scholarly journals Efficient Mutual Authentication Protocol between Hospital Internet of Things Devices Using Probabilistic Attribute Information

2019 ◽  
Vol 11 (24) ◽  
pp. 7214
Author(s):  
Yoon-Su Jeong ◽  
Dong-Ryool Kim ◽  
Seung-Soo Shin

Wearable and portable medical devices are one of the fastest growing sectors in the Internet of Things (IoT) market. However, medical services specialize in the processing of personal health data, which carries issues that are not faced by other industries. In this paper, we propose a multi-dimensional color vector information based IoT device authentication protocol that can provide benefits for medical work, assuming that a hospital has the capability of integrating IoT devices and has access to patient information. The proposed protocol uses multi-dimensional color vectors to help users who use IoT devices to manage their condition in multiple groups, stochastically. In addition, the proposed protocol provides the health and medical service status of users to medical staff in real time using IoT authentication keys generated through the proposed multi-dimensional color vectors. The proposed protocol not only addresses health care problems yet to be tackled in the management of hospital and health services, but also minimizes administrative time and procedures for current medical services. As a result of the performance evaluation, the proposed protocol improved the efficiency of hospital IoT devices by an average of 31.1%, and the time delay for medical services was improved by 19.8%, compared to the existing protocol. By using the proposed protocol and IoT devices, the average overhead of healthcare providers could be reduced by as much as 15.3%.

2021 ◽  
Vol 9 (1) ◽  
Author(s):  
Scott Monteith ◽  
Tasha Glenn ◽  
John Geddes ◽  
Emanuel Severus ◽  
Peter C. Whybrow ◽  
...  

Abstract Background Internet of Things (IoT) devices for remote monitoring, diagnosis, and treatment are widely viewed as an important future direction for medicine, including for bipolar disorder and other mental illness. The number of smart, connected devices is expanding rapidly. IoT devices are being introduced in all aspects of everyday life, including devices in the home and wearables on the body. IoT devices are increasingly used in psychiatric research, and in the future may help to detect emotional reactions, mood states, stress, and cognitive abilities. This narrative review discusses some of the important fundamental issues related to the rapid growth of IoT devices. Main body Articles were searched between December 2019 and February 2020. Topics discussed include background on the growth of IoT, the security, safety and privacy issues related to IoT devices, and the new roles in the IoT economy for manufacturers, patients, and healthcare organizations. Conclusions The use of IoT devices will increase throughout psychiatry. The scale, complexity and passive nature of data collection with IoT devices presents unique challenges related to security, privacy and personal safety. While the IoT offers many potential benefits, there are risks associated with IoT devices, and from the connectivity between patients, healthcare providers, and device makers. Security, privacy and personal safety issues related to IoT devices are changing the roles of manufacturers, patients, physicians and healthcare IT organizations. Effective and safe use of IoT devices in psychiatry requires an understanding of these changes.


2018 ◽  
Vol 14 (8) ◽  
pp. 155014771879512 ◽  
Author(s):  
Madiha Khalid ◽  
Umar Mujahid ◽  
Muhammad Najam-ul-Islam

Internet of Things is one of the most important components of modern technological systems. It allows the real time synchronization and connectivity of devices with each other and with the rest of the world. The radio frequency identification system is used as node identification mechanism in the Internet of Thing networks. Since Internet of Things involve wireless channel for communication that is open for all types of malicious adversaries, therefore many security protocols have been proposed to ensure encryption over wireless channel. To reduce the overall cost of radio frequency identification enabled Internet of Thing network security, the researchers use simple bitwise logical operations such as XOR, AND, OR, and Rot and have proposed many ultralightweight mutual authentication protocols. However, almost all the previously proposed protocols were later found to be vulnerable against several attack models. Recently, a new ultralightweight mutual authentication protocol has been proposed which involves only XOR and Rotation functions in its design and claimed to be robust against all possible attack models. In this article, we have performed cryptanalysis of this recently proposed ultralightweight mutual authentication protocol and found many pitfalls and vulnerabilities in the protocol design. We have exploited weak structure of the protocol messages and proposed three attacks against the said protocol: one desynchronization and two full disclosure attacks.


2019 ◽  
Vol 33 (13) ◽  
pp. e3906 ◽  
Author(s):  
Muhammad Naeem ◽  
Shehzad Ashraf Chaudhry ◽  
Khalid Mahmood ◽  
Marimuthu Karuppiah ◽  
Saru Kumari

2016 ◽  
Vol 74 (9) ◽  
pp. 4281-4294 ◽  
Author(s):  
Amjad Ali Alamr ◽  
Firdous Kausar ◽  
Jongsung Kim ◽  
Changho Seo

2017 ◽  
Vol 10 (3) ◽  
pp. 179
Author(s):  
Adarsh Kumar ◽  
Krishna Gopal ◽  
Alok Aggarwal

Internet of Things (IoT) is a pervasive environment to interconnect the things like: smart objects, devices etc. in a structure like internet. Things can be interconnected in IoT if these are uniquely addressable and identifiable. Radio Frequency Identification (RFID) is one the important radio frequency based addressing scheme in IoT. Major security challenge in resource constraint RFID networks is how to achieve traditional CIA security i.e. Confidentiality, Integrity and Authentication. Computational and communication costs for Lightweight Mutual Authentication Protocol (LMAP), RFID mutual Authentication Protocol with Permutation (RAPP) and kazahaya authentication protocols are analyzed. These authentication protocols are modeled to analyze the delays using lightweight modeling language. Delay analysis is performed using alloy model over LMAP, RAPP and kazahaya authentication protocols where one datacenter (DC) is connected to different number of readers (1,5 or 10) with connectivity to 1, 5 or 25 tags associated with reader and its results show that for LMAP delay varies from 30-156 msec, for RAPP from 31-188 while for kazahaya from 61-374 msec. Further, performance of RFID authentication protocols is analyzed for group construction through more than one DC (1,5 or 10) with different number of readers (10, 50 or 100) and tags associated with these readers (50, 500, 1000) and results show that DC based binary tree topology with LMAP authentication protocol is having a minimum delay for 50 or 100 readers. Other authentication protocols fail to give authentication results because of large delays in the network. Thus, RAPP and Kazahaya are not suitable for scenarios where there is large amount of increase in number of tags or readers.


Sign in / Sign up

Export Citation Format

Share Document