1. Introduction
5G (the fifth generation) networks, also known as next generation of 4G, is the newest standard of mobile telecommunication from 3GPP which is being deployed, providing high-speed network, big capacity, and scalability [1,2]. 5G networks have an efficient effect in energy consumption and provide a quality experience via a large number of communication devices [3]. End point devices transmit data and request for services through a small base station (SBS) and major base station (MBS) [1,4,5]. A device connects with SBS by using a high-band spectrum (5G mmWave) technology and device-to-device (D2D) communication, which is one of the key technologies of 5G networks [1,4,5]. Moreover, 5G combines and connects virtual systems to cloud environments through artificial intelligence and helps derive different calculating models [6]. 5G will totally change connected services and devices through higher reliability, connectivity, and cloud storage [6]. Because 5G network is a multi-server environment, conventional schemes for single server structure are not suitable [3]. Many reasons lead to multi-server environment requirements including load balance, expanded coverage, and security [3].
IoT becomes a focus because of being predicted to be an important component of 5G networks [1]. IoT applying 5G infrastructure changes application scenario in many fields especially real-time communication between machines, data, and people [7]. Moreover, 5G network can work with amount of IoT devices [7]. We can see a form of 5G-based IoT networks which assembles smart phone, virtual reality, sensors, and other numerous wireless communication devices [3]. As the result, IoT with 5G technology influences social life largely [3].
Nowadays, medical healthcare systems face many challenges, such as infrastructure, connections, professional requirements, data management, and real-time monitoring [8]. About 40% countries have less than one doctor for one thousand population and less than 18 sickbeds for ten thousand population according to global survey data from 2005 to 2015 [8,9]. 5G networks have expanded rapidly around the world including in healthcare [5]. Internet of things (IoT) with a 5G environment provides solutions for network layers, including enhancing quality of service, router and jamming control, and resource optimization, to solve some challenges of smart medical healthcare [1]. Lloret et al. utilized a smart phone to continuously monitor chronic patients in IoT with a 5G environment [10]. Chen et al. proposed a mobile medical system based on IoT with a 5G environment to continuously evaluate and monitor diabetes patients [11]. This augers a new and reliable business model of medical health with 5G technology. 5G and IoT will become important parts of the next generation smart medical healthcare [1].
Medical privacy is of the utmost importance. Once leaked, it not only brings huge economic losses and loss of credibility to hospitals and other related institutions, but also does potential harm to patients, and, more importantly, it can even endangers lives of patients, which will seriously damage the healthy development of medical industry [12]. Unfortunately, the healthcare industry has lagged to meet users’ expectations. The health data, which is stored in conventional system, are very difficult to share due to varying standards and data formats, i.e., current healthcare ecosystem is ill-suited for the instantaneous needs of modern user. Maintaining privacy of user data is very important and failure to this will result in implications related to financial as well as legal sectors [13]. If a person’s medical information is the key to finding clinical treatment, how to maintain the privacy of health records is a central issue that determines the success of medical practice. Increasingly, people interact with health-care providers, using digital media technologies [14,15,16]. Accompanying the acceleration of medical data collection are rapid advancements in algorithmic computing capacities to aggregate, analyze, and draw sensitive inferences about individuals from their health data [15,17,18,19].
Since the above description, federated anonymous identity management (FAIDM) for medical privacy protection in telemedicine systems is proposed in this paper, which can provide a secure way to protect medical privacy. There are some properties below. (i) The proposed scheme provides federated identity management which can manage identity of devices in a hierarchical structure efficiently. (ii) Identity authentication will be achieved by mutual authentication. (iii) The proposed scheme provides session key to secure transmitted data which is related to privacy of patients. (iv) The proposed scheme provides anonymous identities for devices in order to reduce the possibility of leaking transmitted medical data and real information of device and its owner. (v) If one of devices transmit abnormal data, the proposed scheme provides traceability for servers of medical institute. (vi) the proposed scheme provides signature for non-repudiation.
The rest of this paper is organized as follows. We introduce related works in Section 2, including telemedicine, healthcare certificate, ID-based cryptosystem, definitions of Chebyshev chaotic maps, and chaotic maps-based signature which we apply in our scheme. In Section 3, we describe the proposed scheme. We discuss the security and performance analysis of proposed scheme in Section 4 and Section 5, respectively. Finally, some concluding remarks are presented.
2. Related Works
In this section, we introduce telemedicine, Chebyshev chaotic maps, healthcare certificate, chaotic maps-based signature, and some related works.
2.1. Telemedicine
Telemedicine is a technology of electronic message and telecommunication related to healthcare [20,21]. The patient will send healthcare related information, which is important, sensitive, and private, to healthcare services through public networks when using telemedicine technology [21]. Medical professionals can know users’ health condition if they are able to view the information immediately [21]. Data transmission security will be discussed, such as eavesdropping, man-in-the-middle attack, data tempering attack, message modification attack, and data interception attack [22]. Technical support is not enough though Health Insurance Portability and Accountability Act (HIPAA), General Data Protection Regulation (GDPR), and Safe Harbor Laws have been made which provide personal information privacy [22,23,24].
A general telemedicine system can be divided to three levels [25]. Level 1 (primary healthcare unit) consist of users with webcam, smart phone, or wearable devices; Level 2 (city or district hospital) is clinic or local hospital which patient may visit before being transferred to large hospital or medical center; Level 3 (specialty center) will take part in telemedicine in case of rare disease or incurable disease [25]. Figure 1 illustrates a remote patient monitoring system in 5G IoT architecture which can assist medical professional to monitor remote patient’s biodata through specific devices [2,25,26]. Mobile health plays an important role on medical healthcare monitoring and alarm system and clinical data storage and maintenance system. In remote patient monitoring systems, wearable devices and mobile phones belong to a sensor layer which is responsible for gathering measured data. Measured data is transmitted to network layer, IoT gateway for example, through small base station (SBS) communication. After that, data will be transmitted out of the local area network to major base station (MBS), such as 5G link, through MBS communication. Both the network layer and communication layer are responsible for data processing. Finally, data will be transmitted to a medical services servers of clinic or local hospital called architecture layer, such as an electronic health records (EHR) system, cloud storage, and analytics. Authorized medical professionals in the main hospital can access medical services servers to monitor a patient. Authorized medical professionals in specialty center will involve and observe measured data in case of rare disease or incurable disease.
In this paper, we introduced a cryptographic protocol which can be applied in asynchronous telemedicine and synchronous telemedicine and provide communication security and user anonymity to protect patient’s privacy.
2.2. Healthcare Certificate
Medical and healthcare devices nowadays are required certifications under safety and functional requirements [27]. Meanwhile, healthcare service providers should go through a certification procedure based on ISO 27000 and 20000 series in order to process healthcare data [27]. However, different kinds of healthcare devices have different safety and privacy requirements [27]. Establishing a general certification for all healthcare sectors is difficult [27]. One of the solutions to the problem would be to design segregated schemes with links between them, such as a healthcare certificate issued by a trusted institution [27]. All medical and healthcare devices should be issued certificates to proof that they are qualified in safety and functional requirements [27]. In other words, using certified components can be a requirement in medical and healthcare field.
2.3. ID-Based Cryptosystem
In 1985, Shamir introduced the concept of identity-based (ID-based) cryptosystem [28]. The main difference from traditional public key cryptosystem is that it derives the user’s public key from public information that uniquely identifies the user. Since it is meaningful information, we do not need any certificate to prove the validity of the corresponding public key. In 2002, Gentry et al. proposed hierarchical ID-based cryptography, also called HIDC [29]. The major purpose of Gentry et al.’s scheme is reducing the loading of private key generation (called PKG) and the risk of key escrow [29]. In the structure of HIDC, there is a key generation center at each level, and the one at the top level is root PKG. The root PKG is the third trusted center, and there will be legal sub-level key generation centers where users under the same domain register to. In 2009, Yan et al. discovered that HIDC was suitable for cloud computing and improved the register phase in order to achieve federated identity management because as more and more cloud service providers provide various cloud services via different interfaces, federal identity management becomes a rising issue [30]. The cloud service providers in Yan et al.’s scheme can compose an alliance, and users can sign on with one account and use various cloud services [30]. However, Yan et al.’s scheme [30] only proposed mutual authentication for security except for rules of identity authentication code, and it did not mention the possible security problems of cloud computing. Nevertheless, Yan et al.’s scheme [30] does not provide user anonymity. Park et al. [31] proposed an HIDC scheme for VANETs which provided vehicle user anonymity, but it is not suitable for cloud computing. Shen et al. introduced an HIDC scheme with time-bound and key management for multicast systems [32]. Fremantle and Aziz [33] proposed a cloud-based federal identity management mechanism for IoT, and Maria et al. [34] proposed a lightweight federal identity management mechanism for IoT. However, federal identity management in 5G IoT environment is still lack of discussions, not to mention telemedicine in a 5G IoT environment.
2.4. Chebyshev Chaotic Maps
The chaotic system is characterized by a sensitive dependence on initial conditions, pseudo-randomness, and ergodicity [35,36,37]. These features have the excellent properties of diffusion and confusion, which are important in cryptography [35,36]. Researchers have proposed image encryption in chaotic maps [38,39]. Definitions of Chebyshev chaotic maps are introduced below.
The Chebyshev polynomial is a polynomial in x of degree n, defined as .
The recurrent relation of is defined as for any , , and .
One of the most important properties of Chebyshev polynomials is semi-group property which establishes for any and . The interval [−1, 1] is invariant under the action of the map . Therefore, the Chebyshev polynomial restricted to the interval [−1, 1] is a well-known chaotic map for all n > 1. It has a unique continuous invariant measure with positive Lyapunov exponent ln n. For n = 2, Chebyshev maps reduces to well-known logistic maps.
In order to enhance property of Chebyshev chaotic maps, Zhang [40] proved that the semi-group property holds for Chebyshev polynomials defined on interval . This paper utilizes the following enhanced Chebyshev polynomials.
where , , and N is a large prime number. According to the equations, the semi-group property still holds, and the enhanced Chebyshev polynomials also commute.
Chaotic maps-based discrete logarithm problem (CMDLP). Given two elements x and y, it is computationally infeasible to find the integer n such that .
Chaotic maps-based Diffie-Hellman problem (CMDHP). Given three elements x, , and , it is computationally infeasible to compute .
2.5. Chaotic Maps-Based Signature
Chebyshev chaotic maps has been utilized not only in authentication, key agreement schemes but signature schemes. Chain and Kuo first proposed a digital signature scheme based on chaotic maps [41]. Several signature schemes based on chaotic maps have been proposed recently. For example, Tahat and Hijazi [42] proposed an enhanced signature scheme to improve Chain and Kuo’s [41]; Tahat et al. proposed an ID-based cryptographic model for Chebyshev chaotic maps to demonstrate the transformation model of ID-based schemes [43]; Tahat et al. proposed an ID-based blind signature based on chaotic maps [44]. Meshram et al. focused on online/offline short signature schemes and proposed schemes using chaotic maps [45], such as ID-based short signature scheme and subtree-based short signature scheme for wireless sensor network [46]. In this paper, we apply Meshram et al.’s ID-based online short signature scheme [45].
3. Proposed Scheme
In this paper, we proposed a FAIDM for medical privacy protection in 5G telemedicine systems. The notations of the scheme are shown as Table 1. The system structure of proposed scheme includes remote server node, gateway node (), and constrained node (). A constrained node is in a sensor layer of a proposed 5G IoT remote patient monitoring system structure and can be in devices which gather measured data, such as sensors or wearable devices that can be carried by a human. The role of these devices consists of monitoring or sensing the environment, so they collect and transmit data to gateway nodes. For example, in a healthcare application, sensors can be planted in or on a human’s body in order to collect health-related data. Gateway nodes, which are SBSs/MBSs, are in the network or communication layers of the proposed 5G IoT remote patient monitoring system structure, and it can be assumed that the gateway nodes have enough energy resources, performance processors, and memory. Gateway nodes process received data collected by the different constrained nodes and forward the to the remote server node. Remote server node is in architecture layer of proposed 5G IoT remote patient monitoring system structure and can be assumed that remote server node has no limitations of computing resource. Medical professionals in the architecture layer can continuously follow a patient’s health status based on data received. Note that the interaction between communication and the architecture layer should be secure which may be guaranteed by functions in the core network, such as authentication server function (AUSF), authentication credential repository and processing function (ARPF), subscription identifier de-concealing function (SIDF), and security anchor function (SEAF) [47,48], but secure communication between these two layers is not discussed in our scheme. The remote server node takes part in the system initialization and generating system parameters. A constrained node has to register to any legitimate gateway node for becoming legitimate. A gateway node has to register to the remote server node for becoming legitimate. When a patient wears a wearable healthcare device and goes home from hospital, the device transmits measured data through an IoT gateway () at home which is in different domain from hospital. The system structure is show as Figure 2.
The proposed scheme consists of seven phases: System initialization phase, gateway node registration phase, constrained node registration phase, mutual authentication and key agreement phase, anonymous identity distribution phase, and anonymous signature and verification phase. The notations of proposed scheme are shown in Table 1.
Before system initialization phase, the healthcare services provider needs to apply for certificates from healthcare certification authority before providing healthcare services. The healthcare certification authority should be a credible and dependent institute, such as National Health Service Business Services Authority (NHSBSA) of United Kingdom [49], European Federation Gateway Service (EFGS) of European Commission [50], American Hospital Association Certification Center (AHA-CC) of USA [51], Pharmaceuticals and Medical Devices Agency (PMDA) of Ministry of Health, Labor and Welfare, Japan [52], or Healthcare Certification Authority (HCA) of Ministry of Health and Welfare, Taiwan [53]. The certificate is regarded as the root certificate in the system, and only certified healthcare services provider can obtain .
3.1. System Initialization Phase
In the remote server node initial phase, the remote server node S, which provides telemedicine services and is certified by healthcare certification authority, sets up parameters by performing following steps.
Step 1: The healthcare certification authority issues a certificate to remote server node S which provides telemedicine services and is certified by healthcare certification authority.
Step 2: The remote server node S generates a secret value , a big prime p, and random number and computes .
Step 3: The remote server node S choses a symmetric encryption algorithm , a symmetric decryption algorithm , collision-resistance one-way hash functions (), and a collision-resistance secure one-way chaotic hash function (.).
Step 4: The remote server node S outputs public parameters and private parameters .
Step 5: The gateway node generates two large random primes (, ), , and as follows. Then, the gateway node selects a random integer , where and gcd (, ) = 1, and makes it public. After that, the gateway node computes , where and and keeps it secretly.
3.2. Gateway Node Registration Phase
In this phase, gateway node interacts with remote server node S for registration. To deal with the registration request submitted by the gateway node , the remote server node S validates the gateway node ’s legitimacy then issues the private key and certificate via a secure channel. Note that remote server node S computes a private key by gateway node ’s registration information. Figure 3. illustrates process of gateway node registration phase. Detailed descriptions are stated as follows:
Step 1: The gateway node chooses an identifier and submits to remote server node S.
Step 2: Upon receiving from gateway node , remote server node checks the format of . If is valid, remote server node S computes correspond to , generates from , and sends (, ) via secure channel to the gateway node .
(1)
(2)
Step 3: The gateway node chooses a random number as secret value and computed and stores to complete gateway node registration phase.
(3)
3.3. Constrained Node Registration Phase
The constrained node submits registration information to gateway node in this phase. The gateway node verifies the constrained node ’s legitimacy then issues private key and certificate to complete this phase. Note that the gateway node computes private key by constrained node ’s registration information. Figure 4. illustrates process of constrained node registration phase. Detailed descriptions are stated as follows:
Step 1: Constrained node chooses an identifier and a random number as his own secret, computes , and sends (, ) to gateway node .
(4)
Step 2: Upon receiving from constrained node , gateway node checks the format of . If is valid, gateway node computes private key correspond to , generates from , and sends (, ) to constrained node via secure channel.
(5)
(6)
Step 3: The constrained node stores (, ) to complete the constrained node registration phase.
3.4. Mutual Authentication and Key Agreement Phase
After the constrained node joins the remote server node alliance as a remote server node member, it can use the services not only provided by the registered services provider but also other services provider in the same remote server node alliance. When the constrained node applies for remote server node services, the gateway node and constrained node will executive mutual authentication to ensure the further interaction between the gateway node and constrained node is secure and validated. Figure 5. illustrates process of mutual authentication and key agreement phase. Detailed descriptions are stated as follows:
Step 1 Constrained node chooses a random number , computes and , and sends () to gateway node .
(7)
(8)
Step 2: Upon receiving (), gateway node obtains by decrypting and verifies is valid. If is valid, gateway node progresses to steps below, or gateway node abandons request.
(9)
Step 3: Gateway node computes (, , , , , , ) and sends () to the constrained node .
(10)
(11)
(12)
(13)
(14)
(15)
(16)
Step 4: Upon receiving (), constrained node computes (, ) and verifies . If result of verification is true, constrained node computes and sends to gateway node .
(17)
(18)
(19)
(20)
Step 5: Upon receiving , gateway node verifies . If the result of verification is true, mutual authentication and key agreement is completed.
(21)
3.5. Anonymous Identity Distribution Phase
If the constrained node needs an anonymous identity for some remote server node services, the gateway node will generate an anonymous identity and the corresponding private key for constrained node according to the registration information. Note that anonymous identity will compute by adding constrained node’s ID to ensure their connection. Figure 6. illustrates process of anonymous identity distribution phase. Detailed descriptions are stated as follows:
Step 1: Gateway node generates a random number , uses session key to encrypt and , and generates and sends pseudonym to constrained node .
(22)
Step 2: Upon receiving , constrained node computes and and sends to gateway node .
(23)
(24)
Step 3: After receiving , gateway node decrypts with and checks using and . If it holds, gateway node computes and encrypts with . Then, gateway node encrypts to and sends to constrained node .
(25)
(26)
(27)
(28)
(29)
Step 4: Upon receiving , gateway node verifies . If result of verification is true, gateway node obtain by decrypting C, and anonymous identity distribution phase is completed.
(30)
(31)
(32)
3.6. Anonymous Signature and Verification Phase
Gateway node (verifier) receives and verifies message with signature generated by anonymous private key using verification function. Figure 7. illustrates process of anonymous signature and verification phase. Detailed descriptions are stated as follows:
Step 1: Constrained node chooses a random number , computes (, , ) for further computation.
(33)
(34)
(35)
Step 2: Constrained node chooses a random number so that is the gth bit of . Then, constrained node computes (, ) to obtain and , generates signature with signature , and sends to gateway node .
(36)
(37)
(38)
(39)
(40)
Step 3: Upon receiving signature , gateway node verifies signature . If holds, signature is accepted.
(41)
4. Security Analysis
We present formal verification using BAN logic [54] and theoretical analyses to prove that proposed scheme can achieve security properties and resist potential common attacks.
4.1. Formal Verification Using BAN Logic
BAN logic has become a widely accepted and well-known logical methodology for analyzing security of schemes [54,55,56,57,58,59,60,61,62,63,64,65]. The goal of BAN logic is to verify the exchanged information and the belief relationship among communicating parties and analyze protocols by deriving beliefs to proof that honest and legitimate parties can correctly execute and complete a protocol [54,66,67,68]. We apply BAN logic [54] to prove the authenticity of our scheme. The notations used in BAN logic [54] analysis are defined as follows. P and Q are principles, X and Y are statements, C is channel, r and w are set of readers and writers respectively, and K is encryption key. P|X denotes that P believes X; P|~X denotes that P once said X; C(X) means that X is transited via channel C; r(C) and w(C) denotes as the set of readers and writers of C respectively. PC(X) means that P sees C(X). X is transited via C and can be observed by P, and P must be a reader of C to read X. PX|C means that P sees X via C. (X)K denotes that X is encrypted with the key K. PQ means that P and Q can establish a secure communication channel by using K. The logical postulates in BAN logic [54] are described using rules below.
Rule 1. : If P receives and reads X via C, then P believes that X has arrived on C and P sees X.
Rule 2. : If P sees a hybrid message (X, Y), then P sees X and Y separately.
Rule 3. : If P believes that C can only be written by P and Q, then P believes that if P receives X via C, then Q said X.
Rule 4. : If P believes that Q said a hybrid message (X, Y), then P believes that Q has said X and Y separately.
Rule 5. : If P believes that is its extended chaotic maps-based Diffie–Hellman secret and that is the extended chaotic maps-based Diffie–Hellman component from Q, then P believes that is the symmetric key shared between P and Q.
Rule 6. : If P believes that another Q said X and P also believes that X is fresh, then P believes that Q has recently said X.
Rule 7. : If P believes that a part of a mixed message X is fresh, then it believes that the whole message (X, Y) is fresh.
Rule 8. : If P believes that Φ1 implies Φ2 and P believes that Φ1 is true, then P believes that Φ2 is true.
The proposed scheme is described in logic as below.
Step 1. (, ()
Step 2. (, )
Table 2 lists used assumptions, where A and B are and , but A B.
Based on to the assumptions and logical analyses, the proposed scheme must realize goals in Table 3.
To accomplish the Goal 1, we have Equations (42) and (43). Equations (42) and (43) must hold because of Rule 5 and A5.
(42)
(43)
Next, we have Equations (44) and (45) that must hold because of A3 and Rule 8 to accomplish Equation (43).
(44)
(45)
We have Equation (46) which must hold because of Rule 6 and 7 and A4 to accomplish Equation (45).
(46)
We have Equations (47)–(49) which must hold because of Rule 1, 2, and 3, and A1 and A2 to accomplish Equation (46).
(47)
(48)
(49)
We have the proposed scheme realizes that G1 is achieved by using Rule 5. Similarly, we have that the proposed scheme realizes G2 by using the same arguments of G1.
We have Equations (50) and (51) which must hold because of Rule 3 and A3 to accomplish G3.
(50)
(51)
We have Equations (51) and (52) which must hold because of Rule 6 and 7 and A4 to accomplish Equation (51).
(52)
We have Equations (47), (48), and (53) which must hold because of Rule 1, 2, and 3, and A1 and A2 to accomplish Equation (53).
(53)
Thus, the proposed scheme realizes G3 is achieved. Similarly, using the same arguments of G3, the proposed scheme realizes G4. Therefore, the proposed scheme realizes G1, G2, G3, and G4.
4.2. Theoretical Analyses
We present theoretical analyses to prove that proposed scheme can achieve security properties and resist potential common attacks.
4.2.1. Security of Secret Key
We assume that adversary wants to get the master secret key obtained by remote server node, gateway node and constrained node , such like and . The adversary must have to solve the question based on CMDLP. If an adversary wants to get the gateway node ’s secret key by compute , adversary needs to solve the question based on CMDLP. On the other hand, the gateway node generates the secret key for the constrained node . by performing . The gateway node use private key and its own secret in the computing process, hence only gateway node . can know the constrained node ’s secret key.
4.2.2. Session Key Confirmation and Security of Session Key
We provide session key confirmation which can guarantee the correctness of the encryption key in the session through message authentication code and . If the adversary wants to obtain a session key , the adversary has to solve CMDHP even with knowledge of . Moreover, session key is not the same every time because of random number .
4.2.3. Mutual Authentication
In the authentication process, constrained node and gateway node compute their session key by public parameters (). In addition, each party generates message authentication code and by and respectively to verify their validity. Moreover, because the feature of HIDC, gateway node can realize constrained node comes from which cloud services provider by public parameter .
4.2.4. Device Anonymity
After mutual authentication phase, constrained node can obtain pseudonym private key corresponding to pseudonym identity from supplier gateway node . The pseudonym identity involve not only constrained node ’s but also time stamp , that is to ensure every time the constrained node can obtain different pseudonym identity to avoid attack by remove the linkage between the real identity and pseudonym identity. Besides, is computed by a supplier with its own secret. That is, only the supplier who gave to the constrained node can recover the constrained node’s real identity.
4.2.5. Traceability of Anonymity
Server node S can audit transmission history by recovering anonymous ID . The gateway node decrypts with secret to recover anonymous real identity by performing .
4.2.6. Unforgeability
If the adversary wants to forge validated anonymous identity, adversary has to acquire gateway node ’s secret and private key . The adversary has to solve CMDLP if adversary wants to compute gateway node ’s secret and private key from public parameter .
4.2.7. Without Assistance of Registration Center
Ying and Nayak [4] and Ul Haq et al. [5] proposed scheme for multi-server 5G networks which included a registration center (RC) in their system structures. RC is a third party for both sides of communication, and two parties have to go through registration phase to RC before communication. Privilege attack or malicious insider attack may occur if the adversary is in RC, and risk of message leakage may happen. If privilege attack or malicious insider attack happen in telemedicine system, patience privacy may be damaged. Moreover, system structure including RC in 5G networks is no difference from the one in conventional networks. In proposed scheme, we introduced hierarchical system structure which is suitable for 5G networks without RC or trusted third party.
4.2.8. Non-Repudiation and Security of Signature
When constrained node executes signature function based on Chebyshev chaotic maps with anonymous private key to generate signature . Gateway node can verify . As the result, non-repudiation can be achieved. We apply signature Meshram et al.’s ID-based online short signature scheme [45] in anonymous signature and verification phase, and security of signature has been proven using Bellar et al.’s method [69].
4.2.9. Resistant to Bergamo et al.’s Attack
Bergamo et al.’s attack [70] is based on two conditions: Attackers can obtain related elements (x, , , ) or several Chebyshev polynomials pass through the same point due to the periodicity of cosine function. In the authenticated key exchange phase of the proposed scheme, attackers cannot obtain any of the related elements (x, , , ) because they are encrypted in transmitted messages and only the user and server can retrieve the decryption key. Moreover, the proposed protocol utilizes the extended Chebyshev polynomials, in which the periodicity of the cosine function is avoided by extending the interval of x to [40]. As a result, our scheme can resist the attack proposed by Bergamo et al. [70].
5. Performance Analysis
We present comparisons of Yan et al.’s [30], Hu et al.’s [71], Ying and Nayak’s [4], Ul Haq et al.’s [5], and proposed schemes concerning security requirements and computational complexity comparison.
5.1. Security Requirements Comparison
As shown in Table 4, proposed scheme provides all listed security requirements. Yan et al.’s [30] and Hu et al.’s [71], and proposed schemes utilize hierarchical system structure. Yan et al.’s [30] and Ying and Nayak’s [4] only achieve one security requirement. Hu et al.’s [71] scheme achieves mutual authentication and anonymity, and Ul Haq et al.’s [5] scheme achieves mutual authentication, session key confirmation, and anonymity. None of mentioned previous schemes achieve traceability of anonymity, unforgeability, and non-repudiation except proposed scheme.
5.2. Computational Complexity Comparison
We present a computational complexity comparison of our scheme with Yan et al.’s [30], Hu et al.’s [71], Ying and Nayak’s [4], and Ul Haq et al.’s [5] schemes in Table 5. We can ignore the time taken for computing XOR operation because the value is too low to influence the result. Hu et al.’s [71], Ying and Nayak’s [4], and Ul Haq et al.’s [5] schemes take more computational cost than Yan et al.’s [30] and ours. Hu et al.’s scheme [71] takes the most computational cost, and the reason may be that Hu et al.’s scheme [71] is the only scheme which performs exponentiation operations among them. Ying and Nayak’s [4] and Ul Haq et al.’s [5] schemes take more computational cost than Yan et al.’s [30] and ours because Ying and Nayak’s [4] and Ul Haq et al.’s [5] schemes perform more not only one-way hash function operations but elliptic curve point multiplications. The results have proven that performing an elliptic curve point multiplication takes more time than a Chebyshev chaotic maps operation, and, compared to RSA and ECC, Chebyshev polynomials can offer smaller key size and faster computation [42,43,72,73,74]. However, Yan et al.’s scheme [30] performs only two elliptic curve point multiplications in total while our scheme performs six Chebyshev chaotic maps operations. For the above reason, Yan et al.’s scheme [30] takes less time than our scheme. Although Yan et al.’s scheme [30] is more efficient than our scheme by a narrow margin, Yan et al.’s scheme [30] cannot provide key confirmation because of lacking session key agreement, and neither can Ying and Nayak’s scheme [4]. Moreover, Yan et al.’s scheme [30] cannot provide mutual authentication, anonymity, traceability of anonymity, unforgeability, and non-repudiation. Figure 8. illustrates computational complexity of receiver/gateway node with varying number of devices.
6. Conclusions
5G networks has an efficient effect in energy consumption and provides quality of experience and amount of devices communication, and 5G will change connected services and devices through higher reliability, connectivity, and cloud storage. IoT applying 5G infrastructure changes application scenario in many fields especially real-time communication between machines, data, and people. IoT with 5G environment provides solutions of network layer, including enhancing quality of service, router and jamming control, and resource optimization, to solve challenges of smart medical healthcare. Medical privacy is important in smart medical healthcare because data leaking brings potential harm to patients and hospital. We propose a FAIDM for medical privacy protection in 5G telemedicine systems which provides federated identity management which provide a secure way to protect medical privacy. To achieve privacy preservation, we provide anonymous identity to constrained nodes for reducing exposure of personal private data. Our scheme provides features below. (i) Proposed scheme provides federated identity management which can manage identity of devices in a hierarchical structure efficiently. (ii) Identity authentication will be achieved by mutual authentication between devices and SBSs/MBSs. (iii) The proposed scheme provides session key to secure transmitted data which is related to privacy of patients. (iv) The proposed scheme provides anonymous identities for devices in order to reduce the possibility of leaking transmitted medical data and real information of device and its owner. (v) If one of devices transmit abnormal data, the proposed scheme provides traceability of anonymous identities for servers of medical institute to check specific device. (vi) the proposed scheme provides anonymous signature for non-repudiation of devices, and records of signatures can be used for periodical audit of medical institute.
Author Contributions
Conceptualization, C.-L.H. and T.-W.L.; methodology, C.-L.H. and T.-W.L.; security analysis, T.-W.L.; writing—original draft preparation, T.-W.L.; writing—review and editing, T.-W.L.; supervision, C.-L.H. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by Ministry of Science and Technology, Taiwan, grant number MOST 108-2221-E-182-011, Healthy Aging Research Center, Chang Gung University, Taiwan, grant number EMRPD1K0461 and EMRPD1K0481, and Chang Gung University, Taiwan, grant number PARPD3K0011.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
This study did not report any data.
Conflicts of Interest
The authors declare no conflict of interest.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Figures and Tables
Figure 1. A general telemedicine system with asynchronous telemedicine and synchronous telemedicine scenario.
Figure 8. Computational complexity of receiver/gateway node with varying number of devices.
Notations of the proposed scheme.
Notations | Definitions |
---|---|
The secrete value of remote server node S | |
The secrete value of ith gateway node () | |
The secrete value of ijth constrained node () | |
Private key of after registering to remote server node | |
Private key of after registering to | |
’s anonymous private key issued by | |
Identity of , , and ’s anonymous identity | |
Public parameters of generated by secrete values | |
The session key of and | |
Collision-resistance one-way hash functions | |
Collision-resistance secure one-way chaotic hash function using K as the key | |
The symmetric encryption and decryption using as the key | |
The message authentication code algorithm of and | |
The certification issued by healthcare certification authority to remote server node S. | |
The certification issued by remote server node S to which is generate from . | |
The certification issued by to which is generate from . |
Assumptions of logic of the proposed scheme.
Assumptions | Definitions |
---|---|
A1. A r(CA, B) | A can read from the channel CA, B. |
A2. A | (w(CA, B) = {A, B}) | A believes that A and B can write on CA, B. |
A3. A | (B|~) | A believes that B only says what it believes. |
A4. A | #(NA) | A believes that NA is fresh. |
A5. A | (A) | A believes that is its extended chaotic maps-based Diffie-Hellman secret. |
Goals of the proposed scheme.
Goals | Definitions |
---|---|
G1. | ( ) | Constrained node believes that is a symmetric key shared between participants and . |
G2. | ( ) | Gateway node believes that is a symmetric key shared between participants and . |
G3. | | ( ) | Constrained node believes that Sj is convinced of . is a symmetric key shared between and |
G4. | | ( ) | Gateway node believes that U is convinced of is a symmetric key shared between and . |
Security requirements comparison.
Security Requirements | Yan et al. [30] | Hu et al. [71] | Ying and Nayak [4] | Ul Haq et al. [5] | Ours |
---|---|---|---|---|---|
Mutual authentication | X | O | X | O | O |
Session key confirmation | X | X | X | O | O |
Anonymity | X | O | O | O | O |
Traceability of anonymity | X | X | X | X | O |
Unforgeability | X | X | X | X | O |
Non-repudiation | X | X | X | X | O |
Without RC | O | O | X | X | O |
Computational complexity comparison.
Scheme | Yan et al. [30] | Hu et al. [71] | Ying and Nayak [4] | Ul Haq et al. [5] | Ours | |
---|---|---|---|---|---|---|
Role | ||||||
Sender/constrained node |
|
|
|
|
|
|
Receiver/gateway note |
|
|
|
|
|
|
Both ends |
|
|
|
|
|
: Time for performing a Chebyshev chaotic maps operation; : Time for performing an elliptic curve point multiplication; Tsym: Time for performing a symmetry encryption operation; Te: Time for performing an exponentiation operation; : Time for performing a one-way hash function operation; = 42.04; = 126.16; Tsym = 17.4; Te = 1044;
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
Featured Application
This work can be applied in 5G telemedicine systems which can remote monitor health condition of patients and provide medical related data to medical professional. Devices on patients, which are IoT devices, should be managed properly, and proposed scheme can achieve the purpose while preserving privacy.
Abstract5G networks have an efficient effect in energy consumption and provide a quality experience to many communication devices. Device-to-device communication is one of the key technologies of 5G networks. Internet of Things (IoT) applying 5G infrastructure changes the application scenario in many fields especially real-time communication between machines, data, and people. The 5G network has expanded rapidly around the world including in healthcare. Telemedicine provides long-distance medical communication and services. Patient can get help with ambulatory care or other medical services in remote areas. 5G and IoT will become important parts of next generation smart medical healthcare. Telemedicine is a technology of electronic message and telecommunication related to healthcare, which is implemented in public networks. Privacy issue of transmitted information in telemedicine is important because the information is sensitive and private. In this paper, 5G-based federated anonymous identity management for medical privacy protection is proposed, and it can provide a secure way to protect medical privacy. There are some properties below. (i) The proposed scheme provides federated identity management which can manage identity of devices in a hierarchical structure efficiently. (ii) Identity authentication will be achieved by mutual authentication. (iii) The proposed scheme provides session key to secure transmitted data which is related to privacy of patients. (iv) The proposed scheme provides anonymous identities for devices in order to reduce the possibility of leaking transmitted medical data and real information of device and its owner. (v) If one of devices transmit abnormal data, proposed scheme provides traceability for servers of medical institute. (vi) Proposed scheme provides signature for non-repudiation.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details


1 Graduate Institute of Business and Management, Chang Gung University, Taoyuan 333, Taiwan;
2 Graduate Institute of Business and Management, Chang Gung University, Taoyuan 333, Taiwan;