Cargando…

An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme

In an end-to-end authentication (E2EA) scheme, the physician, patient, and sensor nodes authenticate each other through the healthcare service provider in three phases: the long-term authentication phase (LAP), short-term authentication phase (SAP), and sensor authentication phase (WAP). Once the LA...

Descripción completa

Detalles Bibliográficos
Autores principales: Nashwan, Shadi, Nashwan, Imad I. H.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8347757/
https://www.ncbi.nlm.nih.gov/pubmed/34372217
http://dx.doi.org/10.3390/s21154980
_version_ 1783735170990342144
author Nashwan, Shadi
Nashwan, Imad I. H.
author_facet Nashwan, Shadi
Nashwan, Imad I. H.
author_sort Nashwan, Shadi
collection PubMed
description In an end-to-end authentication (E2EA) scheme, the physician, patient, and sensor nodes authenticate each other through the healthcare service provider in three phases: the long-term authentication phase (LAP), short-term authentication phase (SAP), and sensor authentication phase (WAP). Once the LAP is executed between all communication nodes, the SAP is executed (m) times between the physician and patient by deriving a new key from the PSij key generated by healthcare service provider during the LAP. In addition, the WAP is executed between the connected sensor and patient (m + 1) times without going back to the service provider. Thus, it is critical to determine an appropriate (m) value to maintain a specific security level and to minimize the cost of E2EA. Therefore, we proposed an analytic model in which the authentication signaling traffic is represented by a Poisson process to derive an authentication signaling traffic cost function for the (m) value. wherein the residence time of authentication has three distributions: gamma, hypo-exponential, and exponential. Finally, using the numerical analysis of the derived cost function, an optimal value (m) that minimizes the authentication signaling traffic cost of the E2EA scheme was determined.
format Online
Article
Text
id pubmed-8347757
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-83477572021-08-08 An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme Nashwan, Shadi Nashwan, Imad I. H. Sensors (Basel) Article In an end-to-end authentication (E2EA) scheme, the physician, patient, and sensor nodes authenticate each other through the healthcare service provider in three phases: the long-term authentication phase (LAP), short-term authentication phase (SAP), and sensor authentication phase (WAP). Once the LAP is executed between all communication nodes, the SAP is executed (m) times between the physician and patient by deriving a new key from the PSij key generated by healthcare service provider during the LAP. In addition, the WAP is executed between the connected sensor and patient (m + 1) times without going back to the service provider. Thus, it is critical to determine an appropriate (m) value to maintain a specific security level and to minimize the cost of E2EA. Therefore, we proposed an analytic model in which the authentication signaling traffic is represented by a Poisson process to derive an authentication signaling traffic cost function for the (m) value. wherein the residence time of authentication has three distributions: gamma, hypo-exponential, and exponential. Finally, using the numerical analysis of the derived cost function, an optimal value (m) that minimizes the authentication signaling traffic cost of the E2EA scheme was determined. MDPI 2021-07-22 /pmc/articles/PMC8347757/ /pubmed/34372217 http://dx.doi.org/10.3390/s21154980 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Nashwan, Shadi
Nashwan, Imad I. H.
An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme
title An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme
title_full An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme
title_fullStr An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme
title_full_unstemmed An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme
title_short An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme
title_sort analytic model for reducing authentication signaling traffic in an end-to-end authentication scheme
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8347757/
https://www.ncbi.nlm.nih.gov/pubmed/34372217
http://dx.doi.org/10.3390/s21154980
work_keys_str_mv AT nashwanshadi ananalyticmodelforreducingauthenticationsignalingtrafficinanendtoendauthenticationscheme
AT nashwanimadih ananalyticmodelforreducingauthenticationsignalingtrafficinanendtoendauthenticationscheme
AT nashwanshadi analyticmodelforreducingauthenticationsignalingtrafficinanendtoendauthenticationscheme
AT nashwanimadih analyticmodelforreducingauthenticationsignalingtrafficinanendtoendauthenticationscheme