Skip to main content
Springer Nature - PMC COVID-19 Collection logoLink to Springer Nature - PMC COVID-19 Collection
. 2022 Sep 22;48(2):2347–2357. doi: 10.1007/s13369-022-07235-0

Lightweight Two-Factor-Based User Authentication Protocol for IoT-Enabled Healthcare Ecosystem in Quantum Computing

Alawi A Al-saggaf 1,, Tarek Sheltami 2, Hoda Alkhzaimi 3, Gamil Ahmed 2
PMCID: PMC9493171  PMID: 36164325

Abstract

The healthcare ecosystem is migrating from legacy systems to the Internet of Things (IoT), resulting in a digital environment. This transformation has increased importance on demanding both secure and usable user authentication methods. Recently, a post-quantum fuzzy commitment scheme (PQFC) has been constructed as a reliable and efficient method of biometric template protection. This paper presents a new two-factor-based user authentication protocol for the IoT-enabled healthcare ecosystem in post-quantum computing environments using the PQFC scheme. The proposed protocol is proved to be secure using random oracle model. Furthermore, the functionality and security of the proposed protocol are analyzed, showing that memoryless-effortless, user anonymity, mutual authentication, and resistance to biometric templates tampering and stolen attacks, stolen smart card attack, privileged interior attack are fulfilled. The costs of storage requirement, computation, communication and storage are estimated. The results demonstrate that the proposed protocol is more efficient than Mukherjee et al., Chaudhary et al., and Gupta et al. protocols.

Keywords: Internet of Things, IoT-enabled healthcare, Post-quantum cryptography, User authentication, Biometric, Lightweight authentication protocols

Introduction

The healthcare ecosystem is undergoing modernization is known as a digital transformation. The Internet of Things (IoT) offers many benefits for the healthcare sector. The IoT-enabled healthcare makes healthcare practical for an aging population, chronic diseases, automate patient care, health records assortment and analysis. The IoT-enabled healthcare provided a better environment for both physician and patient during the outbreak of COVID-19. The IoT-enabled healthcare ecosystem refers to the interconnection of smart devices and applications via the Internet. The IoT-enabled healthcare ecosystem enables the collection, monitoring, and analyzing patients’ condition measurements, remotely [1, 2]. Figure 1 illustrates a typical IoT-enabled healthcare ecosystem, where a remote user (for instance, physicians and patient family) collect and monitor the patient’s biomedical conditions for further processing. The wearable or implantable IoT medical devices are deployed in the patient's body, which is measures and collects the patient biomedical conditions. These biomedical conditions transfer to a smartphone connected to the IoT medical devices via an app. Then, the smartphone sends the biomedical conditions to the healthcare server for further analysis and decision.

Fig. 1.

Fig. 1

A typical IoT-enabled healthcare ecosystem architecture

Unlike the social and fiscal identities, the heath records such as genetic, conditions, or biometrics data cannot be revoked once it is compromised. The most significant threats that IoT-enabled healthcare poses are data security and privacy. Cybercriminals can misuse the patient’s health records to claim in the patient’s name, for instance, create fake IDs to buy drugs and medical equipment or file fraudulent Insurance. The IoT-enabled healthcare security is mainly for secure health records, communication, and user authentication. User authentication is a keystone in IoT-enabled healthcare security, which plays a crucial role in establishing trust between IoT healthcare users and devices and preventing attacks [3].

Nowadays, knowledge-based authentication such as passwords and PINs plays a central role in IoT-based healthcare. With the exponential increase in using online services based on the traditional authentication method such as passwords, passwords become not only frustrating for users but also costly to maintain. According to the 2020 Verizon Data Breach Investigation Report, more than 80% of data breaches due to passwords phishing and authentication systems’ security vulnerabilities [4]. Additionally, users will hold an increasing number of accounts with the average user memorizing 191 passwords, according to the LastPass report 2016.

Due to its advantages over traditional authentication methods, biometrics considered is a promising authentication method in the IoT era [5]. However, there are serious concerns about the security and privacy of the stored biometric template [6]. In the last decade, many researchers combined techniques from the areas of cryptography and error-correcting codes to secure the stored biometric template known as biometric template protection schemes [710]. However, error-correcting code is essential in the design of the traditional biometric template protection schemes, which degrade the security and performance of these schemes [1113].

Currently, IoT systems rely on conventional cryptography algorithms based on integer factorization and discrete logarithm, for instance, Rivest–Shamir–Adleman (RSA) and elliptic curve cryptography (ECC). However, conventional cryptographic algorithms are no longer secure by upcoming quantum computing [14]. Furthermore, these conventional cryptographic algorithms are inadequate for IoT devices because of their complex computation requirements [2]. Therefore, post-quantum cryptography primitives are a promising technique for securing communications between IoT users and devices. Due to its predominant features, such as resistance to quantum attacks, performance efficiency, work in classical computing, lattice-based cryptography becomes ahead in the post-quantum techniques [15].

Recently, a post-quantum fuzzy commitment scheme (PQFC) [16] has been ensuring both security and accuracy efficiencies for biometric template protection. To tackle issues with IoT-enabled healthcare ecosystems, we propose a new lightweight two-factor user authentication protocol for the IoT-enabled healthcare ecosystem based on the security of PQFC scheme. The proposed protocol using biometrics and smartcard for authentication. The following are the main findings of the work:

  1. A new lightweight two-factor user authentication protocol for the IoT-enabled healthcare ecosystem using a post-quantum fuzzy commitment scheme.

  2. Formal theoretical analysis shows that the proposed protocol is secure against upcoming quantum threats using random oracle models.

  3. Our protocol is quantum-safe protocol.

  4. The biometric template safeguarded the biometric matching performed indirectly

  5. Our protocol is a memoryless-based user authentication protocol.

  6. Our protocol achieves important security and privacy properties, such as resistance to tampering and stolen of stored biometric template, stolen smart card, and privileged interior attacks.

  7. Our protocol provides good functionality features, such as memoryless-effortless, user anonymity, mutual authentication, renewable biometric, and lightweight protocol.

  8. The computational, communication, and storage costs of the proposed scheme are evaluated and compared with existing related protocols.

  9. The security and performance analysis shows that the proposed protocol is suitable for application in an IoT-enabled healthcare environment in comparison with the other existing competitive protocols.

The rest of the paper is organized as follows: Sects. 2 and 3 contain related work and preliminaries, respectively. The biometric-based PQFC authentication system is described in Sect. 4. The presented lightweight two-factor authentication protocol for IoT-enabled healthcare and corresponding formal security analysis is presented in Sects. 5 and 6, respectively. Section 7 discusses the security and functionality analysis of the proposed protocol. The performance evaluation is done in Sect. 8. Section 9 presents the conclusions.

Related Work

Recently, many authentication protocols for secure communication between IoT users and devices in IoT environments have been proposed. Some of them use traditional public-key cryptography like Rivest–Shamir–Adleman (RSA) and elliptic curve cryptography (ECC). [1719]. However, these protocols are inadequate for IoT devices because of their complex computation operations. Furthermore, these approaches are no longer secure by upcoming quantum computing [14]. There are also less efficient and secure authentication protocols [2023], which are based on traditional biometric template protection. However, error-correcting code is essential in the design of these traditional biometric template protection schemes, which cause a downgrade of the security and performance of the system.

Lattice-based cryptography techniques attracted many researchers to secure applications in IoT environments due to their security and functionality efficiencies [15]. Of late, several authentication protocols for IoT sectors have been proposed in the literature. Nan et al. [24] proposed a lattice-based public-key encryption based on Needham and Schroeder scheme [25] and then used to construct a lightweight authentication protocol for smart city environment. They claimed their protocol is secure against different attacks using informal security analysis. The protocol was implemented in Contiki platform and evaluated using Cooja-based emulation environment and Texas Instruments CC2538 hardware platform. Cao et al. [26] presented an access authentication and data distribution scheme for the 5G narrowband Internet of Things systems. The security of their protocol is based on the lattice-based homomorphic encryption. To demonstrate the security of their protocol, they used BAN logic and Scyther tools. Zhou and Wang proposed an anonymous NTRU-based authentication scheme for mobile users in roaming service in ubiquitous networks [27]. Mukherjee et al. designed a lattice-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks [28]. They showed that their protocol ensures the message integrity, authentication and privacy preservation using ROM model.

Chaudhary et al. [29] proposed a lattice-based cryptosystem for smart healthcare in future smart cities. Then, they combined their cryptosystem with bilinear Diffie–Hellman to construct an authentication protocol for healthcare. However, the protocol is not lightweight because of using exponential operations and hence it’s not suitable for IoT applications. Sahu et al. [30] presented a lightweight multi-party authentication and key-establishment protocol in IoT-based e-Healthcare service access net-work using lattice identity-based encryption. They tested the security of their protocol using Scyther tool. Gupta et al. [31] presented a lattice-based authentication and access control protocol for IoT-based healthcare. The security assumption of their based on the hardness of the LWE problem. They measured the protocol’s performance in terms of storage requirement and computational and communication costs and then compared with the existing related protocols.

All the aforementioned authentication protocols for IoT environments are relying solely on the password, which is falling apart if the password is not kept secure. However, passwords can be easily shared, stolen, forgotten, or phishing. Therefore, the rapid development of emerging technologies such as IoT, cloud computing, blockchain, quantum computing, and e-services makes the current research on user authentication protocols based on post-quantum cryptography urgent.

Recently, a post-quantum fuzzy commitment scheme (PQFC) [16] guaranteeing the security and accuracy efficiencies for biometrics template protection. The author provides a theoretical and experimental analysis of PQFC scheme, showing that the PQFC scheme is a promising technique to provide secure and usable method for users in IoT-Enabled healthcare ecosystems.

Preliminaries

This section provides a mathematical preliminary which are essential for describing and analysis the proposed protocol.

Statistical Distance

Let D1 and D2 be two probability distributions over a common measurable sample space Ω. Suppose further, the non-negative function ε=εk is negligible if, for all polynomials pk we have that εk<pk-1 for sufficiently large k. The statistical distance SD between D1 and D2 is given by:

SDD1,D2=xΩPrD1-PrD2=ε 1

Collision Resistance Hash Function

A function h:0,10,1k is called a collision resistant hash function [32] if the following properties hold: (1) compression: h maps an input x of arbitrary finite bit length to an output hx of fixed bit length k. (2) easy to compute: Given h and an input as x, hx is easy to compute, (3) pre-image resistance: For all specified output y, it is computationally infeasible to find any input x such that hx=y, (4) collision resistant: it is computationally infeasible to find any two distinct inputs x, and x have the same hash valued, i.e., hx=hx.

Lattice

Definition 1

A basis is defined as a set of linearly independent vectors B=b1,b2,..,bn of Euclidian vector space Rn that spans the full space.

Definition 2

A lattice L is a discrete additive subgroup of Rn whose elements generated by the integer linear combinations of the basis B=b1,b2,..,bn.

LB:=vi=i=1nzibi:ziZ 2

lattice Computational Complexities

We now give definitions of well-known lattice computational problems used to construct lattice-based cryptography primitives.

  • LP1: Shortest Vector Problem (SVP): the shortest vector problem has three variants [33]:

  • P1) Find the length of the shortest nonzero vector in the lattice LB.

  • P2) Find the shortest nonzero vector vLB such that vλL.

  • P3) Find the basis B=b1,b2,..,bn in L in which maxibi is the smallest possible up to a polynomial factor.

  • LP2: Approximation Shortest Vector Problem (SVPγ) Given a basis B of the lattice of n- dimensional lattice L=LB, find a nonzero vector vL such that v=γn.λL, for approximation factor γ1 taken as a polynomial of n [34].

  • LP3: Closet Vector Problem (CVP) [35]: Given a basis B of the lattice of n- dimensional lattice L=LB and a vector u (not necessarily in the lattice), find a nonzero vector vL that close to u.

  • LP4: Short Integer Solution (SIS) [36]: Given a matrix AZqm×n whose columns are uniformly random vector in Zqn, find a nonzero vector wΛqA.

  • LP5: Decisional Approximate SVP GAPSVPγ: Given a basis B of an n- dimensional lattice L=LB and a number d. In YES instance λLd or No instance λL>γn.d.

  • LP6: Shortest Independent Vectors Problem SIVPγ [36]: Given a basis B of an n- dimensional lattice L=LB. The goal is to output a set of n linearly independent lattice vectors of length at most γn.λL.

  • LP7: Learn with Error (LWE) problem: We briefly describe the Learn with Error (LWE) that used to construct an efficient lattice-based cryptography. Regev [36] introduced a reduction from worst-case lattice problems such as GAPSVP and SIVP to a learning with error problems. The author proved that the solution to the LWE problem implies that there is a quantum algorithm to GAPSVP and SIVP.

LWE distribution: For some integer k1, let m, n = poly(k), and q (prime) are positive integers and let X be a distribution on Zq. The LWE distribution As,biZqn×Zq is sampled using the vector sZqn called secret and the matrix AZqm×n whose columns are vectors uniformly chosen random, aiRUZqn, for i = 1,2,…,k, choosing e Zqn and the output is: bi=ai,s+eiZq for all i = 1,2,…,n.

The Biometric-Based PQFC Authentication System

In this section, we briefly describe the biometric-based PQFC authentication system [16], which is relies on the worst-case hardness shortest vector problem (SVP) of lattice cryptography. Let us now describe the construction of the biometric-based PQFC authentication system which consists of two main stages: enrollment and verification. The process of the system is described below:

Setup Stage

Positive integers m, n, and p (prime number) are chosen randomly. Then, generate the matrix AZqm×n whose columns are vectors in the lattice LB.

Enrollment Stage

First, the user chooses a vector randomly vZpn and generates a biometric reference template xrZ2m using a specific software. The vector v and the template xr are input to the PQFC function to generate the biometric reference commitment βr:

βr=Fv,u=A×qv+q,2ur, 3

where ×q applies matrix multiplication modulo q and +q,2 applies vector addition modulo q and the result goes through modulo 2.

Verification stage

The user generates his/her biometric query template xqZ2m and then computes the biometric query commitment βq as follows:

βq=Fv,u=A×qv+q,2xq 4

The biometric query commitment βq is matched against the stored βr using, e.g., Hamming distance. If the matching score is within the system threshold, then the user is authenticated.

Lightweight Two-Factor User Authentication protocol for the IoT-Enabled Healthcare

The proposed protocol comprises four phases, namely the registration phase, the login phase, the authentication phase, and the biometric renewable phase. The protocol consists of three entities, namely (1) a user Ui, which is for instance physician, nurse, pharmacologist, or patient’s family member, (2) a medical server MS, and (3) a patient Pj. The Ui must register and authenticate herself/himself with the medical server MS to access the patient’s medical data. It is worth noting that the patient’s medical data are collected and measured using smart devices implanted with the body of the patient. Then, these medical data transfer to the medical server MS. Details of the steps of these phases are described below.

Setup Phase

The main purpose of this phase is to generate the public parameter .; that is, MS takes a unary 1k as input and executes the following steps:

  • S1: MS chooses a prime number p and two positive integers m and n.

  • S2: MS generates randomly a matrix AZpm×n, which consists of n- linearly independent vector of the lattice Λp And then chooses a cryptographic hash function h:0,10,1k.

  • S3: MS chooses randomly a master key vector mkZp1×n and computes public key pk=A.mkTmodpZp1×m.

  • S4: MS publishes the public parameters of the system =m,n,p,A,pk,h· and keeping mk as a secret.

Registration Phase

When the user Ui needs to register with the medical server MS, she/he performs the following steps:

  • R1:Ui selects her/his unique identity Di.

  • R2:Ui uses specific software to generate cryptographic key kiZ2l and generates a random number N, then computes ci=h(ki||N).

  • R3:Ui presents her/his personal biometric data Bi on biometric reader and the biometric reference template xrZ2t extracted such that m=t+l. Then, Ui chooses randomly viZpn and computes the following:
    βr=A×qvi+q,2(xr||ki), 5
    ri=hci||βi, 6
    wi=A×qvi, 7
    Zi=wi×qpkT, 8
    δi=hwih(IDi||ri) 9
  • R4: Ui sends the registration message IDi,ri,Zi,δi to the medical server MS.

  • R5: MS computes ei=h(IDi||mk)ri and loads ri,Zi,δi,ei,s on Uis smart card, then sends the smart card to the user Ui.

  • R6: Upon receiving the smart card, the user stores the random number N and βr in her/his smart card.

Login Phase

Whenever the user Ui wants to access the health profile of the patient Pj, she/he must log in to the medical serer MS by performing the following steps:

  • L1: Ui inserts her/his smart card into the card reader and keys her/his identity IDi.

  • L2: The smart card sends the login message request Zi,δi,ri to the medical server MS.

  • L3: Upon receiving the login request, the medical server MS computes wi=Zi·A·mkTmodp and sends wi to the user Ui via a public channel.

  • L4: Upon receiving wi, the user Ui presents her/his biometric data Bi on biometric reader and a biometric query template xq extracted. The smart card calculates βq=wi+q,2(xq||0) and verifies distβq,βrdth.

  • L5: If the above biometrics verification fails, the session will be terminated; otherwise, the smart card extracts ki=βrβq and computes ri=hh(ki||N)||βq, and then the smart card verifies ri=ri.

  • L6: If the above key verification fails, the session will be terminated; otherwise, the smart card continued computing the following: θ1=eiri, θ2=θ1Ru, θ3=h(s||Ru), θ4=ciθ3, θ5=hθ2||θ3||θ4, and θ6=θ3IDi.

  • L7: The smart card sends the message θ1,θ2,θ4,θ5,θ6 to the medical server for authentication.

Authentication Phase

When MS received the message θ1,θ2,θ4,θ5,θ6, the medical server MS and the user Ui perform the following steps to authenticate each other.

  • A1: MS computes θ7=θ2θ1 and IDi=θ6h(s||θ1θ2).

  • A2: MS checks the format of IDi. If IDi is valid, MS computes and verifies θ5=h(θ2||θ8||θ4), if it does not hold, MS rejects the login request and terminates the session. Otherwise, MS accepts the user Ui log in and stores IDi,θ7 in the database system to resist the reply and man-in-the-middle attacks.

  • A3: MS computes θ9=θ4θ8, θ10=hθ9IDssθ8Rs, θ11=h(θ1||θ9sRs), then MS sends θ10,θ11 to the user Ui.

  • A4: Ui computes θ12=hciIDssRu and verifies θ11=h(θ1||cssθ12). If it does not hold, Ui terminates the session. Otherwise, the medical server MS is authenticated by the user Ui. Finally, the user and the medical server computes h(ciθ3θ12||IDs)=Ksess=h(θ9θ8Rs||IDs) respectively, which is taken as the session key Ksess.

Biometric Revocation Phase

To re-register her/his same biometric Bi,Ui performs a biometric revocation phase as follows:

  • V1: Ui inserts her/his smart card, keys identity IDi, and presents her/his biometrics Bi in the biometric reader, which generates a biometric template xrnew that will be used for a biometric verification approach as described in steps L2–L5 in the login phase. the cryptographic key ki is retrieved, and the user will generate a new cryptographic key kinew.

  • V2: If this verification fails, the session will be terminated. Otherwise, the smart card computes ei=eiri, βrnew=AT×qvinew+q,2(xrnew||kinew), cinew=h(kinew||N), rinew=hcinew||βrnew, einew=eirinew,winew=AT×qvinew, Zinew=pk×qwinew, and δinew=hwinewh(IDi||rinew).

  • V3: Finally, einew, rinew, βrnew, Zinew, and δinew are stored in Ui smart card.

Security Analysis

In this section, a formal security analysis of the proposed protocol is given using the random oracle model (ROM). Theorem 1 shows that the adversary AQ can breaches the proposed protocol by learn the biometric reference template xr and the cryptographic key ki from Fi only with negligible probability. Theorem 2 proves that the adversary AC is able to breach the proposal protocol if he/she is able to invert the one-way hash function. To this end, we simulate two random oracle model.

Quantum Random Oracle Model

This model specifies as a game that a probabilistic polynomial-time algorithm (possibly quantum) AQ adversary plays with a challenger. The game works as follows:

The challenger takes unary 1k and generates vectors vZpm and xZ2n, and sends it to the adversary AQ as input.

The adversary AQ takes v and x as input to the function Fv,x and is allowed to make queries qF to the challenger. The adversary outputs a value F, which is sent to the challenger.

The challenger then looks at v,x, F, and the queries qF made by the adversary AQ. Finally, the challenger outputs 1 or 0.

Classical Random Oracle Model

This model specifies as a game that a probabilistic polynomial-time algorithm AC adversary plays with a challenger. The game works as follows:

The challenger takes unary 1k and generates a value x and sends it to the adversary AC as its input.

The adversary AC takes x as input to the hash function h. and is allowed to make queries qh to the challenger. The adversary then outputs a value y, which it sends to the challenger.

The challenger then looks at x and y and the queries qh made by the adversary AC. Finally, the challenger outputs 1 or 0.

Theorem 1

Assume that DRA,. and DR. are two distributions of outputs of a probabilistic polynomial-time algorithm adversary AQ. The first distribution for the oracle of chosen matrix AZpm×n and the second distribution is taken over the true oracles with qF quantum oracle queries. Then, the distributions DRA,. and DR. are statistically close (at most ε<p-n2-mqF).

Proof of Theorem 1

Let R be a random oracle, DRA,.1k and DR.1k are two random oracle distributions taken over sample space Ω, which are the output of possible quantum adversary AQ.

For m and n being positive integers m>n, which are polynomial of the security parameter k, let p be a prime number. For vZpm and xZ2n chosen randomly, we define the statistical distance between the two distributions as follows:

SDDRA,.1k,DR,.1k=Prx,vDRA,.1kAQx,v=1-Prx,vDR.1kAQx,v=1 10

where Prx,vDRA,.1kAQx,v=1=vprvPr[F|v] and x=[xr|ki].

Fix x0Z2n such that Fx0,v0=F0 for some v0Zpm, and then the following probability can be computed as follows:

PrF0|v0=12mv0φF00elsewhere 11

where φF is the set of all preimages of the function F. We defined the size of φ as the number of quantum queries qF.

Now, we are computing the probability of the distribution:

Prx,vDRA,.1kAQx,v=1=vprvPr[F|v]=vφF1pm122=qF2n.pm 12

Then, we are ready to estimate the probability between the two distributions. ε=Prx,vDRA,.1kAQx,v=1-Prx,vDR.1kAQx,v=1<vφF1pm122=1pm122qF-qF

Theorem 2

Suppose that for kiZ2l, N, and Fi are generated randomly. If a probabilistic polynomial-time algorithm (classical) AC adversary breaches the security of the proposed protocol, then the adversary is able to invert the one-way hash function hz on a random input zD0,1n in polynomial time with a non-negligible probability ε>2-k-nqh.

Proof of Theorem 2

Assume that AC runs a random oracle algorithm to retrieve user cryptographic key ki from the one-way hash function h with a number of queries qh. We define the adversary advantages as the probability AdvACD=PrzDACz=1. This advantage is determined by the number of queries qh for the classical random oracle model. Then, the advantage probability is computed as follows:

AdvACD=PrzDACz=1=PrzDz:hz=y=zPry·Pr[z|y]z12k·12nqh2k+n.

Security and Functionality Features

In this section, we discuss the security and functionality features of our proposed protocol and compare with the related lattice-based authentication protocols [28, 29, 31] as shown in Table 1.

  • F1: Quantum attack resistant: The IoT is encountering security and privacy threats. However, with quantum computing, these security and privacy threats will increase more and more. The security of the proposed protocol is based on PQFC scheme, which is provable secure against quantum attacks.

  • F2: Tampering with stored biometric templates attack: This property applies when an attacker gets access to the system database or the token, temporarily or permanently cannot modify the template in the system database/token to gain server authentication. In the proposed protocol, the attacker needs to break the SVP problem to obtain the biometric reference template.

  • F3: Biometric template thefts resistant: This property applies to an attacker that gets access to the database system or token and obtain the user’s biometric template; she/he can use it for other purposes. In our protocol, the user’s biometric template is protected using PQFC scheme. Hence, there is no clear stored template to be stolen.

  • F4: Privileged insider attack resistant: Insider attacker with privileged access to the database server can pose a serious threat to the server database. One of the breaches can lead to stealing/tampering with the stored biometric templates in the database. The proposed protocol offers an opportunity for the user to hide her/his biometric template from privileged insiders in the registration phase by allowing her/him to send it to authentication server in encrypted format, which will prevent an inside attacker from getting it.

  • F5: Smart card/token attack resistant: Assume that the user’s smart card is lost or stolen. An attacker having the smart card has no way to obtain secret information stored in the smartcard. If the attacker retrieves the information w, the attacker has to find v by solving lattice SVP problem to gain information, which is contradiction to shortest vector problem (SVP).

  • F6: Man-in-the-Middle attack resistant: In the man-in-the-middle attack, the attacker sits in the middle and negotiates the cryptographic parameters with the user and server to gain access as a legitimate. In the registration phase of the proposed protocol, the user sends request to the authentication server. The server replies by sending the message including the matrix A; assume the man-in-the-middle attacker intercepts the server message and replaces the matrix A by A^; the user will compute FUir=A^·vmodq+tUirmod2 and send to the server. Then, the man-in-the-middle attacker cannot learn the biometric template tUir from FUir, only if she/he solves the LWE lattice problem.

  • F7: Renewable biometric template: Unlike passwords, biometrics are limited and once it compromised cannot be revoked. A biometric is the principle means of authentication in our protocol. If the biometric template is compromised by any attacks, it can be used again with new registration parameters.

  • F8: Memoryless-effortless: An authentication protocol that does not require any users to remember any secret per service called memoryless-effortless. By this definition, the proposed authentication protocol is memoryless-effortless

  • F9: User anonymity: An important security property of authentication protocol for IoT applications is the confidentiality of the user’s identity. It is desirable to keep user’s identity hiding from attackers. In the proposed protocol, the plaintext user's identity IDUi is neither stored in the user's smart card nor sent in the login and authentication messages over secure or insecure channels. If the attacker is able to retrieve the values ei and ri from the user's smart card, it is obvious that an attacker is determining IDUi which is equivalent to find the collision in the hash function h.

  • F10: Lightweight: A protocol with less computational and communication complexities is called a lightweight protocol.

Table 1.

Comparisons of security and functionality features of the proposed protocol with the related protocols

Protocol Security and functionality features
F1 F2 F3 F4 F5 F6 F7 F8 F9 F10
[29]
[28]
[31]
Our protocol

■: Satisfied, □: Not satisfied, ▬: Not elaborated

Performance Analysis

In this section, we evaluate the performance of our protocol based on the following metrics: the storage requirements, communication costs, and computational complexities. Furthermore, we have compared the proposed protocol with the recent related protocols for IoT systems [28, 31]. Table 2 shows the computational costs comparison between the proposed protocol and the protocols in [28, 31]. Let TMp, TVp, Tadd, and Th denote the operation time required to execute the matrix multiplication modulo p, vector multiplication modulo p, vector addition modulo p, and one-way hash function, respectively. The total computational time cost of our protocol is 4TMp+2Tadd+19Th. Furthermore, we have estimated the execution time of the above mentioned operations as TMp=4ms, TVp=1ms, Tadd=2ms, and Th=0.0023ms. The tasks are executed using MATLAB 2020b on PC workstation with Intel(R) Core(TM) i7-10,700 CPU @ 2.90 GHz 2.90 GHz RAM 16.0 GB. Thus, the total execution time for the proposed protocol is 20.0437 ms.

Table 2.

Comparisons of computational costs of our protocol with the related protocols

Protocol [28] [31] Our protocol
Initialization phase TMp TMp TMp
Registration phase 4Th 2TMp+Tadd+5Th
Login phase 2TMp+2TVp+2Tadd+3Th TMp+TVp+5Th TMp+Tadd+5Th
Authentication phase 1TMp+2TVp+2Tadd+Th TVp+16Th 9Th
Total cost 4TMp+4TVp+4Tadd+4Th 2TMp+2TVp+25Th 4TMp+2Tadd+19Th
Total time cost (ms) 28.0092 10.0575 20.0437

For computational complexity comparison, we followed the parameters reported in [31] as follows: assume that m=n=Oklogp, p=Ok2 and p=logp. The computational complexity for the operations: matrix multiplication modulo p, vector multiplication modulo p, and vector addition modulo p is Omnp2, Omp2, and Omp, respectively. Thus, the total computational complexity of the proposed protocol is 8klog2k8klog2k+1. Table 3 shows the comparison result of our protocol with the related protocols.

Table 3.

Comparisons of computational complexities of our protocol with the related protocols

Protocol Primitive Complexity overhead Computational Cost
[28] PUB,sk,R,S,ANS Omnp2 16klog2k4klog2k+2logk+1
[31] PU,ti,vi,vi Omnp2 16klog3k2klogk+1
Our protocol pk,Fr,wi,Zi,wi Omnp2 8klog2k8klog2k+1

Furthermore, the storage requirement and the communication cost comparisons between the proposed protocol and the related protocols [28, 31] are evaluated and shown in Table 4. In the evaluation, we consider the login and authentication phases in the comparison. Note that the registration phase is not performed frequently. In all protocols, we assume the length of the identity, output size of the hash function, and number in Zp are p=2logk. Thus, the total communication cost of our protocol sending messages IDi,Zi,βi,ri, wi, and θ1,θ2,θ4,θ5,θ6 is m+11p=2logk2klogk+11. The storage requirements of our protocol and the related protocols [28, 31] are computed. The total storage cost for storing master key mkZp1×n, matrix AZpm×n, public key pkZp1×m, and seven hash value is n+mn+m+7p=2logk4k2log2k+4klogk+7.

Table 4.

Comparisons of storage and communication costs of our protocol with the related protocols

Protocol Data storage/exchange Data length
[28] Communication Mi,ANSi,Ri,Si 2logk6klogk+1
Storage dZp1×n, AZpm×n, PUBZp1×m, skiZp1×n, 4h. 2logk4k2log2k+6klogk+4
[31] Communication ti,φi, πi,IDi, Ri IDi,bi,Cij 2logk2klogk+7
Storage dZp1×n, XZpm×n, PUZp1×m,6h. 2logk4k2log2k+4klogk+6
Our protocol Communication IDi,Zi,βi,ri, wi, θ1,θ2,θ4,θ5,θ6 2logk2klogk+11
Storage mkZp1×n, AZpm×n, pkZp1×m, 7h. 2logk4k2log2k+4klogk+7

Conclusion

This paper proposed a new lightweight two-factor-based user authentication protocol for the IoT-enabled healthcare ecosystem. We evaluated the security of the proposed protocol through the formal security analysis using random oracle model (ROM), showing that our protocol is secure against today and upcoming quantum attacks. The proposed protocol achieved the following functionality and security properties: memoryless-effortless, user anonymity, mutual authentication, and resistance to tampering and stolen of biometric template, stolen smart card, privileged interior attacks.

The proposed protocol was evaluated in terms of the performance metrics: storage requirement, computation and communication. The results demonstrated that our protocol is more efficient than Mukherjee et al., Chaudhary et al., and Gupta et al. protocols. The overhead of the computational costs of our protocol becomes larger naturally since the proposed protocol exploits these computations to provide several significant security and functionality properties.

The overall performance demonstrates that the proposed protocol is suitable for the Internet of Things applications.

Acknowledgements

The authors thank King Fahd University of Petroleum & Minerals for providing facilities for this research.

Funding

This work is a part of the project supported by the King Fahd University of Petroleum and Minerals under Grant SR191031.

Declarations

Conflict of interest

The authors declare no conflict of interest.

References

  • 1.Alsubaei, F., Abuhussein, A., Shiva, S.: A framework for ranking IoMT solutions based on measuring security and privacy. In: Advances in Intelligent Systems and Computing (2019)
  • 2.Sun Y, Lo FPW, Lo B. Security and privacy for the internet of medical things enabled healthcare systems: a survey. IEEE Access. 2019 doi: 10.1109/ACCESS.2019.2960617. [DOI] [Google Scholar]
  • 3.Yang W, Wang S, Zheng G, Yang J, Valli C. A privacy-preserving lightweight biometric system for internet of things security. IEEE Commun. Mag. 2019 doi: 10.1109/MCOM.2019.1800378. [DOI] [Google Scholar]
  • 4.Campbell M. Putting the Passe into passwords: how passwordless technologies are reshaping digital identity. Computer (Long. Beach. Calif) 2020 doi: 10.1109/MC.2020.2997278. [DOI] [Google Scholar]
  • 5.Karimian, N., Wortman, P.A., Tehranipoor, F.: Evolving authentication design considerations for the Internet of biometric things (IoBT). In: 2016 International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2016 (2016)
  • 6.Riaz N, Riaz A, Khan SA. Biometric template security: an overview. Sens. Rev. 2018;38(1):120–127. doi: 10.1108/SR-07-2017-0131. [DOI] [Google Scholar]
  • 7.Al-Saggaf AA. Secure method for combining cryptography with Iris biometrics. J. Univers. Comput. Sci. 2018;24(4):341–356. [Google Scholar]
  • 8.Hao F, Anderson R, Daugman J. Combining crypto with biometrics effectively. IEEE Trans. Comput. 2006 doi: 10.1109/TC.2006.138. [DOI] [Google Scholar]
  • 9.Christian R, Andreas U. A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Secur. 2011;2011(3):1–25. doi: 10.1186/1687-417X-2011-3. [DOI] [Google Scholar]
  • 10.Juels, A., Wattenberg, M.: Fuzzy commitment scheme. In: Proceedings of the ACM Conference on Computer and Communications Security (1999)
  • 11.Rathgeb C, Uhl A. Statistical attack against fuzzy commitment scheme. IET Biom. 2012 doi: 10.1049/iet-bmt.2011.0001. [DOI] [Google Scholar]
  • 12.Ignatenko T, Willems FMJ. Information leakage in fuzzy commitment schemes. IEEE Trans. Inf. Forensics Secur. 2010 doi: 10.1109/TIFS.2010.2046984. [DOI] [Google Scholar]
  • 13.Tams, B.: Decodability attack against the fuzzy commitment scheme with public feature transforms. 1–19 (2014)
  • 14.Shor, P.W.: Polynomial time algorithms for discrete logarithms and factoring on a quantum computer. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (1994)
  • 15.Asif R. Post-quantum cryptosystems for internet-of-things: a survey on lattice-based algorithms. IoT. 2021 doi: 10.3390/iot2010005. [DOI] [Google Scholar]
  • 16.Al-Saggaf AA. A post-quantum fuzzy commitment scheme for biometric template protection: an experimental study. IEEE Access. 2021 doi: 10.1109/ACCESS.2021.3100981. [DOI] [Google Scholar]
  • 17.Mumtaz, M., Akram, J., Ping, L.: An RSA based authentication system for smart IoT environment. In: Proceedings—21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019 (2019)
  • 18.Xu G, Qiu S, Ahmad H, Xu G, Guo Y, Zhang M, Xu H. A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography. Sensors (Switzerland) 2018 doi: 10.3390/s18072394. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 19.Soni P, Pal AK, Islam SH. An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system. Comput. Methods Programs Biomed. 2019 doi: 10.1016/j.cmpb.2019.105054. [DOI] [PubMed] [Google Scholar]
  • 20.Ayub MF, Mahmood K, Kumari S, Sangaiah AK. Lightweight authentication protocol for e-health clouds in IoT based applications through 5G technology. Digit. Commun. Netw. 2020 doi: 10.1016/j.dcan.2020.06.003. [DOI] [Google Scholar]
  • 21.Rehman HU, Ghani A, Chaudhry SA, et al. A secure and improved multi server authentication protocol using fuzzy commitment. Multimed. Tools Appl. 2021;80:16907–16931. doi: 10.1007/s11042-020-09078-z. [DOI] [Google Scholar]
  • 22.Mohammed AJ, Yassin AA. Efficient and flexible multi-factor authentication protocol based on fuzzy extractor of administrator’s fingerprint and smart mobile device. Cryptography. 2019 doi: 10.3390/cryptography3030024. [DOI] [Google Scholar]
  • 23.Taher BH, Jiang S, Yassin AA, Lu H. Low-overhead remote user authentication protocol for IoT based on a fuzzy extractor and feature extraction. IEEE Access. 2019;7:256. doi: 10.1109/ACCESS.2019.2946400. [DOI] [Google Scholar]
  • 24.Li N, Liu D, Nepal S. Lightweight mutual authentication for IoT and its applications. IEEE Trans. Sustain. Comput. 2017 doi: 10.1109/TSUSC.2017.2716953. [DOI] [Google Scholar]
  • 25.Needham RM, Schroeder MD. Using encryption for authentication in large networks of computers. Commun. ACM. 1978 doi: 10.1145/359657.359659. [DOI] [Google Scholar]
  • 26.Cao J, Yu P, Xiang X, Ma M, Li H. Anti-quantum fast authentication and data transmission scheme for massive devices in 5G NB-IoT system. IEEE Internet Things J. 2019 doi: 10.1109/JIOT.2019.2931724. [DOI] [Google Scholar]
  • 27.Zhou Y, Wang L. A lattice-based authentication scheme for roaming service in ubiquitous networks with anonymity. Secur. Commun. Netw. 2020 doi: 10.1155/2020/2637916. [DOI] [Google Scholar]
  • 28.Mukherjee S, Gupta DS, Biswas GP. An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice. Computing. 2019 doi: 10.1007/s00607-018-0689-3. [DOI] [Google Scholar]
  • 29.Chaudhary R, Jindal A, Aujla GS, Kumar N, Das AK, Saxena N. LSCSH: lattice-based secure cryptosystem for smart healthcare in smart cities environment. IEEE Commun. Mag. 2018 doi: 10.1109/MCOM.2018.1700787. [DOI] [Google Scholar]
  • 30.Sahu AK, Sharma S, Puthal D. Lightweight multi-party authentication and key-agreement protocol in IoT based e-healthcare service. ACM Trans. Multimed. Comput. Commun. Appl. 2020 doi: 10.1145/3398039. [DOI] [Google Scholar]
  • 31.Gupta DS, Islam SH, Obaidat MS, Karati A, Sadoun B. LAAC: lightweight lattice-based authentication and access control Protocol for E-health systems in IoT environments. IEEE Syst. J. 2020 doi: 10.1109/jsyst.2020.3016065. [DOI] [Google Scholar]
  • 32.Dang Q. Changes in federal information processing standard (FIPS) 180–4, secure hash standard. Cryptologia. 2013 doi: 10.1080/01611194.2012.687431. [DOI] [Google Scholar]
  • 33.Ajtai, M.: Generating hard instances of lattice problems. In: Proceedings of the Annual ACM Symposium on Theory of Computing (1996)
  • 34.Peikert C. A decade of lattice cryptography. Found. Trends Theor. Comput. Sci. 2016 doi: 10.1561/0400000074. [DOI] [Google Scholar]
  • 35.Micciancio, D., Regev, O.: Lattice-based cryptography. In: Post-Quantum Cryptography (2009)
  • 36.Regev O. On lattices, learning with errors, random linear codes, and cryptography. J. ACM. 2009 doi: 10.1145/1568318.1568324. [DOI] [Google Scholar]

Articles from Arabian Journal for Science and Engineering are provided here courtesy of Nature Publishing Group

RESOURCES