Mahmood, Khalid and Obaidat, Mohammad S and Shamshad, Salman and Alenazi, Mohammed JF and Kumar, Gulshan and Anisi, Mohammad Hossein and Conti, Mauro (2024) Cost-effective Authenticated Solution (CAS) for 6G-Enabled Artificial Intelligence of Medical Things (AIoMT). IEEE Internet of Things Journal, 11 (13). pp. 23977-23984. DOI https://doi.org/10.1109/jiot.2024.3387852
Mahmood, Khalid and Obaidat, Mohammad S and Shamshad, Salman and Alenazi, Mohammed JF and Kumar, Gulshan and Anisi, Mohammad Hossein and Conti, Mauro (2024) Cost-effective Authenticated Solution (CAS) for 6G-Enabled Artificial Intelligence of Medical Things (AIoMT). IEEE Internet of Things Journal, 11 (13). pp. 23977-23984. DOI https://doi.org/10.1109/jiot.2024.3387852
Mahmood, Khalid and Obaidat, Mohammad S and Shamshad, Salman and Alenazi, Mohammed JF and Kumar, Gulshan and Anisi, Mohammad Hossein and Conti, Mauro (2024) Cost-effective Authenticated Solution (CAS) for 6G-Enabled Artificial Intelligence of Medical Things (AIoMT). IEEE Internet of Things Journal, 11 (13). pp. 23977-23984. DOI https://doi.org/10.1109/jiot.2024.3387852
Abstract
The Internet of Things (IoT) is a network of interconnected objects, which congregate and exchange gigantic amounts of data. Usually, pre-deployed embedded sensors sense this massive data. Soon, several applications of IoT are anticipated to exploit emerging 6G technology. Healthcare is one of them, where the 6G-inspired paradigm may facilitate the users to exchange information through hundreds of sensors under the assumption of Artificial Intelligence of Things (AIoT). Integration of medical sensors with AIoT is known as Artificial Intelligence of Medical Things (AIoMT). The secure and seamless interactions among 6G-enabled AIoMT users should be the primary challenge. Furthermore, resource-constrained wearable sensing devices, with their inability to execute complex security solutions, provide an ideal attraction for malicious entities to launch diverse attacks. These challenges have motivated us to design a cost-effective authenticated solution (CAS) for 6G-enabled AIoMT healthcare applications. Our CAS protocol not only prevents cyber threats like impersonation session key secrecy, but it can also prevent physical threats like hardware tampering. We observe formal and informal security validations to endorse its robustness and effectiveness. Performance comparison reveals that CAS protocol offers maximum security enrichment. Moreover, CAS is cost-effective as it has achieved 33% and 60% reduction in computation and communication overheads, respectively, compared to contemporary competing related protocols.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | Authentication; Authentication Protocol; Key Agreement Protocol; Mutual Authentication |
Divisions: | Faculty of Science and Health Faculty of Science and Health > Computer Science and Electronic Engineering, School of |
SWORD Depositor: | Unnamed user with email elements@essex.ac.uk |
Depositing User: | Unnamed user with email elements@essex.ac.uk |
Date Deposited: | 16 Apr 2024 16:18 |
Last Modified: | 30 Oct 2024 17:18 |
URI: | http://repository.essex.ac.uk/id/eprint/38198 |
Available files
Filename: IEEE IoT Journal-Accepted version.pdf