TY - GEN
T1 - A Secured and Optimized Broadcast Authentication Scheme for the Internet of Medical Things
AU - Riaz, Syed Waleed
AU - Khan, Fazlullah
AU - Ullah, Insaf
AU - Alshawi, Bandar
AU - Alturki, Ryan
AU - Wedyan, Mohammad
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - This Internet of Medical Things (IoMT), facilitates the medical stop regarding real-time monitoring of patients, medical emergency management, remote surgery, patient information management, medical equipment, drug monitoring, etc. However, IoMT devices communicate with each other in an open environment that makes them vulnerable to a wide range of malicious threats from malicious entities. To protect the devices and their associated data, we designed a broadcast authentication scheme for IoMT devices using identity-based public key cryptography that exploits the lightweight features of the Hyper-Elliptic Curve (HEC). We then performed the security analysis based on the Random Oracle Model (ROM), in which we have proved that the proposed scheme is unforgeable under the hardiness of the hyperelliptic curve discrete logarithm problem. The proposed scheme is analyzed in terms of computational and communication overhead and the experimental results justify the superiority of the proposed work in comparison to the existing schemes.
AB - This Internet of Medical Things (IoMT), facilitates the medical stop regarding real-time monitoring of patients, medical emergency management, remote surgery, patient information management, medical equipment, drug monitoring, etc. However, IoMT devices communicate with each other in an open environment that makes them vulnerable to a wide range of malicious threats from malicious entities. To protect the devices and their associated data, we designed a broadcast authentication scheme for IoMT devices using identity-based public key cryptography that exploits the lightweight features of the Hyper-Elliptic Curve (HEC). We then performed the security analysis based on the Random Oracle Model (ROM), in which we have proved that the proposed scheme is unforgeable under the hardiness of the hyperelliptic curve discrete logarithm problem. The proposed scheme is analyzed in terms of computational and communication overhead and the experimental results justify the superiority of the proposed work in comparison to the existing schemes.
KW - Authentications
KW - Hyper Elliptic Curve
KW - Identity Based Broadcast Signature
KW - Internet of Medical Things
KW - Random Oracle Model
UR - http://www.scopus.com/inward/record.url?scp=85207393465&partnerID=8YFLogxK
U2 - 10.1109/ICECET61485.2024.10698706
DO - 10.1109/ICECET61485.2024.10698706
M3 - Conference contribution
AN - SCOPUS:85207393465
T3 - International Conference on Electrical, Computer, and Energy Technologies, ICECET 2024
BT - International Conference on Electrical, Computer, and Energy Technologies, ICECET 2024
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 4th IEEE International Conference on Electrical, Computer, and Energy Technologies, ICECET 2024
Y2 - 25 July 2024 through 27 July 2024
ER -