Cargando…
An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme
In an end-to-end authentication (E2EA) scheme, the physician, patient, and sensor nodes authenticate each other through the healthcare service provider in three phases: the long-term authentication phase (LAP), short-term authentication phase (SAP), and sensor authentication phase (WAP). Once the LA...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8347757/ https://www.ncbi.nlm.nih.gov/pubmed/34372217 http://dx.doi.org/10.3390/s21154980 |
_version_ | 1783735170990342144 |
---|---|
author | Nashwan, Shadi Nashwan, Imad I. H. |
author_facet | Nashwan, Shadi Nashwan, Imad I. H. |
author_sort | Nashwan, Shadi |
collection | PubMed |
description | In an end-to-end authentication (E2EA) scheme, the physician, patient, and sensor nodes authenticate each other through the healthcare service provider in three phases: the long-term authentication phase (LAP), short-term authentication phase (SAP), and sensor authentication phase (WAP). Once the LAP is executed between all communication nodes, the SAP is executed (m) times between the physician and patient by deriving a new key from the PSij key generated by healthcare service provider during the LAP. In addition, the WAP is executed between the connected sensor and patient (m + 1) times without going back to the service provider. Thus, it is critical to determine an appropriate (m) value to maintain a specific security level and to minimize the cost of E2EA. Therefore, we proposed an analytic model in which the authentication signaling traffic is represented by a Poisson process to derive an authentication signaling traffic cost function for the (m) value. wherein the residence time of authentication has three distributions: gamma, hypo-exponential, and exponential. Finally, using the numerical analysis of the derived cost function, an optimal value (m) that minimizes the authentication signaling traffic cost of the E2EA scheme was determined. |
format | Online Article Text |
id | pubmed-8347757 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-83477572021-08-08 An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme Nashwan, Shadi Nashwan, Imad I. H. Sensors (Basel) Article In an end-to-end authentication (E2EA) scheme, the physician, patient, and sensor nodes authenticate each other through the healthcare service provider in three phases: the long-term authentication phase (LAP), short-term authentication phase (SAP), and sensor authentication phase (WAP). Once the LAP is executed between all communication nodes, the SAP is executed (m) times between the physician and patient by deriving a new key from the PSij key generated by healthcare service provider during the LAP. In addition, the WAP is executed between the connected sensor and patient (m + 1) times without going back to the service provider. Thus, it is critical to determine an appropriate (m) value to maintain a specific security level and to minimize the cost of E2EA. Therefore, we proposed an analytic model in which the authentication signaling traffic is represented by a Poisson process to derive an authentication signaling traffic cost function for the (m) value. wherein the residence time of authentication has three distributions: gamma, hypo-exponential, and exponential. Finally, using the numerical analysis of the derived cost function, an optimal value (m) that minimizes the authentication signaling traffic cost of the E2EA scheme was determined. MDPI 2021-07-22 /pmc/articles/PMC8347757/ /pubmed/34372217 http://dx.doi.org/10.3390/s21154980 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Nashwan, Shadi Nashwan, Imad I. H. An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme |
title | An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme |
title_full | An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme |
title_fullStr | An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme |
title_full_unstemmed | An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme |
title_short | An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme |
title_sort | analytic model for reducing authentication signaling traffic in an end-to-end authentication scheme |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8347757/ https://www.ncbi.nlm.nih.gov/pubmed/34372217 http://dx.doi.org/10.3390/s21154980 |
work_keys_str_mv | AT nashwanshadi ananalyticmodelforreducingauthenticationsignalingtrafficinanendtoendauthenticationscheme AT nashwanimadih ananalyticmodelforreducingauthenticationsignalingtrafficinanendtoendauthenticationscheme AT nashwanshadi analyticmodelforreducingauthenticationsignalingtrafficinanendtoendauthenticationscheme AT nashwanimadih analyticmodelforreducingauthenticationsignalingtrafficinanendtoendauthenticationscheme |