Abstract
The healthcare ecosystem is migrating from legacy systems to the Internet of Things (IoT), resulting in a digital environment. This transformation has increased importance on demanding both secure and usable user authentication methods. Recently, a post-quantum fuzzy commitment scheme (PQFC) has been constructed as a reliable and efficient method of biometric template protection. This paper presents a new two-factor-based user authentication protocol for the IoT-enabled healthcare ecosystem in post-quantum computing environments using the PQFC scheme. The proposed protocol is proved to be secure using random oracle model. Furthermore, the functionality and security of the proposed protocol are analyzed, showing that memoryless-effortless, user anonymity, mutual authentication, and resistance to biometric templates tampering and stolen attacks, stolen smart card attack, privileged interior attack are fulfilled. The costs of storage requirement, computation, communication and storage are estimated. The results demonstrate that the proposed protocol is more efficient than Mukherjee et al., Chaudhary et al., and Gupta et al. protocols.
Keywords: Internet of Things, IoT-enabled healthcare, Post-quantum cryptography, User authentication, Biometric, Lightweight authentication protocols
Introduction
The healthcare ecosystem is undergoing modernization is known as a digital transformation. The Internet of Things (IoT) offers many benefits for the healthcare sector. The IoT-enabled healthcare makes healthcare practical for an aging population, chronic diseases, automate patient care, health records assortment and analysis. The IoT-enabled healthcare provided a better environment for both physician and patient during the outbreak of COVID-19. The IoT-enabled healthcare ecosystem refers to the interconnection of smart devices and applications via the Internet. The IoT-enabled healthcare ecosystem enables the collection, monitoring, and analyzing patients’ condition measurements, remotely [1, 2]. Figure 1 illustrates a typical IoT-enabled healthcare ecosystem, where a remote user (for instance, physicians and patient family) collect and monitor the patient’s biomedical conditions for further processing. The wearable or implantable IoT medical devices are deployed in the patient's body, which is measures and collects the patient biomedical conditions. These biomedical conditions transfer to a smartphone connected to the IoT medical devices via an app. Then, the smartphone sends the biomedical conditions to the healthcare server for further analysis and decision.
Fig. 1.
A typical IoT-enabled healthcare ecosystem architecture
Unlike the social and fiscal identities, the heath records such as genetic, conditions, or biometrics data cannot be revoked once it is compromised. The most significant threats that IoT-enabled healthcare poses are data security and privacy. Cybercriminals can misuse the patient’s health records to claim in the patient’s name, for instance, create fake IDs to buy drugs and medical equipment or file fraudulent Insurance. The IoT-enabled healthcare security is mainly for secure health records, communication, and user authentication. User authentication is a keystone in IoT-enabled healthcare security, which plays a crucial role in establishing trust between IoT healthcare users and devices and preventing attacks [3].
Nowadays, knowledge-based authentication such as passwords and PINs plays a central role in IoT-based healthcare. With the exponential increase in using online services based on the traditional authentication method such as passwords, passwords become not only frustrating for users but also costly to maintain. According to the 2020 Verizon Data Breach Investigation Report, more than 80% of data breaches due to passwords phishing and authentication systems’ security vulnerabilities [4]. Additionally, users will hold an increasing number of accounts with the average user memorizing 191 passwords, according to the LastPass report 2016.
Due to its advantages over traditional authentication methods, biometrics considered is a promising authentication method in the IoT era [5]. However, there are serious concerns about the security and privacy of the stored biometric template [6]. In the last decade, many researchers combined techniques from the areas of cryptography and error-correcting codes to secure the stored biometric template known as biometric template protection schemes [7–10]. However, error-correcting code is essential in the design of the traditional biometric template protection schemes, which degrade the security and performance of these schemes [11–13].
Currently, IoT systems rely on conventional cryptography algorithms based on integer factorization and discrete logarithm, for instance, Rivest–Shamir–Adleman (RSA) and elliptic curve cryptography (ECC). However, conventional cryptographic algorithms are no longer secure by upcoming quantum computing [14]. Furthermore, these conventional cryptographic algorithms are inadequate for IoT devices because of their complex computation requirements [2]. Therefore, post-quantum cryptography primitives are a promising technique for securing communications between IoT users and devices. Due to its predominant features, such as resistance to quantum attacks, performance efficiency, work in classical computing, lattice-based cryptography becomes ahead in the post-quantum techniques [15].
Recently, a post-quantum fuzzy commitment scheme (PQFC) [16] has been ensuring both security and accuracy efficiencies for biometric template protection. To tackle issues with IoT-enabled healthcare ecosystems, we propose a new lightweight two-factor user authentication protocol for the IoT-enabled healthcare ecosystem based on the security of PQFC scheme. The proposed protocol using biometrics and smartcard for authentication. The following are the main findings of the work:
A new lightweight two-factor user authentication protocol for the IoT-enabled healthcare ecosystem using a post-quantum fuzzy commitment scheme.
Formal theoretical analysis shows that the proposed protocol is secure against upcoming quantum threats using random oracle models.
Our protocol is quantum-safe protocol.
The biometric template safeguarded the biometric matching performed indirectly
Our protocol is a memoryless-based user authentication protocol.
Our protocol achieves important security and privacy properties, such as resistance to tampering and stolen of stored biometric template, stolen smart card, and privileged interior attacks.
Our protocol provides good functionality features, such as memoryless-effortless, user anonymity, mutual authentication, renewable biometric, and lightweight protocol.
The computational, communication, and storage costs of the proposed scheme are evaluated and compared with existing related protocols.
The security and performance analysis shows that the proposed protocol is suitable for application in an IoT-enabled healthcare environment in comparison with the other existing competitive protocols.
The rest of the paper is organized as follows: Sects. 2 and 3 contain related work and preliminaries, respectively. The biometric-based PQFC authentication system is described in Sect. 4. The presented lightweight two-factor authentication protocol for IoT-enabled healthcare and corresponding formal security analysis is presented in Sects. 5 and 6, respectively. Section 7 discusses the security and functionality analysis of the proposed protocol. The performance evaluation is done in Sect. 8. Section 9 presents the conclusions.
Related Work
Recently, many authentication protocols for secure communication between IoT users and devices in IoT environments have been proposed. Some of them use traditional public-key cryptography like Rivest–Shamir–Adleman (RSA) and elliptic curve cryptography (ECC). [17–19]. However, these protocols are inadequate for IoT devices because of their complex computation operations. Furthermore, these approaches are no longer secure by upcoming quantum computing [14]. There are also less efficient and secure authentication protocols [20–23], which are based on traditional biometric template protection. However, error-correcting code is essential in the design of these traditional biometric template protection schemes, which cause a downgrade of the security and performance of the system.
Lattice-based cryptography techniques attracted many researchers to secure applications in IoT environments due to their security and functionality efficiencies [15]. Of late, several authentication protocols for IoT sectors have been proposed in the literature. Nan et al. [24] proposed a lattice-based public-key encryption based on Needham and Schroeder scheme [25] and then used to construct a lightweight authentication protocol for smart city environment. They claimed their protocol is secure against different attacks using informal security analysis. The protocol was implemented in Contiki platform and evaluated using Cooja-based emulation environment and Texas Instruments CC2538 hardware platform. Cao et al. [26] presented an access authentication and data distribution scheme for the 5G narrowband Internet of Things systems. The security of their protocol is based on the lattice-based homomorphic encryption. To demonstrate the security of their protocol, they used BAN logic and Scyther tools. Zhou and Wang proposed an anonymous NTRU-based authentication scheme for mobile users in roaming service in ubiquitous networks [27]. Mukherjee et al. designed a lattice-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks [28]. They showed that their protocol ensures the message integrity, authentication and privacy preservation using ROM model.
Chaudhary et al. [29] proposed a lattice-based cryptosystem for smart healthcare in future smart cities. Then, they combined their cryptosystem with bilinear Diffie–Hellman to construct an authentication protocol for healthcare. However, the protocol is not lightweight because of using exponential operations and hence it’s not suitable for IoT applications. Sahu et al. [30] presented a lightweight multi-party authentication and key-establishment protocol in IoT-based e-Healthcare service access net-work using lattice identity-based encryption. They tested the security of their protocol using Scyther tool. Gupta et al. [31] presented a lattice-based authentication and access control protocol for IoT-based healthcare. The security assumption of their based on the hardness of the LWE problem. They measured the protocol’s performance in terms of storage requirement and computational and communication costs and then compared with the existing related protocols.
All the aforementioned authentication protocols for IoT environments are relying solely on the password, which is falling apart if the password is not kept secure. However, passwords can be easily shared, stolen, forgotten, or phishing. Therefore, the rapid development of emerging technologies such as IoT, cloud computing, blockchain, quantum computing, and e-services makes the current research on user authentication protocols based on post-quantum cryptography urgent.
Recently, a post-quantum fuzzy commitment scheme (PQFC) [16] guaranteeing the security and accuracy efficiencies for biometrics template protection. The author provides a theoretical and experimental analysis of PQFC scheme, showing that the PQFC scheme is a promising technique to provide secure and usable method for users in IoT-Enabled healthcare ecosystems.
Preliminaries
This section provides a mathematical preliminary which are essential for describing and analysis the proposed protocol.
Statistical Distance
Let and be two probability distributions over a common measurable sample space . Suppose further, the non-negative function is negligible if, for all polynomials we have that for sufficiently large . The statistical distance between and is given by:
1 |
Collision Resistance Hash Function
A function is called a collision resistant hash function [32] if the following properties hold: (1) compression: maps an input of arbitrary finite bit length to an output of fixed bit length . (2) easy to compute: Given and an input as , is easy to compute, (3) pre-image resistance: For all specified output , it is computationally infeasible to find any input such that , (4) collision resistant: it is computationally infeasible to find any two distinct inputs , and have the same hash valued, i.e., .
Lattice
Definition 1
A basis is defined as a set of linearly independent vectors of Euclidian vector space that spans the full space.
Definition 2
A lattice is a discrete additive subgroup of whose elements generated by the integer linear combinations of the basis .
2 |
lattice Computational Complexities
We now give definitions of well-known lattice computational problems used to construct lattice-based cryptography primitives.
LP1: Shortest Vector Problem (SVP): the shortest vector problem has three variants [33]:
P1) Find the length of the shortest nonzero vector in the lattice .
P2) Find the shortest nonzero vector such that .
P3) Find the basis in in which is the smallest possible up to a polynomial factor.
LP2: Approximation Shortest Vector Problem () Given a basis of the lattice of n- dimensional lattice , find a nonzero vector such that , for approximation factor taken as a polynomial of n [34].
LP3: Closet Vector Problem (CVP) [35]: Given a basis of the lattice of n- dimensional lattice and a vector u (not necessarily in the lattice), find a nonzero vector that close to u.
LP4: Short Integer Solution (SIS) [36]: Given a matrix whose columns are uniformly random vector in , find a nonzero vector .
LP5: Decisional Approximate SVP : Given a basis of an n- dimensional lattice and a number . In YES instance or No instance .
LP6: Shortest Independent Vectors Problem [36]: Given a basis of an n- dimensional lattice . The goal is to output a set of linearly independent lattice vectors of length at most .
LP7: Learn with Error (LWE) problem: We briefly describe the Learn with Error (LWE) that used to construct an efficient lattice-based cryptography. Regev [36] introduced a reduction from worst-case lattice problems such as GAPSVP and SIVP to a learning with error problems. The author proved that the solution to the LWE problem implies that there is a quantum algorithm to GAPSVP and SIVP.
LWE distribution: For some integer , let m, n = poly(k), and q (prime) are positive integers and let be a distribution on . The LWE distribution is sampled using the vector called secret and the matrix whose columns are vectors uniformly chosen random, , for i = 1,2,…,k, choosing e and the output is: for all i = 1,2,…,n.
The Biometric-Based PQFC Authentication System
In this section, we briefly describe the biometric-based PQFC authentication system [16], which is relies on the worst-case hardness shortest vector problem (SVP) of lattice cryptography. Let us now describe the construction of the biometric-based PQFC authentication system which consists of two main stages: enrollment and verification. The process of the system is described below:
Setup Stage
Positive integers m, n, and p (prime number) are chosen randomly. Then, generate the matrix whose columns are vectors in the lattice .
Enrollment Stage
First, the user chooses a vector randomly and generates a biometric reference template using a specific software. The vector and the template are input to the PQFC function to generate the biometric reference commitment :
3 |
where applies matrix multiplication modulo and applies vector addition modulo q and the result goes through modulo 2.
Verification stage
The user generates his/her biometric query template and then computes the biometric query commitment as follows:
4 |
The biometric query commitment is matched against the stored using, e.g., Hamming distance. If the matching score is within the system threshold, then the user is authenticated.
Lightweight Two-Factor User Authentication protocol for the IoT-Enabled Healthcare
The proposed protocol comprises four phases, namely the registration phase, the login phase, the authentication phase, and the biometric renewable phase. The protocol consists of three entities, namely (1) a user , which is for instance physician, nurse, pharmacologist, or patient’s family member, (2) a medical server MS, and (3) a patient . The must register and authenticate herself/himself with the medical server MS to access the patient’s medical data. It is worth noting that the patient’s medical data are collected and measured using smart devices implanted with the body of the patient. Then, these medical data transfer to the medical server MS. Details of the steps of these phases are described below.
Setup Phase
The main purpose of this phase is to generate the public parameter .; that is, MS takes a unary as input and executes the following steps:
S1: MS chooses a prime number and two positive integers and .
S2: MS generates randomly a matrix , which consists of linearly independent vector of the lattice And then chooses a cryptographic hash function .
S3: MS chooses randomly a master key vector and computes public key .
S4: MS publishes the public parameters of the system and keeping as a secret.
Registration Phase
When the user needs to register with the medical server MS, she/he performs the following steps:
R1: selects her/his unique identity .
R2: uses specific software to generate cryptographic key and generates a random number N, then computes .
- R3: presents her/his personal biometric data on biometric reader and the biometric reference template extracted such that . Then, chooses randomly and computes the following:
5 6 7 8 9 R4: sends the registration message to the medical server MS.
R5: MS computes and loads on smart card, then sends the smart card to the user .
R6: Upon receiving the smart card, the user stores the random number N and in her/his smart card.
Login Phase
Whenever the user wants to access the health profile of the patient , she/he must log in to the medical serer MS by performing the following steps:
L1: inserts her/his smart card into the card reader and keys her/his identity .
L2: The smart card sends the login message request to the medical server MS.
L3: Upon receiving the login request, the medical server MS computes and sends to the user via a public channel.
L4: Upon receiving , the user presents her/his biometric data on biometric reader and a biometric query template extracted. The smart card calculates and verifies .
L5: If the above biometrics verification fails, the session will be terminated; otherwise, the smart card extracts and computes , and then the smart card verifies .
L6: If the above key verification fails, the session will be terminated; otherwise, the smart card continued computing the following: , , , , , and .
L7: The smart card sends the message to the medical server for authentication.
Authentication Phase
When MS received the message , the medical server MS and the user perform the following steps to authenticate each other.
A1: MS computes and .
A2: MS checks the format of . If is valid, MS computes and verifies , if it does not hold, MS rejects the login request and terminates the session. Otherwise, MS accepts the user log in and stores in the database system to resist the reply and man-in-the-middle attacks.
A3: MS computes , , , then MS sends to the user .
A4: computes and verifies . If it does not hold, terminates the session. Otherwise, the medical server MS is authenticated by the user . Finally, the user and the medical server computes respectively, which is taken as the session key .
Biometric Revocation Phase
To re-register her/his same biometric , performs a biometric revocation phase as follows:
V1: inserts her/his smart card, keys identity , and presents her/his biometrics in the biometric reader, which generates a biometric template that will be used for a biometric verification approach as described in steps L2–L5 in the login phase. the cryptographic key is retrieved, and the user will generate a new cryptographic key .
V2: If this verification fails, the session will be terminated. Otherwise, the smart card computes , , , , ,, , and .
V3: Finally, , , , , and are stored in smart card.
Security Analysis
In this section, a formal security analysis of the proposed protocol is given using the random oracle model (ROM). Theorem 1 shows that the adversary can breaches the proposed protocol by learn the biometric reference template and the cryptographic key from only with negligible probability. Theorem 2 proves that the adversary is able to breach the proposal protocol if he/she is able to invert the one-way hash function. To this end, we simulate two random oracle model.
Quantum Random Oracle Model
This model specifies as a game that a probabilistic polynomial-time algorithm (possibly quantum) adversary plays with a challenger. The game works as follows:
The challenger takes unary and generates vectors and , and sends it to the adversary as input.
The adversary takes and as input to the function and is allowed to make queries to the challenger. The adversary outputs a value , which is sent to the challenger.
The challenger then looks at , , and the queries made by the adversary . Finally, the challenger outputs 1 or 0.
Classical Random Oracle Model
This model specifies as a game that a probabilistic polynomial-time algorithm adversary plays with a challenger. The game works as follows:
The challenger takes unary and generates a value and sends it to the adversary as its input.
The adversary takes as input to the hash function and is allowed to make queries to the challenger. The adversary then outputs a value , which it sends to the challenger.
The challenger then looks at and and the queries made by the adversary . Finally, the challenger outputs 1 or 0.
Theorem 1
Assume that and are two distributions of outputs of a probabilistic polynomial-time algorithm adversary . The first distribution for the oracle of chosen matrix and the second distribution is taken over the true oracles with quantum oracle queries. Then, the distributions and are statistically close (at most ).
Proof of Theorem 1
Let be a random oracle, and are two random oracle distributions taken over sample space , which are the output of possible quantum adversary .
For and being positive integers , which are polynomial of the security parameter , let be a prime number. For and chosen randomly, we define the statistical distance between the two distributions as follows:
10 |
where and .
Fix such that for some , and then the following probability can be computed as follows:
11 |
where is the set of all preimages of the function . We defined the size of as the number of quantum queries .
Now, we are computing the probability of the distribution:
12 |
Then, we are ready to estimate the probability between the two distributions. □
Theorem 2
Suppose that for , , and are generated randomly. If a probabilistic polynomial-time algorithm (classical) adversary breaches the security of the proposed protocol, then the adversary is able to invert the one-way hash function on a random input in polynomial time with a non-negligible probability
Proof of Theorem 2
Assume that runs a random oracle algorithm to retrieve user cryptographic key from the one-way hash function with a number of queries . We define the adversary advantages as the probability . This advantage is determined by the number of queries for the classical random oracle model. Then, the advantage probability is computed as follows:
□
Security and Functionality Features
In this section, we discuss the security and functionality features of our proposed protocol and compare with the related lattice-based authentication protocols [28, 29, 31] as shown in Table 1.
F1: Quantum attack resistant: The IoT is encountering security and privacy threats. However, with quantum computing, these security and privacy threats will increase more and more. The security of the proposed protocol is based on PQFC scheme, which is provable secure against quantum attacks.
F2: Tampering with stored biometric templates attack: This property applies when an attacker gets access to the system database or the token, temporarily or permanently cannot modify the template in the system database/token to gain server authentication. In the proposed protocol, the attacker needs to break the SVP problem to obtain the biometric reference template.
F3: Biometric template thefts resistant: This property applies to an attacker that gets access to the database system or token and obtain the user’s biometric template; she/he can use it for other purposes. In our protocol, the user’s biometric template is protected using PQFC scheme. Hence, there is no clear stored template to be stolen.
F4: Privileged insider attack resistant: Insider attacker with privileged access to the database server can pose a serious threat to the server database. One of the breaches can lead to stealing/tampering with the stored biometric templates in the database. The proposed protocol offers an opportunity for the user to hide her/his biometric template from privileged insiders in the registration phase by allowing her/him to send it to authentication server in encrypted format, which will prevent an inside attacker from getting it.
F5: Smart card/token attack resistant: Assume that the user’s smart card is lost or stolen. An attacker having the smart card has no way to obtain secret information stored in the smartcard. If the attacker retrieves the information , the attacker has to find by solving lattice SVP problem to gain information, which is contradiction to shortest vector problem (SVP).
F6: Man-in-the-Middle attack resistant: In the man-in-the-middle attack, the attacker sits in the middle and negotiates the cryptographic parameters with the user and server to gain access as a legitimate. In the registration phase of the proposed protocol, the user sends request to the authentication server. The server replies by sending the message including the matrix ; assume the man-in-the-middle attacker intercepts the server message and replaces the matrix by ; the user will compute and send to the server. Then, the man-in-the-middle attacker cannot learn the biometric template from , only if she/he solves the LWE lattice problem.
F7: Renewable biometric template: Unlike passwords, biometrics are limited and once it compromised cannot be revoked. A biometric is the principle means of authentication in our protocol. If the biometric template is compromised by any attacks, it can be used again with new registration parameters.
F8: Memoryless-effortless: An authentication protocol that does not require any users to remember any secret per service called memoryless-effortless. By this definition, the proposed authentication protocol is memoryless-effortless
F9: User anonymity: An important security property of authentication protocol for IoT applications is the confidentiality of the user’s identity. It is desirable to keep user’s identity hiding from attackers. In the proposed protocol, the plaintext user's identity is neither stored in the user's smart card nor sent in the login and authentication messages over secure or insecure channels. If the attacker is able to retrieve the values and from the user's smart card, it is obvious that an attacker is determining which is equivalent to find the collision in the hash function .
F10: Lightweight: A protocol with less computational and communication complexities is called a lightweight protocol.
Table 1.
Comparisons of security and functionality features of the proposed protocol with the related protocols
Protocol | Security and functionality features | |||||||||
---|---|---|---|---|---|---|---|---|---|---|
F1 | F2 | F3 | F4 | F5 | F6 | F7 | F8 | F9 | F10 | |
[29] | ■ | ▬ | ▬ | □ | ▬ | ■ | ▬ | □ | □ | □ |
[28] | ■ | ▬ | ▬ | □ | ▬ | ■ | ▬ | □ | □ | ■ |
[31] | ■ | ▬ | ▬ | ■ | ■ | ■ | ▬ | □ | □ | ■ |
Our protocol | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
■: Satisfied, □: Not satisfied, ▬: Not elaborated
Performance Analysis
In this section, we evaluate the performance of our protocol based on the following metrics: the storage requirements, communication costs, and computational complexities. Furthermore, we have compared the proposed protocol with the recent related protocols for IoT systems [28, 31]. Table 2 shows the computational costs comparison between the proposed protocol and the protocols in [28, 31]. Let , , , and denote the operation time required to execute the matrix multiplication modulo , vector multiplication modulo , vector addition modulo , and one-way hash function, respectively. The total computational time cost of our protocol is . Furthermore, we have estimated the execution time of the above mentioned operations as , , , and . The tasks are executed using MATLAB 2020b on PC workstation with Intel(R) Core(TM) i7-10,700 CPU @ 2.90 GHz 2.90 GHz RAM 16.0 GB. Thus, the total execution time for the proposed protocol is 20.0437 ms.
Table 2.
Comparisons of computational costs of our protocol with the related protocols
For computational complexity comparison, we followed the parameters reported in [31] as follows: assume that , and . The computational complexity for the operations: matrix multiplication modulo , vector multiplication modulo , and vector addition modulo is , , and , respectively. Thus, the total computational complexity of the proposed protocol is . Table 3 shows the comparison result of our protocol with the related protocols.
Table 3.
Comparisons of computational complexities of our protocol with the related protocols
Furthermore, the storage requirement and the communication cost comparisons between the proposed protocol and the related protocols [28, 31] are evaluated and shown in Table 4. In the evaluation, we consider the login and authentication phases in the comparison. Note that the registration phase is not performed frequently. In all protocols, we assume the length of the identity, output size of the hash function, and number in are . Thus, the total communication cost of our protocol sending messages , , and is . The storage requirements of our protocol and the related protocols [28, 31] are computed. The total storage cost for storing master key , matrix , public key , and seven hash value is .
Table 4.
Comparisons of storage and communication costs of our protocol with the related protocols
Conclusion
This paper proposed a new lightweight two-factor-based user authentication protocol for the IoT-enabled healthcare ecosystem. We evaluated the security of the proposed protocol through the formal security analysis using random oracle model (ROM), showing that our protocol is secure against today and upcoming quantum attacks. The proposed protocol achieved the following functionality and security properties: memoryless-effortless, user anonymity, mutual authentication, and resistance to tampering and stolen of biometric template, stolen smart card, privileged interior attacks.
The proposed protocol was evaluated in terms of the performance metrics: storage requirement, computation and communication. The results demonstrated that our protocol is more efficient than Mukherjee et al., Chaudhary et al., and Gupta et al. protocols. The overhead of the computational costs of our protocol becomes larger naturally since the proposed protocol exploits these computations to provide several significant security and functionality properties.
The overall performance demonstrates that the proposed protocol is suitable for the Internet of Things applications.
Acknowledgements
The authors thank King Fahd University of Petroleum & Minerals for providing facilities for this research.
Funding
This work is a part of the project supported by the King Fahd University of Petroleum and Minerals under Grant SR191031.
Declarations
Conflict of interest
The authors declare no conflict of interest.
References
- 1.Alsubaei, F., Abuhussein, A., Shiva, S.: A framework for ranking IoMT solutions based on measuring security and privacy. In: Advances in Intelligent Systems and Computing (2019)
- 2.Sun Y, Lo FPW, Lo B. Security and privacy for the internet of medical things enabled healthcare systems: a survey. IEEE Access. 2019 doi: 10.1109/ACCESS.2019.2960617. [DOI] [Google Scholar]
- 3.Yang W, Wang S, Zheng G, Yang J, Valli C. A privacy-preserving lightweight biometric system for internet of things security. IEEE Commun. Mag. 2019 doi: 10.1109/MCOM.2019.1800378. [DOI] [Google Scholar]
- 4.Campbell M. Putting the Passe into passwords: how passwordless technologies are reshaping digital identity. Computer (Long. Beach. Calif) 2020 doi: 10.1109/MC.2020.2997278. [DOI] [Google Scholar]
- 5.Karimian, N., Wortman, P.A., Tehranipoor, F.: Evolving authentication design considerations for the Internet of biometric things (IoBT). In: 2016 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2016 (2016)
- 6.Riaz N, Riaz A, Khan SA. Biometric template security: an overview. Sens. Rev. 2018;38(1):120–127. doi: 10.1108/SR-07-2017-0131. [DOI] [Google Scholar]
- 7.Al-Saggaf AA. Secure method for combining cryptography with Iris biometrics. J. Univers. Comput. Sci. 2018;24(4):341–356. [Google Scholar]
- 8.Hao F, Anderson R, Daugman J. Combining crypto with biometrics effectively. IEEE Trans. Comput. 2006 doi: 10.1109/TC.2006.138. [DOI] [Google Scholar]
- 9.Christian R, Andreas U. A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Secur. 2011;2011(3):1–25. doi: 10.1186/1687-417X-2011-3. [DOI] [Google Scholar]
- 10.Juels, A., Wattenberg, M.: Fuzzy commitment scheme. In: Proceedings of the ACM Conference on Computer and Communications Security (1999)
- 11.Rathgeb C, Uhl A. Statistical attack against fuzzy commitment scheme. IET Biom. 2012 doi: 10.1049/iet-bmt.2011.0001. [DOI] [Google Scholar]
- 12.Ignatenko T, Willems FMJ. Information leakage in fuzzy commitment schemes. IEEE Trans. Inf. Forensics Secur. 2010 doi: 10.1109/TIFS.2010.2046984. [DOI] [Google Scholar]
- 13.Tams, B.: Decodability attack against the fuzzy commitment scheme with public feature transforms. 1–19 (2014)
- 14.Shor, P.W.: Polynomial time algorithms for discrete logarithms and factoring on a quantum computer. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (1994)
- 15.Asif R. Post-quantum cryptosystems for internet-of-things: a survey on lattice-based algorithms. IoT. 2021 doi: 10.3390/iot2010005. [DOI] [Google Scholar]
- 16.Al-Saggaf AA. A post-quantum fuzzy commitment scheme for biometric template protection: an experimental study. IEEE Access. 2021 doi: 10.1109/ACCESS.2021.3100981. [DOI] [Google Scholar]
- 17.Mumtaz, M., Akram, J., Ping, L.: An RSA based authentication system for smart IoT environment. In: Proceedings—21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019 (2019)
- 18.Xu G, Qiu S, Ahmad H, Xu G, Guo Y, Zhang M, Xu H. A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography. Sensors (Switzerland) 2018 doi: 10.3390/s18072394. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 19.Soni P, Pal AK, Islam SH. An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system. Comput. Methods Programs Biomed. 2019 doi: 10.1016/j.cmpb.2019.105054. [DOI] [PubMed] [Google Scholar]
- 20.Ayub MF, Mahmood K, Kumari S, Sangaiah AK. Lightweight authentication protocol for e-health clouds in IoT based applications through 5G technology. Digit. Commun. Netw. 2020 doi: 10.1016/j.dcan.2020.06.003. [DOI] [Google Scholar]
- 21.Rehman HU, Ghani A, Chaudhry SA, et al. A secure and improved multi server authentication protocol using fuzzy commitment. Multimed. Tools Appl. 2021;80:16907–16931. doi: 10.1007/s11042-020-09078-z. [DOI] [Google Scholar]
- 22.Mohammed AJ, Yassin AA. Efficient and flexible multi-factor authentication protocol based on fuzzy extractor of administrator’s fingerprint and smart mobile device. Cryptography. 2019 doi: 10.3390/cryptography3030024. [DOI] [Google Scholar]
- 23.Taher BH, Jiang S, Yassin AA, Lu H. Low-overhead remote user authentication protocol for IoT based on a fuzzy extractor and feature extraction. IEEE Access. 2019;7:256. doi: 10.1109/ACCESS.2019.2946400. [DOI] [Google Scholar]
- 24.Li N, Liu D, Nepal S. Lightweight mutual authentication for IoT and its applications. IEEE Trans. Sustain. Comput. 2017 doi: 10.1109/TSUSC.2017.2716953. [DOI] [Google Scholar]
- 25.Needham RM, Schroeder MD. Using encryption for authentication in large networks of computers. Commun. ACM. 1978 doi: 10.1145/359657.359659. [DOI] [Google Scholar]
- 26.Cao J, Yu P, Xiang X, Ma M, Li H. Anti-quantum fast authentication and data transmission scheme for massive devices in 5G NB-IoT system. IEEE Internet Things J. 2019 doi: 10.1109/JIOT.2019.2931724. [DOI] [Google Scholar]
- 27.Zhou Y, Wang L. A lattice-based authentication scheme for roaming service in ubiquitous networks with anonymity. Secur. Commun. Netw. 2020 doi: 10.1155/2020/2637916. [DOI] [Google Scholar]
- 28.Mukherjee S, Gupta DS, Biswas GP. An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice. Computing. 2019 doi: 10.1007/s00607-018-0689-3. [DOI] [Google Scholar]
- 29.Chaudhary R, Jindal A, Aujla GS, Kumar N, Das AK, Saxena N. LSCSH: lattice-based secure cryptosystem for smart healthcare in smart cities environment. IEEE Commun. Mag. 2018 doi: 10.1109/MCOM.2018.1700787. [DOI] [Google Scholar]
- 30.Sahu AK, Sharma S, Puthal D. Lightweight multi-party authentication and key-agreement protocol in IoT based e-healthcare service. ACM Trans. Multimed. Comput. Commun. Appl. 2020 doi: 10.1145/3398039. [DOI] [Google Scholar]
- 31.Gupta DS, Islam SH, Obaidat MS, Karati A, Sadoun B. LAAC: lightweight lattice-based authentication and access control Protocol for E-health systems in IoT environments. IEEE Syst. J. 2020 doi: 10.1109/jsyst.2020.3016065. [DOI] [Google Scholar]
- 32.Dang Q. Changes in federal information processing standard (FIPS) 180–4, secure hash standard. Cryptologia. 2013 doi: 10.1080/01611194.2012.687431. [DOI] [Google Scholar]
- 33.Ajtai, M.: Generating hard instances of lattice problems. In: Proceedings of the Annual ACM Symposium on Theory of Computing (1996)
- 34.Peikert C. A decade of lattice cryptography. Found. Trends Theor. Comput. Sci. 2016 doi: 10.1561/0400000074. [DOI] [Google Scholar]
- 35.Micciancio, D., Regev, O.: Lattice-based cryptography. In: Post-Quantum Cryptography (2009)
- 36.Regev O. On lattices, learning with errors, random linear codes, and cryptography. J. ACM. 2009 doi: 10.1145/1568318.1568324. [DOI] [Google Scholar]