Zero knowledge proofs based authenticated key agreement protocol for sustainable healthcare
نویسندگان
چکیده
Upgradation of technologies for sustainable smart cities has led to rapid growth in Internet Things (IoT) applications, including e-healthcare services wherein devices collect patient data and deliver it remotely the servers real-time. Despite its enormous benefits, IoT healthcare not received much attention primarily due risk unauthorized access confidential medical information enabled by vulnerable wireless channel communication. Besides, tiny have limited computing power storage capabilities that prevent administrators from using complex resource-hungry security protocols. The cyber attacks on Healthcare applications (IoHA) could result fatalities, decreased revenue, reputation loss, hence endangering sustainability. existing protocols are unsuitable cost complexities necessitate developing new resource-constrained heterogeneous networks. We introduce a confidentiality anonymity-preserving scheme critical infrastructures conquer threats healthcare. This paper proposes Zero-Knowledge Proofs (ZKP) based Authenticated Key Agreement (AKA) protocol IoHA. ZKP-AKA uses zero-knowledge proofs, physically unclonable function, biometrics, symmetric cryptography, message digest, etc., accomplishing protocol’s objective at minimal computation, storage, communication expenses. retains integrity, confidentiality, anonymity, safety significant threats.
منابع مشابه
Chameleon-Based Deniable Authenticated Key Agreement Protocol
As a useful means of safeguarding privacy of communications, deniable authentication has received much attention. A Chameleon-based deniable authenticated key agreement protocol is presented in this paper. The protocol has following properties. Any one of the two participants can’t present a digital proof to convince a third party that a claimed agreement has really taken place. Once a forgery ...
متن کاملIdentity Based Authenticated Group Key Agreement Protocol
An important and popular trend in modern computing is to convert traditional centralized services into distributed services spread across multiple systems and networks. One-way function trees can be used to extend two-party Key Agreement protocols to n-party protocols. Tree-based Group Diffie-Hellman [17] is one such protocol. This paper proposes the first Identity based Group Key Agreement pro...
متن کاملA Robust Authenticated Key Agreement Protocol
In this paper, we propose a robust authenticated key agreement protocol in which two communication parties exchange a secret session key and authenticate each other. The protocol can be considered as an improvement of simple authenticated key agreement algorithm (SAKA). However, our protocol is more significant in that it addresses the problem of the off-line password guessing attack.
متن کاملA New Authenticated Key Agreement Protocol
Authenticated key agreement protocols play a significant role in securing communications over public network channels (Internet). This paper proposes a new key agreement protocol based on factorization problem over nonabelian groups. Then it presents two different ways to provide mutual authentication for the proposed protocol; this paper presents a new authenticated key agreement protocol usin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sustainable Cities and Society
سال: 2022
ISSN: ['2210-6707', '2210-6715']
DOI: https://doi.org/10.1016/j.scs.2022.103766