IoT-based applications require effective anonymous authentication and key agreement (AKA) protocols to secure data and protect user privacy due to open communication channels and sensitive data. While AKA protocols for these applications have been extensively studied, achieving anonymity remains a challenge. AKA schemes using one-time pseudonyms face resynchronization issues after desynchronization attacks, and the high computational overhead of bilinear pairing and public key encryption limits its applicability. Existing schemes also lack essential security features, causing issues such as vulnerability to ephemeral secret leakage attacks and key compromise impersonation. To address these issues, we propose two novel AKA schemes, PUAKA and RCAKA, designed for different IoT traffic patterns. PUAKA improves end device anonymity in the periodic update pattern by updating one-time pseudonyms with authenticated session keys. RCAKA, for the remote control pattern, ensures anonymity while reducing communication and computation costs using shared signatures and temporary random numbers. A key contribution of RCAKA is its ability to resynchronize end devices with incomplete data in the periodic update pattern, supporting continued authentication. Both protocols' security is proven under the Real-or-Random model. The performance comparison results show that the proposed protocols exceed existing solutions in security features and communication costs while reducing computational overhead by 32% to 50%.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11820180 | PMC |
http://dx.doi.org/10.3390/s25030897 | DOI Listing |
Sci Rep
February 2025
Department of Cyberspace Security, Beijing Electronic Science and Technology Institute, Beijing, 100070, China.
With the rise of IoT technology, remote medical services have gained increasing attention. These services became particularly popular during the COVID-19 pandemic due to their convenience, privacy, and ability to transcend geographical boundaries. In remote medical networks, identity authentication protocols are a crucial component, playing a vital role in ensuring that healthcare providers can operate in a secure and efficient environment.
View Article and Find Full Text PDFSci Rep
February 2025
College of Cryptology and Cyber Science, Nankai University, Tianjin, 300350, China.
Portable devices and sensors-based Internet of Medical Things (IoMT) healthcare can remotely detect patients' physiological data and provide first-class healthcare services. However, the high privacy and sensitivity of medical data make IoMT healthcare systems vulnerable to various attacks. While numerous authentication protocols have been introduced in recent years to guarantee authorized access, these schemes continue to face challenges such as privacy disclosure, untraceability of malicious behavior, insufficient cross-hospital access, and concerns related to single points of failure and trust.
View Article and Find Full Text PDFInt J Womens Health
February 2025
United Associates, Dallas, TX, USA.
Purpose: Perinatal mood and anxiety disorders (PMADs) are the leading cause for maternal morbidity and are associated with underlying causes of pregnancy-related death. Healthy Start (HS) programs around the country seek to lower the risk of maternal mortality through services that screen for and address social determinants of health, including mental health. This study used secondary data from the University of Houston Healthy Start (UHHS) to examine postpartum depression screening and referral rates among program participants and feedback from participating mothers about the program's mental health services.
View Article and Find Full Text PDFInt J Sex Health
December 2024
Faculty of Medicine, School of Public Health, The University of Queensland, Brisbane, QLD, Australia.
Objectives: Trust has been identified as a key factor associated with supporting access to sexual health interventions and digital healthcare. We aimed to explore and synthesize factors that may cultivate trust for young people (10-24-year-old) when accessing digital sexual healthcare.
Methods: A total of 5950 articles were extracted from 5 databases (Scopus, PubMed, Embase, PsycINFO and CINAHL) and independently assessed for relevance by two researchers.
Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!