Smart City Gnosys

Smart city article details

Title A Secure Biometric-Based User Authentication Scheme For Cyber-Physical Systems In Healthcare
ID_Doc 4474
Authors Jha K.; Jain A.; Srivastava S.
Year 2024
Published International Journal of Experimental Research and Review, 39
DOI http://dx.doi.org/10.52756/ijerr.2024.v39spl.012
Abstract The effectiveness and advantages of Cyber-Physical Systems (CPS) are significantly influenced by the interconnectivity of individual devices or nodes, such as Internet of Things (IoT) devices. The exchange of data that is pertinent to a comprehensive job or capability plays a crucial role in numerous CPS applications, including healthcare monitoring in smart cities and homes and many more. Data exploitation in remote healthcare systems may have catastrophic consequences for patients; hence, a safe cryptographic technique is necessary. To address these security difficulties, a highly effective biometric based three-factor mutual authentication along with a key agreement scheme has been put forth that leverages the lightweight Elliptic Curve Cryptosystem (ECC). This scheme has been specifically designed to cater to the unique requirements of remote healthcare systems. The approach has been validated utilizing the Burrows-Abadi-Needham (BAN) logic, which verifies the effectiveness of mutual authentication. Also, the resistance to active and passive attacks was demonstrated through the use of the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Furthermore, a preliminary security evaluation is conducted to verify the resilience of the proposed system against several cryptographic attacks. Additionally, the suggested method is evaluated against existing state-of-the-art schemes and demonstrates superior performance in various security dimensions. © 2024 International Academic Publishing House (IAPH). All rights reserved.
Author Keywords Authentication; AVISPA tool; BAN logic; biometric; elliptic curve cryptosystem; wireless sensor network


Similar Articles


Id Similarity Authors Title Published
3498 View0.889Amintoosi H.; Nikooghadam M.A Novel Provably-Secure Ecc-Based Authentication And Key Management Protocol For Telecare Medical Information Systems2019 9th International Conference on Computer and Knowledge Engineering, ICCKE 2019 (2019)
12571 View0.873Reddy D.J.; Sreshta G.; Vaishnavi J.V.; Sumasri V.Blockchain With Lightweight Encryption Model For Identity Management In Remote Health CareCognitive Science and Technology, 2025 (2025)
47662 View0.865Prakash M.; Ramesh K.Secure Multimodal Biometric Authentication Framework With Perceptual Hashing And Lightweight CryptographyJournal of Electronic Imaging, 33, 5 (2024)
41179 View0.862Aldosary A.; Tanveer M.Paaf-Shs: Puf And Authenticated Encryption Based Authentication Framework For The Iot-Enabled Smart Healthcare SystemInternet of Things (Netherlands), 26 (2024)
2336 View0.862Boussada R.; Elhdhili M.E.; Saidane L.A.A Lightweight Privacy-Preserving Solution For Iot: The Case Of E-HealthProceedings - 20th International Conference on High Performance Computing and Communications, 16th International Conference on Smart City and 4th International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2018 (2019)
12684 View0.861Das D.; Landrum L.C.; Chatterjee P.; Ghosh U.; Hussain S.Blockchain-Enabled Communication Framework For Secure And Scalable Healthcare Data ProcessingConference Proceedings - IEEE SOUTHEASTCON (2025)
44973 View0.857Kore A.; Patil S.Reliable And Secure Data Transmission In Smart Healthcare Application Of Internet Of Things2021 IEEE Bombay Section Signature Conference, IBSSC 2021 (2021)
35254 View0.854Rajesh S.M.; Prabha R.Lightweight Cryptographic Approach To Address The Security Issues In Intelligent Applications: A SurveyIDCIoT 2023 - International Conference on Intelligent Data Communication Technologies and Internet of Things, Proceedings (2023)