Digital Repository

Lightweight authenticated key agreement scheme for IoMT network using generalized Chinese Remainder Theorem

Show simple item record

dc.contributor.author Goswami, Chandan en_US
dc.contributor.author Basak, Aniket en_US
dc.contributor.author GHOSH, RAJEET en_US
dc.contributor.author Adhikari, Avishek en_US
dc.contributor.author Sarkar, Pinaki en_US
dc.date.accessioned 2025-06-13T06:00:05Z
dc.date.available 2025-06-13T06:00:05Z
dc.date.issued 2025-05 en_US
dc.identifier.citation Computer Networks, 263, 111212. en_US
dc.identifier.issn 1872-7069 en_US
dc.identifier.issn 1389-1286 en_US
dc.identifier.uri https://doi.org/10.1016/j.comnet.2025.111212 en_US
dc.identifier.uri http://dr.iiserpune.ac.in:8080/xmlui/handle/123456789/10180
dc.description.abstract Rapid advancement of the Internet of Things (IoT) is revolutionizing various sectors of our daily lives; healthcare being a prime beneficiary. Likelihood of viral infections among medical personnel has drastically decreased with the introduction of wireless monitoring platforms in the Internet of Medical Things (IoMT) network. Recent developments in wireless communications and computer systems have further enhanced the efficiency, security, and privacy of the entire healthcare industry. However, integrating IoT with electronic health (e-health) management systems presents several challenges, including secure communications over insecure channels, authentication, and key agreement among participating devices. This manuscript introduces a secure three-factor (user, medical server, and sensor device) lightweight mutual authenticated key agreement scheme (KAS) based on the Chinese Remainder Theorem (CRT) for an arbitrary number of co-primes in the IoMT network. We present a formal semantic security analysis of our proposed protocol using the Real-Or-Random (ROR) model for computational security. Moreover, simulation results using the Automated Validation of Internet Security Protocols and Applications (AVISPA) show that the proposed scheme is safe against well-known active and passive threats. Our proposed scheme is well-designed to perform efficiently, reducing both computation cost and communication cost. Finally, the proposed scheme has significant security advantages and performance benefits, making the scheme more efficient, secure, and robust compared to its state-of-the-art counterparts. en_US
dc.language.iso en en_US
dc.publisher Elsevier B.V. en_US
dc.subject Authenticated key agreement scheme en_US
dc.subject Chinese Remainder Theorem en_US
dc.subject Bio-hash function en_US
dc.subject Real-Or-Random model en_US
dc.subject AVISPA en_US
dc.subject 2025 en_US
dc.title Lightweight authenticated key agreement scheme for IoMT network using generalized Chinese Remainder Theorem en_US
dc.type Article en_US
dc.contributor.department Dept. of Mathematics en_US
dc.identifier.sourcetitle Computer Networks en_US
dc.publication.originofpublisher Foreign en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search Repository


Advanced Search

Browse

My Account