Please use this identifier to cite or link to this item:
https://hdl.handle.net/10321/4103
Title: | A mutual lightweight authentication scheme for fog-cloud-based e-health services | Authors: | Nleya, Bakhe | Keywords: | E-health;Mutual authentication;D2D communication;Privacy;Security | Issue Date: | 30-Dec-2021 | Publisher: | Turkish Online Journal of Qualitative Inquiry (TOJQI) | Source: | Nleya, B. 2021. A mutual lightweight authentication scheme for fog-cloud-based e-health services. Turkish Online Journal of Qualitative Inquiry. 12: 6569-6586 (18). | Journal: | Turkish Online Journal of Qualitative Inquiry; Vol. 12 | Abstract: | The new version Internet network, now referred to as the Internet of Things (IoT) facilitates interconnectivity among various objects and devices. The introduction of both Cloud and Fog computing paradigms, device device-to-device (D2D) communication standards, as well as enabling privacy and security approaches, have all contributed to the practical realization of E-health services in IoT-enabled networks. Gen-erally, Fog layer nodes are often located in public places, where they are easily accessible and thus vulnerable to various securi-ty threats. Should this occur, the current and previously gener-ated security keys, as well as device identities, must be kept secret thus ensuring anonymity, unlinkability, forward secrecy, e.t.c. Thus in this paper, we introduce an E-Health authenti-cation and security architecture for the D2D-Aided fog compu-ting model, that facilitates verification of key components such as patients and peripheral devices without involving a central-ized cloud server. This is followed by a proposal for a light-weight anonymous authentication protocol (LAAP) to carry out authentication of the various parties in an E-health system. The proposed protocol is evaluated for various scenarios in D2D-Aided fog computing. Lightweight crypto- graphic primi-tives such as exclusive-or operations and one-way hash func-tion are relied upon to facilitate the inclusion of resource-constrained end-user devices mostly incorporated in body area networks (BANs). Ultimately we carry out an evaluation of the proposed proposal in terms of its efficacy, and security. The proposed protocol is generally found to be practically feasible for implementation in E-health service infrastructures. |
Description: | Journal listed in 2021 DHET list |
URI: | https://hdl.handle.net/10321/4103 | ISSN: | 1309-6591 |
Appears in Collections: | Research Publications (Engineering and Built Environment) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Nleya_B_2021.pdf | Article | 615.31 kB | Adobe PDF | View/Open |
TOJQI Copyright clearance.docx | Copyright clearance | 211.23 kB | Microsoft Word XML | View/Open |
Page view(s)
269
checked on Dec 23, 2024
Download(s)
84
checked on Dec 23, 2024
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.