used different devices to obtain the computation time and communication cost required for the certification stage in the performance comparison. We used a mobile phone, laptop computer, and desktop computer to simulate the user, gateway, and sensor nodes, respectively. The relevant parameters for the three devices are listed in Table 4. Table 5 presents the times required by different devices to perform certain operations. TH denotes the time required to perform a single hash function operation, TSED denotes the time required to perform a single symmetric encryption or decryption operation, TFE denotes the time required to perform a single fuzzy extraction operation, TASED denotes the time required to perform a single asymmetric encryption or decryption operation, TS denotes the time required to execute the digital signature operation, and TPM denotes the time required to perform an elliptic curve point multiplication operation. As the communication times required by the connection and XOR operations are insignificant compared to the other operations, these can be ignored. Table 6 presents a comparison of the communication times of our proposed protocol and other similar protocols. Several communication costs arise in the communication process, and asymmetric encryption or decryption has an enormous overhead of 1024 bits. The length required for the elliptic curve point multiplication operation is 320 bits; the length of each block for symmetric encryption or decryption is 256 bits; the hash values and random numbers all have similar lengths of 160 bits; the identity, password, and biometrics are all 128 bits in length; the timestamps require a length of 32 bits. In Table 7, we compare the communication overheads of multiple protocols to determine the specific communication cost.

Table 4.

Parameters of the devices.

Devices Model Operating System Memory Processor
mobile phone MI 8 Android 6 GB Qualcomm Snapdragon 845
laptop computer DELL G15 5510 Windows 10 16 GB Intel(R) Core(TM)i7-10870H
desktop computer LENOVO 90M2A0A6CD Windows 10 8 GB Intel(R) Core(TM)i5-9500

Table 5.

Execution time of operations.

Operations MI 8 DELL G15 5510 LENOVO 90M2A0A6CD
TFE 20.7028 ms 2.2823 ms 1.6197 ms
TASED 47.6405 ms 5.2520 ms 3.7272 ms
TPM 0.00044 ms 16 ms 13 ms
TSED 0.2009 ms 0.1551 ms 0.0879 ms
TH 0.02812 ms 0.0031 ms 0.0022 ms
TS 69 ms 270 ms 139 ms

Table 6.

Comparison of time.

Protocols User Gateway SensorNode Total Computation
(ms)
Ours TFE+10TH 14TH TASED+7TH 24.77
Kumar et al. [43] 2TPM+8TH+2TS+3TSED TSED+3TH TPM+10TH+2TS+2TSED 370.19074
Yu et al. [44] TFE+9TH 9TH 7TH 20.99918
Amin et al. [36] TSED+4TPM+7TH TSED+2TPM+6TH 2TSED+3TPM+4TH 71.7578
Challa et al. [37] TFE+2TPM+9TH TPM+4TH 6TH 36.9824
Preeti et al. [38] TFE+3TPM+15TH 3TPM+11TH 5TH 69.171
Aghili et al. [39] TFE+12TH 16TH 4TH 21.09864

Table 7.

Comparison of cost.

Protocols User Gateway SensorNode Total Communication Cost (bits) Number of Messages
Ours 480 1504 512 2496 4
Kumar et al. [43] 1824 3424 1472 6720 4
Yu et al. [44] 672 1216 672 2560 5
Amin et al. [36] 960 1280 800 3040 4
Challa et al. [37] 832 224 352 1408 3
Preeti et al. [38] 832 1088 352 2272 4
Aghili et al. [39] 800 864 4352 2016 4

5.1. Computation Time

We use three devices to determine the computation time and communication cost. The times required to perform elliptic curve point multiplication, symmetric encryption/decryption, asymmetric encryption/decryption, single fuzzy extraction, and hash functions vary on different devices. Furthermore, the computation times required for the connection and XOR operations are insignificant compared to the other operations; thus, we ignore these in our evaluation.

The computation times of the proposed protocol and other similar protocols are listed in Table 6. Table 6 shows the computation costs of all protocols. The most time-consuming protocol is the protocol proposed by Kumar et al. [43], which includes elliptic curve point multiplication and digital signature operations. The protocol proposed by Yu et al. [44] is the least time consuming. Although our proposed protocol includes fuzzy extraction and asymmetric operations in the login and authentication processes, its computation time is relatively short.

5.2. Communication Cost

We assume that the output of asymmetric encryption/decryption is 1024 bits; the length required for the elliptic curve point multiplication operation is 320 bits; each block for symmetric encryption/decryption is 256 bits; the hashed value and random number are 160 bits; the identity, password, and biometrics are all 128 bits in length; the timestamps require a length of 32 bits.

According to Table 7, we can determine the communication costs of all the protocols. The communication costs of the protocols proposed by Kumar et al. [43], Yu et al. [44], Amin et al. [36], Challa et al. [37], Aghili et al. [39], and Preeti et al. [38] are 6720 bits (256 ∗ 7 + 32 + 256 ∗ 6 + 32 + 256 ∗ 7 + 32 + 32 + 256 ∗ 5 + 160 + 32), 2560 bits (160 + 160 + 160 + 160 + 32 + 160 + 160 + 32 + 160 + 160 + 160 + 32 + 160 + 160 + 32 + 160 + 160 + 160 + 160 + 32, 3040 bits (128 + 320 + 160 + 160 + 32 + 160 + 256 ∗ 3 + 320 + 32 + 256hl∗3 + 32 + 160), 1408 bits (160 + 160 + 320 + 160 + 32 + 160 + 32 + 32 + 160 + 160 + 32), 2272 bits (160 + 160 + 160 + 320 + 32 + 160 + 160 + 32 + 32 + 160 + 160 + 320 + 32 + 32 + 160 + 160 + 32), and 2016 bits (160 + 160 + 160 + 160 + 128 + 32 + 160 + 160 + 160 + 32 + 160 + 160 + 32 + 160 + 160 + 32), respectively. The communication cost of our proposed protocol is 2496 bits (128 + 160 + 160 + 32 + 160 + 160 + 160 + 160 + 32 + 160 + 160 + 160 + 32 + 160 + 160 + 160 + 160 + 160 + 32).

Figure 5 and Figure 6 compare the LAP-IoHT protocol with the other related protocols in terms of the computation times and communication costs. Although the communication costs of the LAP-IoHT protocol are higher than those of the protocols proposed by Challa et al. [37], Aghili et al. [39], and Preeti et al. [38], the run time of LAP-IoHT is much lower [37,38]. Moreover, the security of LAP-IoHT is higher than those of all three [37,38,39]. Furthermore, although the protocols proposed by Kumar et al. [43] and Yu et al. [44] are more secure, they do not offer any advantages in terms of communication costs. Therefore, it is easy to conclude that LAP-IoHT performs better than the related protocols. More importantly, it can be observed from Table 3 that LAP-IoHT has excellent security advantages. It can effectively resist various attacks, thereby providing security for communication sessions.

Figure 5.

Figure 5

Running times.

Figure 6.

Figure 6

Communication costs.

6. Conclusions

Internet of Health Things (IoHT), which promotes intelligent healthcare, plays a pivotal role in the future e-healthcare environment. Due to its high sensitivity, the health data transmitted through a public channel should be protected from unauthorized access. This means that an authentication protocol is essential. This paper presented a more secure and reliable authentication protocol called LAP-IoHT for the Internet of Health Things. LAP-IoHT provides mutual authentication among users, sensors, and a gateway over a public channel. Moreover, a user and a sensor can establish a common session key after a protocol run. By using the ROR model and performing an informal analysis, it was proven that LAP-IoHT has adequate security and reliability as well as sufficient ability to resist various attacks. Furthermore, we compared LAP-IoHT with related protocols and found that our protocol is at the mid-to-upstream level in terms of time and communication costs, exhibiting a significant performance advantage. In summary, the proposed protocol offers specific practical value in the current environment and has more robust adaptability relative to the future development of IoHT.

Abbreviations

The following abbreviations are used in this manuscript:

IoT Internet of Things;
WSN Wireless sensor network;
IoHT Internet of Health Things;
ECG Electrocardiogram;
EMG Electromyography;
EEG Electroencephalogram;
DY Dolev–Yao;
ROR Real-or-Random;
XOR Exclusive OR;
DoS Denial of service.

Author Contributions

Conceptualization: C.-M.C. and Z.C.; methodology: C.-M.C. and Z.C.; formal analysis: S.K. and M.-C.L.; investigation: M.-C.L.; and writing—original draft preparation: C.-M.C., Z.C., S.K. and M.-C.L. All authors have read and agreed to the published version of the manuscript.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Funding Statement

The authors received no specific funding for this study.

Footnotes

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Huang X., Xiong H., Chen J., Yang M. Efficient Revocable Storage Attribute-based Encryption with Arithmetic Span Programs in Cloud-assisted Internet of Things. IEEE Trans. Cloud Comput. 2021 doi: 10.1109/TCC.2021.3131686. [DOI] [Google Scholar]
  • 2.Liu G., Zhu Y., Xu S., Chen Y.C., Tang H. PSO-based power-driven X-routing algorithm in semiconductor design for predictive intelligence of IoT applications. Appl. Soft Comput. 2022;114:108114. doi: 10.1016/j.asoc.2021.108114. [DOI] [Google Scholar]
  • 3.Chen X., Zhang J., Lin B., Chen Z., Wolter K., Min G. Energy-efficient offloading for DNN-based smart IoT systems in cloud-edge environments. IEEE Trans. Parallel Distrib. Syst. 2021;33:683–697. doi: 10.1109/TPDS.2021.3100298. [DOI] [Google Scholar]
  • 4.Shen S., Yang Y., Liu X. Toward data privacy preservation with ciphertext update and key rotation for IoT. Concurr. Comput. Pract. Exp. 2021:e6729. doi: 10.1002/cpe.6729. [DOI] [Google Scholar]
  • 5.Cheng H., Shi Y., Wu L., Guo Y., Xiong N. An intelligent scheme for big data recovery in Internet of Things based on multi-attribute assistance and extremely randomized trees. Inf. Sci. 2021;557:66–83. doi: 10.1016/j.ins.2020.12.041. [DOI] [Google Scholar]
  • 6.Cheng H., Wu L., Li R., Huang F., Tu C., Yu Z. Data recovery in wireless sensor networks based on attribute correlation and extremely randomized trees. J. Ambient. Intell. Humaniz. Comput. 2021;12:245–259. doi: 10.1007/s12652-019-01475-z. [DOI] [Google Scholar]
  • 7.Zou W., Guo L., Huang P., Lin G., Mei H. Linear time algorithm for computing min-max movement of sink-based mobile sensors for line barrier coverage. Concurr. Comput. Pract. Exp. 2022;34:e6175. doi: 10.1002/cpe.6175. [DOI] [Google Scholar]
  • 8.Chu S.C., Dao T.K., Pan J.S. Identifying correctness data scheme for aggregating data in cluster heads of wireless sensor network based on naive Bayes classification. EURASIP J. Wirel. Commun. Netw. 2020;2020:52. doi: 10.1186/s13638-020-01671-y. [DOI] [Google Scholar]
  • 9.Xue X., Jiang C. Matching Sensor Ontologies with Multi-Context Similarity Measure and Parallel Compact Differential Evolution Algorithm. IEEE Sens. J. 2021;21:24570–24578. doi: 10.1109/JSEN.2021.3115471. [DOI] [Google Scholar]
  • 10.Fan F., Chu S.C., Pan J.S., Lin C., Zhao H. An optimized machine learning technology scheme and its application in fault detection in wireless sensor networks. J. Appl. Stat. 2021:1–18. doi: 10.1080/02664763.2021.1929089. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 11.Wei D., Xi N., Ma X., Shojafar M., Kumari S., Ma J. Personalized Privacy-aware Task Offloading for Edge-Cloud-Assisted Industrial Internet of Things in Automated Manufacturing. IEEE Trans. Ind. Inform. 2022 doi: 10.1109/TII.2022.3159822. [DOI] [Google Scholar]
  • 12.Xiaojun C., Xianpeng L., Peng X. IOT-based air pollution monitoring and forecasting system; Proceedings of the 2015 International Conference on Computer and Computational Sciences (ICCCS); Greater Noida, India. 27–29 January 2015; pp. 257–260. [Google Scholar]
  • 13.Nikooghadam M., Amintoosi H., Islam S.H., Moghadam M.F. A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance. J. Syst. Archit. 2021;115:101955. doi: 10.1016/j.sysarc.2020.101955. [DOI] [Google Scholar]
  • 14.Yu Z., Zheng X., Huang F., Guo W., Sun L., Yu Z. A framework based on sparse representation model for time series prediction in smart city. Front. Comput. Sci. 2021;15:151305. doi: 10.1007/s11704-019-8395-7. [DOI] [Google Scholar]
  • 15.Chaudhry S.A., Irshad A., Khan M.A., Khan S.A., Nosheen S., AlZubi A.A., Zikria Y.B. A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System. IEEE Trans. Intell. Transp. Syst. 2021 doi: 10.1109/TITS.2021.3134643. [DOI] [Google Scholar]
  • 16.Xiong H., Chen J., Mei Q., Zhao Y. Conditional privacy-preserving authentication protocol with dynamic membership updating for VANETs. IEEE Trans. Dependable Secur. Comput. 2020:1. doi: 10.1109/TDSC.2020.3047872. [DOI] [Google Scholar]
  • 17.Dourado C.M., da Silva S.P.P., da Nobrega R.V.M., Reboucas Filho P.P., Muhammad K., de Albuquerque V.H.C. An open IoHT-based deep learning framework for online medical image recognition. IEEE J. Sel. Areas Commun. 2020;39:541–548. doi: 10.1109/JSAC.2020.3020598. [DOI] [Google Scholar]
  • 18.Rahman M.A., Hossain M.S., Showail A.J., Alrajeh N.A., Alhamid M.F. A secure, private, and explainable IoHT framework to support sustainable health monitoring in a smart city. Sustain. Cities Soc. 2021;72:103083. doi: 10.1016/j.scs.2021.103083. [DOI] [Google Scholar]
  • 19.Chaudhry S.A., Irshad A., Nebhen J., Bashir A.K., Moustafa N., Al-Otaibi Y.D., Zikria Y.B. An anonymous device to device access control based on secure certificate for internet of medical things systems. Sustain. Cities Soc. 2021;75:103322. doi: 10.1016/j.scs.2021.103322. [DOI] [Google Scholar]
  • 20.Wu T.Y., Wang T., Lee Y.Q., Zheng W., Kumari S., Kumar S. Improved authenticated key agreement scheme for fog-driven IoT healthcare system. Secur. Commun. Netw. 2021;2021:6658041. doi: 10.1155/2021/6658041. [DOI] [Google Scholar]
  • 21.Xiong H., Hou Y., Huang X., Zhao Y., Chen C.M. Heterogeneous signcryption scheme from IBC to PKI with equality test for WBANs. IEEE Syst. J. 2021;16:2391–2400. doi: 10.1109/JSYST.2020.3048972. [DOI] [Google Scholar]
  • 22.Wu T.Y., Yang L., Meng Q., Guo X., Chen C.M. Fog-driven secure authentication and key exchange scheme for wearable health monitoring system. Secur. Commun. Netw. 2021;2021:8368646. doi: 10.1155/2021/8368646. [DOI] [Google Scholar]
  • 23.Chen C.M., Li Z., Chaudhry S.A., Li L. Attacks and solutions for a two-factor authentication protocol for wireless body area networks. Secur. Commun. Netw. 2021;2021:3116593. doi: 10.1155/2021/3116593. [DOI] [Google Scholar]
  • 24.Reddy G.T., Kaluri R., Reddy P.K., Lakshmanna K., Koppu S., Rajput D.S. A novel approach for home surveillance system using IoT adaptive security; Proceedings of the International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM), Amity University Rajasthan; Jaipur, India. 26–28 February 2019. [Google Scholar]
  • 25.Jian M.S., Wu J.M.T. Hybrid Internet of Things (IoT) data transmission security corresponding to device verification. J. Ambient. Intell. Humaniz. Comput. 2021:1–10. doi: 10.1007/s12652-021-03122-y. [DOI] [Google Scholar]
  • 26.Yang Y., Zheng X., Guo W., Liu X., Chang V. Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system. Inf. Sci. 2019;479:567–592. doi: 10.1016/j.ins.2018.02.005. [DOI] [Google Scholar]
  • 27.Pereira F., Crocker P., Leithardt V.R. PADRES: Tool for PrivAcy, Data REgulation and Security. SoftwareX. 2022;17:100895. doi: 10.1016/j.softx.2021.100895. [DOI] [Google Scholar]
  • 28.Onasanya A., Elshakankiri M. Smart integrated IoT healthcare system for cancer care. Wirel. Netw. 2021;27:4297–4312. doi: 10.1007/s11276-018-01932-1. [DOI] [Google Scholar]
  • 29.Sun Y., Liu J., Yu K., Alazab M., Lin K. PMRSS: Privacy-preserving medical record searching scheme for intelligent diagnosis in IoT healthcare. IEEE Trans. Ind. Inform. 2021;18:1981–1990. doi: 10.1109/TII.2021.3070544. [DOI] [Google Scholar]
  • 30.Zhang Y., Sun Y., Jin R., Lin K., Liu W. High-performance isolation computing technology for smart IoT healthcare in cloud environments. IEEE Internet Things J. 2021;8:16872–16879. doi: 10.1109/JIOT.2021.3051742. [DOI] [Google Scholar]
  • 31.Selvaraj S., Sundaravaradhan S. Challenges and opportunities in IoT healthcare systems: A systematic review. SN Appl. Sci. 2020;2:139. doi: 10.1007/s42452-019-1925-y. [DOI] [Google Scholar]
  • 32.Alassaf N., Gutub A. Simulating light-weight-cryptography implementation for IoT healthcare data security applications. Int. J. Health Med Commun. (IJEHMC) 2019;10:1–15. doi: 10.4018/IJEHMC.2019100101. [DOI] [Google Scholar]
  • 33.Kumari A., Kumar V., Abbasi M.Y., Kumari S., Chaudhary P., Chen C.M. Csef: Cloud-based secure and efficient framework for smart medical system using ecc. IEEE Access. 2020;8:107838–107852. doi: 10.1109/ACCESS.2020.3001152. [DOI] [Google Scholar]
  • 34.Hossein K.M., Esmaeili M.E., Dargahi T., Khonsari A., Conti M. BCHealth: A novel blockchain-based privacy-preserving architecture for IoT healthcare applications. Comput. Commun. 2021;180:31–47. doi: 10.1016/j.comcom.2021.08.011. [DOI] [Google Scholar]
  • 35.Wang K., Chen C.M., Tie Z., Shojafar M., Kumar S., Kumari S. Forward Privacy Preservation in IoT-Enabled Healthcare Systems. IEEE Trans. Ind. Inform. 2021;18:1991–1999. doi: 10.1109/TII.2021.3064691. [DOI] [Google Scholar]
  • 36.Amin R., Islam S., Biswas G., Khan M.K., Kumar N. An efficient and practical smart card based anonymity preserving user authentication scheme for TMIS using elliptic curve cryptography. J. Med. Syst. 2015;39:180. doi: 10.1007/s10916-015-0351-y. [DOI] [PubMed] [Google Scholar]
  • 37.Challa S., Das A.K., Odelu V., Kumar N., Kumari S., Khan M.K., Vasilakos A.V. An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput. Electr. Eng. 2018;69:534–554. doi: 10.1016/j.compeleceng.2017.08.003. [DOI] [Google Scholar]
  • 38.Preeti S., Arup K.P., SK H.I. An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system. Comput. Methods Programs Biomed. 2019;182:105504. doi: 10.1016/j.cmpb.2019.105054. [DOI] [PubMed] [Google Scholar]
  • 39.Aghili S.F., Mala H., Shojafar M., Peris-Lopez P. LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT. Future Gener. Comput. Syst. 2019;96:410–424. doi: 10.1016/j.future.2019.02.020. [DOI] [Google Scholar]
  • 40.Amintoosi H., Nikooghadam M., Shojafar M., Kumari S., Alazab M. Slight: A lightweight authentication scheme for smart healthcare services. Comput. Electr. Eng. 2022;99:107803. doi: 10.1016/j.compeleceng.2022.107803. [DOI] [Google Scholar]
  • 41.Gupta A., Tripathi M., Shaikh T.J., Sharma A. A lightweight anonymous user authentication and key establishment scheme for wearable devices. Comput. Netw. 2019;149:29–42. doi: 10.1016/j.comnet.2018.11.021. [DOI] [Google Scholar]
  • 42.Hajian R., ZakeriKia S., Erfani S.H., Mirabi M. SHAPARAK: Scalable healthcare authentication protocol with attack-resilience and anonymous key-agreement. Comput. Netw. 2020;183:107567. doi: 10.1016/j.comnet.2020.107567. [DOI] [Google Scholar]
  • 43.Kumar V., Mahmoud M.S., Alkhayyat A., Srinivas J., Ahmad M., Kumari A. RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure. J. Supercomput. 2022:1–30. doi: 10.1007/s11227-022-04513-4. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 44.Yu S., Park Y. A Robust Authentication Protocol for Wireless Medical Sensor Networks Using Blockchain and Physically Unclonable Functions. IEEE Internet Things J. 2022 doi: 10.1109/JIOT.2022.3171791. [DOI] [Google Scholar]
  • 45.Dolev D., Yao A. On the security of public key protocols. IEEE Trans. Inf. Theory. 1983;29:198–208. doi: 10.1109/TIT.1983.1056650. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

Not applicable.


Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES