Please use this identifier to cite or link to this item:
http://dr.iiserpune.ac.in:8080/xmlui/handle/123456789/10180
Title: | Lightweight authenticated key agreement scheme for IoMT network using generalized Chinese Remainder Theorem |
Authors: | Goswami, Chandan Basak, Aniket GHOSH, RAJEET Adhikari, Avishek Sarkar, Pinaki Dept. of Mathematics |
Keywords: | Authenticated key agreement scheme Chinese Remainder Theorem Bio-hash function Real-Or-Random model AVISPA 2025 |
Issue Date: | May-2025 |
Publisher: | Elsevier B.V. |
Citation: | Computer Networks, 263, 111212. |
Abstract: | Rapid advancement of the Internet of Things (IoT) is revolutionizing various sectors of our daily lives; healthcare being a prime beneficiary. Likelihood of viral infections among medical personnel has drastically decreased with the introduction of wireless monitoring platforms in the Internet of Medical Things (IoMT) network. Recent developments in wireless communications and computer systems have further enhanced the efficiency, security, and privacy of the entire healthcare industry. However, integrating IoT with electronic health (e-health) management systems presents several challenges, including secure communications over insecure channels, authentication, and key agreement among participating devices. This manuscript introduces a secure three-factor (user, medical server, and sensor device) lightweight mutual authenticated key agreement scheme (KAS) based on the Chinese Remainder Theorem (CRT) for an arbitrary number of co-primes in the IoMT network. We present a formal semantic security analysis of our proposed protocol using the Real-Or-Random (ROR) model for computational security. Moreover, simulation results using the Automated Validation of Internet Security Protocols and Applications (AVISPA) show that the proposed scheme is safe against well-known active and passive threats. Our proposed scheme is well-designed to perform efficiently, reducing both computation cost and communication cost. Finally, the proposed scheme has significant security advantages and performance benefits, making the scheme more efficient, secure, and robust compared to its state-of-the-art counterparts. |
URI: | https://doi.org/10.1016/j.comnet.2025.111212 http://dr.iiserpune.ac.in:8080/xmlui/handle/123456789/10180 |
ISSN: | 1872-7069 1389-1286 |
Appears in Collections: | JOURNAL ARTICLES |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.