dc.contributor.author |
Goswami, Chandan |
en_US |
dc.contributor.author |
Basak, Aniket |
en_US |
dc.contributor.author |
GHOSH, RAJEET |
en_US |
dc.contributor.author |
Adhikari, Avishek |
en_US |
dc.contributor.author |
Sarkar, Pinaki |
en_US |
dc.date.accessioned |
2025-06-13T06:00:05Z |
|
dc.date.available |
2025-06-13T06:00:05Z |
|
dc.date.issued |
2025-05 |
en_US |
dc.identifier.citation |
Computer Networks, 263, 111212. |
en_US |
dc.identifier.issn |
1872-7069 |
en_US |
dc.identifier.issn |
1389-1286 |
en_US |
dc.identifier.uri |
https://doi.org/10.1016/j.comnet.2025.111212 |
en_US |
dc.identifier.uri |
http://dr.iiserpune.ac.in:8080/xmlui/handle/123456789/10180 |
|
dc.description.abstract |
Rapid advancement of the Internet of Things (IoT) is revolutionizing various sectors of our daily lives; healthcare being a prime beneficiary. Likelihood of viral infections among medical personnel has drastically decreased with the introduction of wireless monitoring platforms in the Internet of Medical Things (IoMT) network. Recent developments in wireless communications and computer systems have further enhanced the efficiency, security, and privacy of the entire healthcare industry. However, integrating IoT with electronic health (e-health) management systems presents several challenges, including secure communications over insecure channels, authentication, and key agreement among participating devices. This manuscript introduces a secure three-factor (user, medical server, and sensor device) lightweight mutual authenticated key agreement scheme (KAS) based on the Chinese Remainder Theorem (CRT) for an arbitrary number of co-primes in the IoMT network. We present a formal semantic security analysis of our proposed protocol using the Real-Or-Random (ROR) model for computational security. Moreover, simulation results using the Automated Validation of Internet Security Protocols and Applications (AVISPA) show that the proposed scheme is safe against well-known active and passive threats. Our proposed scheme is well-designed to perform efficiently, reducing both computation cost and communication cost. Finally, the proposed scheme has significant security advantages and performance benefits, making the scheme more efficient, secure, and robust compared to its state-of-the-art counterparts. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Elsevier B.V. |
en_US |
dc.subject |
Authenticated key agreement scheme |
en_US |
dc.subject |
Chinese Remainder Theorem |
en_US |
dc.subject |
Bio-hash function |
en_US |
dc.subject |
Real-Or-Random model |
en_US |
dc.subject |
AVISPA |
en_US |
dc.subject |
2025 |
en_US |
dc.title |
Lightweight authenticated key agreement scheme for IoMT network using generalized Chinese Remainder Theorem |
en_US |
dc.type |
Article |
en_US |
dc.contributor.department |
Dept. of Mathematics |
en_US |
dc.identifier.sourcetitle |
Computer Networks |
en_US |
dc.publication.originofpublisher |
Foreign |
en_US |