Department of Electrical and Computer Engineering, Sungkyunkwan University, 2066 Seobu-ro, Jangan-gu, Suwon-si 16419, Republic of Korea.
Department of Computer Science and Engineering, Sungkyunkwan University, 2066 Seobu-ro, Jangan-gu, Suwon-si 16419, Republic of Korea.
Sensors (Basel). 2023 Jan 18;23(3):1122. doi: 10.3390/s23031122.
The Internet of Medical Things (IoMT) is used in the medical ecosystem through medical IoT sensors, such as blood glucose, heart rate, temperature, and pulse sensors. To maintain a secure sensor network and a stable IoMT environment, it is important to protect the medical IoT sensors themselves and the patient medical data they collect from various security threats. Medical IoT sensors attached to the patient's body must be protected from security threats, such as being controlled by unauthorized persons or transmitting erroneous medical data. In IoMT authentication, it is necessary to be sensitive to the following attack techniques. (1) The offline password guessing attack easily predicts a healthcare administrator's password offline and allows for easy access to the healthcare worker's account. (2) Privileged-insider attacks executed through impersonation are an easy way for an attacker to gain access to a healthcare administrator's environment. Recently, previous research proposed a lightweight and anonymity preserving user authentication scheme for IoT-based healthcare. However, this scheme was vulnerable to offline password guessing, impersonation, and privileged insider attacks. These attacks expose not only the patients' medical data such as blood pressure, pulse, and body temperature but also the patients' registration number, phone number, and guardian. To overcome these weaknesses, in the present study we propose an improved lightweight user authentication scheme for the Internet of Medical Things (IoMT). In our scheme, the hash function and XOR operation are used for operation in low-spec healthcare IoT sensor. The automatic cryptographic protocol tool ProVerif confirmed the security of the proposed scheme. Finally, we show that the proposed scheme is more secure than other protocols and that it has 266.48% better performance than schemes that have been previously described in other studies.
物联网医疗(IoMT)在医疗生态系统中通过医疗物联网传感器使用,例如血糖、心率、温度和脉搏传感器。为了维护安全的传感器网络和稳定的 IoMT 环境,保护医疗物联网传感器本身以及它们收集的患者医疗数据免受各种安全威胁非常重要。附着在患者身体上的医疗物联网传感器必须免受安全威胁的影响,例如被未经授权的人员控制或传输错误的医疗数据。在 IoMT 认证中,需要对以下攻击技术保持敏感。(1)离线密码猜测攻击可以轻松预测医疗保健管理员的离线密码,并允许轻松访问医疗保健工作者的帐户。(2)通过模拟执行的特权内部攻击是攻击者访问医疗保健管理员环境的一种简单方法。最近,之前的研究提出了一种基于物联网的轻量级和匿名保护用户认证方案用于医疗保健。然而,该方案容易受到离线密码猜测、模拟和特权内部攻击的攻击。这些攻击不仅暴露了患者的医疗数据,如血压、脉搏和体温,还暴露了患者的注册号码、电话号码和监护人。为了克服这些弱点,在本研究中,我们为物联网医疗(IoMT)提出了一种改进的轻量级用户认证方案。在我们的方案中,使用哈希函数和 XOR 操作进行低规格医疗物联网传感器中的操作。自动密码协议工具 ProVerif 确认了所提出方案的安全性。最后,我们表明所提出的方案比其他协议更安全,并且比之前在其他研究中描述的方案具有 266.48%的更好性能。