1. Introduction
The fifth generation (5G) network provides fast speeds, high data rates, very low latency, and reliable connections for intelligent devices, sensors, and actuators, as well as the ability to communicate through a single device, such as a smartphone. When 5G technology matures, it will provide 100 Gbps coverage, 10 GB/s peak data rates, and more than 100 billion smart device connections to the entire Internet of Things [1]. The high capacity and speed of the 5G network will provide many opportunities for the IoT environment. The Tactile Internet (TI) represents a future development goal with respect to the Internet of Things (IoT), including human–machine interaction and machine–machine interaction, which will enable real-time collaboration and innovative applications in the industrial, social, and commercial fields of the Internet [2,3].
The Tactile Internet will use 5G URLLC (ultra-reliable and low-latency communication) functionality to provide users with ultra-fast Internet so that haptic interaction can be realized through visual feedback [3]. This visual feedback relates to audio–visual interaction, real-time control of robotic systems and actuators, and real-time control of the human body and the environment around it. With the increasing availability of high-speed Internet connections, such low-latency functions will lead to enhanced human–machine (tactile) interactions that can be transmitted to the other end of the world in real time [1,3,4]. However, such messages may face security or performance risks once they are transmitted. Therefore, any unauthorized access may lead to an unplanned or unexpected surgery, which could lead to adverse consequences or even death.
The open nature of Tactile Internet connections makes them vulnerable to a variety of security attacks, including replay, denial of service, man-in-the-middle, differential privacy, error data injection, impersonation, and modification attacks, as well as malicious software attacks, requiring secure Tactile Internet access. The remote surgery application establishes a secure user authentication protocol, which allows authorized and registered surgeons to authenticate each other and to generate a shared secure session key for secure and reliable communications with others.
1.1. The Model of a Tactile Internet Remote Surgery Application
Figure 1 illustrates a simple model of a Tactile Internet remote surgery application. A hospital operating room includes robotic arms with tactile sensors and actuators; gateways, such as access points (APs); and patients to be operated on. A remote surgeon controls the robotic arm using instructions provided by a mobile device (or multiple mobile devices) and receives the results of the operation on the screen. All devices must be registered with a trusted institution (TA).
1.2. Related Works
The Tactile Internet can allow doctors to perform accurate, remote surgery more urgently than ever before. The transmission of the data would require the surgical manipulator to move the scalpel with a delay of less than 1 ms to allow the scalpel to move in the correct direction. To obtain the real-time status of the patient, high-resolution organ images and medical equipment data must also be sent back to doctors within 1 ms. Recently, many authenticated key agreement approaches have been developed for remote medical systems. For example, in 2018, Amin et al. [5] proposed a robust and anonymous patient monitoring system based on wireless medical sensor networks to provide secure access to patient data in WMSN environments. In the same year, Wu et al. [6] developed a lightweight and robust authentication scheme for personalized healthcare systems using wireless medical sensor networks and demonstrated that their scheme meets common security requirements and prevents attackers from tracking users. Using wireless medical sensor networks, Chandrakar [7] presented a secure remote user authentication protocol for healthcare monitoring that provides privacy, data security, and user authentication to access real-time health information over an insecure channel. Kaur et al. [8] presented a protocol in 2020 that provides the surgeon, robotic arm, and trusted authority (TA) with secure communications, leveraging the advantages of elliptic curve cryptography (ECC) and biometrics. In 2020, Nykvist et al. [9] developed and implemented a lightweight, portable IDS over wireless networks and evaluated throughput, power consumption, and response time. In 2021, Bolton et al. [10] discussed and considered potential data security and privacy issues that may arise when large amounts of data are processed and stored in the cloud. Additional research on the use of the Tactile Internet in remote surgery [8,11,12] provides important background information about the use of the Tactile Internet in remote surgery. For example, Wazid et al. [12] presented a generalized authentication model that can be used to perform authentication among communicating parties to ensure secure remote surgery in the TI environment. In 2021, Kamil et al. [11] proposed an authentication and key agreement (AKA) scheme for a Tactile Internet remote surgery application using lightweight cryptographic operations, such as the one-way hash function and bitwise exclusive OR (XOR), making the scheme ultra-lightweight and suitable for the Tactile Internet environment. However, the proposed scheme directly encrypts communication messages with the constant secret keys of the remote surgeon and the long-life secret key of the robotic arm, directly storing secret keys of the robotic arm in the gateway database; therefore, the scheme cannot resist robotic arm compromise attacks and stolen verifier attacks. Additionally, the scheme proposed by Kamil et al. misuses exclusive OR operations, preventing its correct execution.
1.3. Our Motivation
Many AKA schemes have been recently developed for a Tactile Internet for remote surgery. However, most of these schemes are subject to limitations in terms of security and efficiency. Performance improvement and security considerations are two major factors associated with the Tactile Internet because inappropriate and insecure authentication key agreements for the Tactile Internet may cause misjudgment and improper operation by medical staff, endangering the life of patients.
1.4. Our Contributions
In this investigation, we discuss the limitations of the scheme proposed by Kamil et al., including the failure to resist potential attacks and incorrect execution. In order to overcome these limitations, we investigation develop an enhanced authenticated key agreement scheme based on the scheme proposed by Kamil et al. for the Tactile Internet environment. The enhanced scheme adopts a one-time key to protect communication messages such that the adversary cannot derive valuable information from previous messages and protects secret keys of robotic arms with a secret gateway key. Thus, the enhanced scheme requires more computations and response time than the protocol proposed by Kamil et al. However, the enhanced scheme solves the previous limitations, provides improved functionality, and retains a low computational cost. The contributions of this study are summarized as follows.
1. In this investigation, we develop an efficient and secure authenticated key agreement scheme based on the scheme proposed by Kamil et al. for the Tactile Internet environment.
2. The enhanced scheme adopts a one-time key to protect communication messages and stores the secret keys of robotic arms, which are encrypted the secret gateway key, in the gateway database to overcome the limitations of the previous scheme.
3. Burrows–Abadi–Needham (BAN) logic provides mutual authentication and session key security through its authentication proof. The heuristic security analyses of the enhanced scheme are presented to verify other security requirements.
4. Compared with related schemes, the enhanced scheme avoids the limitations of pervious schemes, providing improved security properties and retaining low computational cost.
1.5. Organization of Paper
The rest of the paper is organized as follows. In Section 2, we introduce the scheme proposed by Kamil et al. and discuss its weaknesses. In Section 3, we introduce an enhanced authenticated key agreement scheme for the Tactile Internet environment. In Section 4, we analyze the security and performance of the enhanced scheme. Finally, in Section 5, we present our conclusions.
2. Preliminary
In this section, we review the authentication and key agreement scheme proposed by Kamil et al. and discuss its limitations. The notations used in this paper are elaborated in Table 1.
2.1. Review of the Scheme of Kamil et al.
In 2020, Kamil et al. [11] proposed an authentication and key agreement scheme using the Tactile Internet for remote surgery. Prior to the announcement, they discussed Tactile Internet technology in remote surgery, the potential of network architecture for the Internet of Thing (IoT), and the security issues of Tactile Internet technology in remote surgery.
The scheme proposed by Kamil et al. comprises four entities: a trusted authority (TA), remote surgeons, gateways, and robotic arms. Gateways act as system administrators and serve as central authentication points. Without BS, other entities would never be able to trust each other in the authentication and key agreement scheme. Kamil et al.’s scheme consists of the following phases: registration of the gateway and robotic arm, registration of the user, the authentication and key agreement phase, the password update phase, the addition of the dynamic robotic arm, and the revocation phase.
Table 1Notations.
Notation | Description |
---|---|
Trusted authority | |
Gateway | |
Robotic arm | |
Remote surgeon | |
|
Identity of gateway |
Concatenation operation | |
Timestamp at instant | |
Allowable network transmission delay | |
Bitwise exclusive OR (XOR) operation | |
Hash function | |
Session key | |
Adversary |
2.1.1. Gateway and Robotic Arm Registration Phase
Before placing the gateway and robot (or robotic arm) in the hospital operating room, they must register with the TA. These devices are generated and preloaded with secrets. The registration process is performed by the TA through the following steps.
Step 1: .
The trust authority (TA) first chooses a unique identity () and a one-way hash function operation () for itself. Next, the TA chooses and as the identities of the gateway () and a robotic arm (), respectively, picks a secret (), and computes and . Finally, the TA stores and sends to through a secure channel.
Step 2: .
After gateway receives , stores and sends to .
2.1.2. User Registration Phase
In this stage, when the remote surgeon wants to use the robotic arm for remote surgery, they first need to register with the TA. The process is as follows.
Step 1: .
The remote surgeon () first picks an identity (), a password (), and a random nonce () and computes and . Next, sends to the TA using a secure channel.
Step 2: .
When the TA receives , the TA at first picks a random and then computes and . After the TA stores into the memory of a mobile device, the TA sends the mobile device to the surgeon through a secure channel.
Step 3: Store in smart card.
When receives the mobile device, uses a smart card to compute and . Next, stores and in the smart card.
2.1.3. User Login Phase
First, must input his/her identity or password into the mobile device in order to access the service of robotic arms for remote surgery. Upon successful verification, the mobile device sends a login request message to the gateway (). The login process is as follows.
first inputs his identity () and password () and computes , , , and to verify . The mobile device checks whether is the same as the . If so, the identity and password of the surgeon are verified by the smart card. Otherwise, the session is aborted.
2.1.4. Authentication and Key Agreement Phase
In this phase, in order to perform remote surgery in an emergency, the remote surgeon needs to use the robotic arm to perform remote surgery on the patient through the authorization of the gateway device. The mutual authentication and key agreement process of the scheme proposed by Kamil et al. is described as follows.
Step 1: .
The mobile device of the remote surgeon () first picks a random nonce () and a timestamp () and computes , , , and . Next, the remote surgeon sends a login request message () to .
Step 2: .
After receives the authentication request message (), computes using the identity of gateway and () and computes to obtain the random number () of the remote surgeon. Then, checks the freshness of the message by verifying whether , where is the time at which the message is received, is the time at which it was sent, and is the transmission delay. If the timestamp is legal, computes to verify whether the is the same as . If the verification is successful, the surgeon () is authenticated by . Then, chooses a random nonce () and a timestamp () and computes ,, and . Finally, sends to the robotic arm ().
Step 3: .
Upon receiving the tuple , computes to obtain the random numbers and , where belongs to the gateway and belongs to the remote surgeon, and checks the freshness of the message by verifying whether , where , , and are the time at which the message was sent, the arrival time of the message, and the transmission delay, respectively. If the freshness of timestamp is verified, computes and . Finally, verifies whether is the same as . If verification is successful, the gateway is authenticated by . Next, chooses a random number () and a timestamp () and computes the session key , , and . Finally, sends to through a public channel.
Step 4: .
When receives , computes to obtain the random number of , using the random number of and timestamp , and checks the freshness of the message by verifying whether , where , , and are the time at which the message was sent, the arrival time of the message, and the transmission delay, respectively. If the freshness of the timestamp is legal, computes the session key and . checks whether is the same as . If so, the robotic arm () is authenticated by . Next, computes and and sends to , where is the timestamp.
Step 5: Verification of the remote surgeon.
When receives , first computes using the random number () and then checks the freshness of the message by verifying whether , where , , and are the time at which the message was sent, the arrival time of the message, and the transmission delay, respectively. If the timestamp is fresh, computes the session key and to verify . If the verification is successful, and are authenticated by .
The mutual authentication of the remote surgeon and the robotic arm requires the assistance of the gateway for remote authentication. Additionally, secure communication during remote surgery is achieved with the secret session key, .
2.1.5. Password Updating Phase
In this phase, when the remote surgeon thinks that his password has been leaked, for security reasons, he can change his password at any time. The password renewal phase is as follows.
The remote surgeon () inputs his original password () and identity () into the mobile device, and the mobile device computes , , , and to check whether is the same as . If the verification is successful, the password and identity of the surgeon are verified. Next, the card reader prompts to input a new password () and a nonce (). Then, it computes , , , , and . Finally, the mobile device replaces , , and , with , , and , respectively.
2.1.6. Dynamic Robotic Arm Addition Phase
After placing these robotic arms in the operation room, additional robots may be required for improved service delivery. The following steps are required.
The TA first chooses a new identity () and computes . The TA stores in the memory of the new robotic arm and sends the tuple to the gateway () through a secure channel. When receives the tuple , stores it in its repository.
2.1.7. Revocation Phase
When the remote surgeon’s mobile device is stolen by an attacker, the attacker can reuse the data from the mobile device, thus impersonating the legitimate doctor. The same method is applied to the robot arm; the attacker can analyze the sensitive information in the robotic arm and compute the session key to execute an attack. In addition, attackers can swap out a robotic arm with a cloned robotic arm, which can lead to life-threatening conditions in patients who require medical attention. The proposed scheme involves two revocation processes: revocation of compromised mobile devices and revocation of compromised robotic arms.
1. Revocation of Smart Card: Steps can be taken to prevent compromised mobile devices from gaining access to the network. The TA first chooses a new identity () and computes . Next, the TA sends the tuple to . When receives , replaces with and stores it in its database.
2. Revocation of Robotic Arm: Suppose is the identity of the malicious or compromised robot. In order to prevent the malicious or damaged robotic arm from being verified by the remote surgeon and accessing the network, the following steps are performed in order to log off the manipulator. The TA computes and sends to , where is the revocation request. When receives the tuple , computes . Finally, deletes the tuple from its database.
2.2. Limitations of the Authenticated Key Agreement Proposed by Kamil et al.
The authenticated key agreement scheme proposed by Kamil et al. directly encrypts communication messages between the gateway and the remote surgeon with the constant secret keys of the remote surgeon and directly encrypts communication messages between the gateway and the robot arm with the long-life secret key of the robotic arm so that an attacker who has captured a robotic arm can derive secret keys of the remote surgeon from previous messages and successfully impersonate the remote surgeon and the robotic arm. The attacker can successfully compute session keys from previous messages to decrypt communication messages between the remote surgeon, the gateway, and the robotic arm to trick legal participants. Additionally, the scheme of Kamil et al. directly stores secret keys of robot arms, so an attacker who has stolen the verifier table can successfully impersonate the robot arm. Accordingly, the scheme proposed by Kamil et al. cannot resist robotic arm compromise attacks and stolen verifier attacks. Moreover, the scheme proposed by Kamil et al. misuses exclusive OR operations, preventing its correct execution.
Below, we discuss the limitations of the scheme proposed by Kamil et al. in detail.
2.2.1. Failure to Resist Robotic Arm Compromise Attacks
1. Scenario I: Impersonation of a surgeon.
In the scheme proposed by Kamil et al., when a robotic arm () is compromised, an attacker () can obtain and . The attacker () obtains from previous communication messages and computes to obtain the random secrets () of the gateway () and of the remote surgeon (). Next, computes to obtain the random secret () of TA. obtains previous communication messages (,,, of and computes , . can compute , and and send out a service request () to impersonate , where is a nonce selected by , and is the current timestamp.
Upon receiving form , can compute and the session key () shared with and and successfully impersonate the surgeon (). Therefore, the scheme proposed by Kamil et al. fails to resist robotic arm compromise attacks.
2. Scenario II: Impersonation of a gateway.
According to the analyses of Scenario I, the attacker () can easily derive , the random secret () from previous communication messages. Upon receiving from , computes and . Then, chooses a nonce () and picks the current timestamp ( and then computes , , and and sends to .
Upon receiving , computes and the session key () shared with and . Next, computes and , and sends to , where is the current timestamp. successfully impersonates the gateway (); therefore, the scheme proposed by Kamil et al. fails to resist robotic arm compromise attacks.
3. Scenario III: Violation of session key security.
According to the analyses of Scenario I, the attacker () can easily derive , the random secret () from previous communication messages. First, impersonate to compute , , and , and to send a service request () to , where is a nonce selected by , and is the current timestamp.
Then, eavesdrops on communications between and another robotic arm () and obtains and , where is the identity of , is the secret key of , , , , , and . Upon receiving from , where and , can compute and the secret key of , .
Although the attacker () does not have ’s identity (), can still monitor other communications between , , and some robotic arms (). computes and verifies whether is a current timestamp. If successful, makes sure that is and is from and that is from . Then, computes . Accordingly, can obtain the session key () of , , and to decrypt communication messages between , , and to perform man-in-the-middle attacks and modification attacks and to trace .
2.2.2. Failure to Resist Stolen Verifier Attacks
In the register phase of the scheme proposed by Kamil et al., the gateway () stores and for each robotic arm (). An attacker who has stolen the verifier table can impersonate the robotic arm (), as it obtains the secrets ( of and has the same ability as .
2.2.3. Failure to Execute Correctly
In the scheme proposed by Kamil et al., the surgeon () cannot correctly compute in Step 1. Because is longer than , where and , cannot directly execute an exclusive OR operation of and . Similar problems also occur in that cannot correctly compute in Step 2, cannot correctly compute in Step 3, and cannot correctly compute in Step 4.
3. Enhanced Authenticated Key Agreement Scheme for Tactile Internet Environment
In this section, we develop an enhanced AKA scheme based on the AKA scheme proposed by Kamil et al. for the Tactile Internet environment. In order to overcome the limitations of the AKA scheme proposed by Kamil et al., the enhanced scheme adopts a one-time key to protect communication messages such that an attacker who captures the robotic arm cannot derive valuable information from previous messages to perform impersonation attacks. To avoid stolen verifier attacks, does not directly store the secret key () of in its database and protects with the secret key () of . Even if the attacker steals the verification table, he/she still cannot obtain the secret key () of to successfully impersonate .
A number of phases are involved in the enhanced scheme, including registration of gateways and robotic arms, registration of remote surgeons, login of remote surgeons, authentication and key agreement, updating of passwords, adding dynamic robotic arms, and revocation. Because the password updating phase, dynamic robotic arm addition phase, and revocation phase of the enhanced scheme are similar to the scheme proposed by Kamil et al., they are not discussed here. Below, we provide a detailed description of the gateway and robotic arm registration phase, the remote surgeon registration phase, the remote surgeon login phase, the authentication phase, and the key agreement phase. Figure 2 shows a flow chart of the enhanced scheme.
3.1. Registration Phase of Gateway and Robotic Arms
This phase provides the registration process for the gateway and robotic arms with the TA, as shown in Figure 3. The registration process is as follows.
Step 1: .
The trust authority (TA) at first chooses a unique identity () and a one-way hash function operation (). Next, the chooses and as the identities of the gateway () and the robotic arm (), respectively, picks a secret (), and computes and . Finally, the stores and sends to through a secure channel.
Step 2: .
After the gateway () receives , computes and stores . Finally, sends to .
3.2. User Registration Phase
In this phase, the remote surgeon () registers with the trusted authority (). Each surgeon () has a smart card with the information of the surgeon. The registration process of the remote surgeon is shown in Figure 4.
Step 1: .
The remote surgeon () first picks his/her own identity (), password (), and a random number and computes and . Finally, sends to the through a secure channel.
Step 2: .
After receiving , the first picks a random identity () and computes . Then, the stores (,) in the memory of a mobile device and sends it to through a secure channel. Upon receiving the mobile device, computes and the verification message, . Then, stores , , , and in the smart card.
3.3. Login, Authentication, and Session Key Agreement Phase
In order to perform remote operations in case of an emergency, the remote surgeon () needs to log in to a smart card and send a verification message to access the gateway (). The gateway () sends a verification message to the robot after the remote surgeon has been identified. The robot passes the authentication message to the remote surgeon via the gateway. Finally, the gateway, remote coverage, and robotic arm establish a session key for the current login session. The authentication and key agreement of the proposed protocol is shown in Figure 5, and the details are summarized below.
Step 1: .
The remote surgeon () inputs his/her and into the mobile device; then, mobile device computes to obtain the random number () and computes , , and to verify . If successful, the mobile device picks the current timestamp () and a random number () and computes and and verification the message, . Finally, sends to the gateway ().
Step 2: .
When receives , checks whether the timestamp () is less than . If successful, computes , , and to verify . If successful, picks a random number () and the current timestamp () and computes to obtain the of , then computes , , and a verification message, , where is the secret of the robotic arm, and ensures the freshness of messages.
Step 3: .
After receiving from , checks whether the timestamp () is less than . If successful, computes , , and to verify . If successful, picks a random number () and the current timestamp () and computes the session key (), , and the verification message (). Then, sends to .
Step 4: .
When receives , checks whether the timestamp () is less than . If successful, computes , , and the verification message () to verify . If successful, picks the current timestamp () and computes , , , , , and . Finally, sends to .
Step 5: Update and in .
After receives , checks whether the timestamp () is less than . If successful, computes and to obtain the random number () of and the random number () of . Next, computes the session key (), , and . Then, computes to verify . If successful, computes and updates and via and in the smart card.
4. Security and Performance Analysis
An analysis and comparison of the performance and security of the enhanced scheme are provided in this section.
4.1. Authentication Proof of the Proposed Scheme Using BAN Logic
BAN logic [13] is used in this subsection to verify that the proposed scheme satisfies the session key security and mutual authentication requirements. Table 2 lists the notations of BAN logic.
4.1.1. Inference Rules of BAN Logic
Below, we present a list of the rules and logical postulates of BAN logic [13].
Rule 1. : If entity believes that secret is shared with and sees message is encrypted using , then believes that once said .
Rule 2. : If entity believes that is fresh and entity once said , then believes that believes .
Rule 3. : If entity believes that has jurisdiction over and believes , then believes that is true.
Rule 4. : If entity believes that is fresh and believes , then believes secret that is shared between entities and .
Rule 5. : If entity believes that is fresh, then believes in the freshness of .
4.1.2. Goals of Authentication and Key Agreement
In this subsection, we demonstrate that the proposed scheme satisfies the following goals to ensure its security according to the above assumptions and postulates.
Goal 1: .
Goal 2: .
Goal 3: .
Goal 4: .
Goal 5: .
Goal 6: .
4.1.3. Idealized Form
The proposed scheme is transformed into an idealized form in the following manner.
M1. .
M2.
.
M3. (.
M4. (
.
4.1.4. Assumptions
According to the following assumptions, in this subsection, we prove that the proposed scheme satisfies the security properties.
|#.
|#.
|.
|.
|.
|.
|#.
|#.
|.
|.
|.
|.
|.
|.
4.1.5. Verification
Based on the above assumptions and the logic of BAN, the following confirms the correctness of the proposed scheme. By using Message M1,
{}.
From Rule 1 and ,
: | |.
From Rule 2 and ,
: | |.
Then, from Rule 3 and ,
: |.
According to Rule 4, and ,
: |.
Further, using Rule 2, and ,
: | |. Goal 1
Similarly, by using Message M3,
{}.
From Rule 1 and ,
: | |.
From Rule 2 and and ,
: | |.
From Rule 3 and ,
: |.
According to Rule 4, and ,
: |.
Using Rule 2, and , we have
: | |. Goal 2
By using Message M2,
◁ {
}.
From Rule 1 and ,
: ||.
From Rule 2 and ,
: | |.
Then, from Rule 3 and ,
: |.
According to Rule 4, and ,
: |.
Further, using Rule 2, and ,
: | |. Goal 3
Similarly, by using Message M4,
◁ {
}.
From Rule 1 and ,
: ||.
From Rule 2 and ,
: | |.
Then, from Rule 3 and ,
: |.
According to Rule 4, and ,
: |.
Further, using Rule 2, and ,
: | |. Goal 4
By using Message M4,
: | |.
From Rule 2 and ,
: | |.
Then, from Rule 3 and ,
: |.
According to Rule 4, and ,
: .
Further, using Rule 2, and ,
: |. Goal 5
By using Message M2,
: ||.
From Rule 2 and ,
: | |.
Then, from Rule 3 and ,
: |.
According to Rule 4, and ,
: |.
Further, using Rule 2, and ,
: | |. Goal 6
The proof is concluded.
4.2. Security Analysis
The security requirements of the enhanced scheme are discussed in this subsection. The enhances scheme uses the properties of the scheme proposed by Kamil et al. [9]. The arguments of some security requirements, including provision of strong anonymity; session key establishment; perfect forward secrecy; and resistance to replay attacks, impersonation attacks, offline user login credentials guessing attacks, insider attacks, mobile device loss attacks, and denial of service attacks, are similar to those in the scheme proposed by Kamil et al. and are therefore not discussed here. These security requirements include resistance to robotic arm compromise attacks and resistance to stolen verifier table attacks, as described below.
4.2.1. Resistance to Robotic Arm Compromise Attacks
In the enhanced scheme, even if the attacker compromises the robotic arm () and obtains (,) from , the attacker cannot indirectly obtain information about remote surgeons and the gateway (). Additionally, because the (,) of each robotic arm is independent, as destroying a robotic arm, the attacker can communicate with , but it does not affect the security of ’s communication with other robotic arms. The same is true for the gateway. Therefore, the proposed scheme is resilient against robot compromise attack.
4.2.2. Resistance to Stolen Verifier Attacks
In the enhanced scheme, the gateway () stores (,) instead of (,), where , is the secret key of , and is the secret key of . The verifier table does not contain ’s secret key (). Then, an attacker who has stolen the verifier table cannot derive from (,) without , and it is difficult to impersonate . Therefore, the enhanced scheme is resilient against stolen verifier table attacks.
4.3. Functionality Comparison
Table 3 compares the enhanced AKA scheme with related AKA schemes in term of security functionality. The enhanced AKA scheme provides more security requirements than related AKA schemes and is secure against potential attacks. Furthermore, it can resist robotic arm compromise attacks and stolen verifier table attacks.
4.4. Performance Comparisons
Table 4 shows comparisons between the enhanced AKA scheme and related AKA schemes in terms of computational cost, where denotes the execution time of a one-way hash function, denotes the execution time of a point multiplication based on ECC, and denotes the execution time of a fuzzy extractor. The experiment is run on an Intel CPU i3-3220 3.3 Ghz, RAM 4096 MB, Windows 7 Professional 64-bit, Eclipse Java Mars and Java SE 1.8. The hash function uses SHA-1, the point multiplication is based on ECC with a 16-bit key, and the fuzzy extractor refers to [11,17].
The scheme proposed by Kamil et al. [11] requires 20 hash operations, the scheme proposed by Amin et al. [5] requires 37 hash operations, the scheme proposed by Wu et al. [6] requires 34 hash operations, the scheme proposed by Chandrakar [7] requires 29 hash operations, the scheme proposed by Guo et al. [14] requires 36 hash operations, and our enhanced scheme requires 35 hash operations. The scheme proposed by Soni et al. [15] requires 31 hash operations, 6 point multiplications based on ECC, and 11 fuzzy extractor operations. The scheme proposed by Li et al. [16] requires 20 hash operations and 8 point multiplications based on ECC. Both these schemes ([15,16]) require time-consuming point multiplications based on ECC. The enhanced AKA scheme adopts a one-time key to protect communication messages and protects the verifier table with the Gi’s secret key, so it requires more computations and response time than the AKA protocol proposed by Kamil et al. However, the enhanced AKA scheme addresses the limitations of the scheme proposed by Kamil et al., providing improved functionality while retaining a low computational cost.
5. Conclusions
In this paper, we addressed the limitations of the AKA scheme proposed by Kamil et al. for a Tactile Internet environment, including failure to resist robotic arm compromise attacks, failure to resist stolen verifier attacks, and failure to execute correctly. In order to address these limitations, an enhanced AKA scheme based the scheme proposed by Kamil et al. was developed by adopting a one-time key to protect communication messages and protecting the verifier table with a gateway secret key. Although the enhanced scheme requires more computations than the AKA protocol proposed by Kamil et al. it retains a low computational cost and provides more security features. Therefore, the enhanced AKA scheme is suitable for the Tactile Internet environment.
Formal analysis, X.Y.; Funding acquisition, T.-F.L.; Investigation, W.-Y.C.; Methodology, X.Y.; Software, W.-Y.C.; Supervision, T.-F.L.; Validation, C.-C.C.; Visualization, W.-Y.C.; Writing—original draft, X.Y. and C.-C.C.; Writing—review & editing, T.-F.L. and C.-C.C. All authors have read and agreed to the published version of the manuscript.
Not applicable.
Not applicable.
Not applicable.
The authors declare no conflict of interest.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Figure 3. Registration process of gateway and robotic arms of the enhanced scheme.
Figure 5. Login, authentication, and session key agreement phase of the enhanced scheme.
BAN logic notations and respective abbreviations [
Notation | Abbreviation |
---|---|
|
Entity
|
|
|
|
|
|
Formula
|
|
|
|
|
|
Functionality comparisons.
Security Attribute | [ |
[ |
[ |
[ |
[ |
[ |
[ |
Our AKA |
---|---|---|---|---|---|---|---|---|
Provision of strong anonymity | O | O | X | O | X | O | O | O |
Provision of session key establishment | O | - | O | - | O | O | O | O |
Provision of perfect forward secrecy | O | O | O | O | O | O | O | O |
Resistance to replay attacks | O | X | X | O | O | O | X | O |
Resistance to impersonation attacks | O | X | O | O | O | O | O | O |
Resistance to offline user login credentials guessing attack | O | X | O | O | O | O | O | O |
Resistance to insider attacks | O | - | O | O | O | O | O | O |
Resistance to mobile device loss attacks | O | X | O | O | O | O | O | O |
Resistance to denial of service attacks | O | O | O | O | O | O | O | O |
Resistance to robotic arm compromise attacks | X | X | O | O | O | O | O | O |
Resistance to stolen verifier attacks | X | O | O | X | O | X | X | O |
O: the property is satisfied, X: the property is not satisfied; -: the property is not considered.
Computation cost comparison.
Scheme | Mobile Device/User | Gateway | Sensor Node/Robotic Arm | Total/Response Time |
---|---|---|---|---|
[ |
|
|
|
|
[ |
|
|
|
|
[ |
|
|
|
|
[ |
|
|
|
|
[ |
|
|
|
|
[ |
|
|
|
|
[ |
|
|
|
|
Our AKA |
|
|
|
References
1. Maier, M.; Chowdhury, M.; Rimal, B.P.; Van, D.P. The tactile internet: Vision, recent progress, and open challenges. IEEE Commun. Mag.; 2016; 54, pp. 138-145. [DOI: https://dx.doi.org/10.1109/MCOM.2016.7470948]
2. Shafiq, A.; Ayub, M.F.; Mahmood, K.; Sadiq, M.; Kumari, S.; Chen, C.-M. An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure. J. Sens.; 2020; 2020, 8829319. [DOI: https://dx.doi.org/10.1155/2020/8829319]
3. Simsek, M.; Aijaz, A.; Dohler, M.; Sachs, J.; Fettweis, G. 5G-enabled tactile internet. IEEE J. Sel. Areas Commun.; 2016; 34, pp. 460-473. [DOI: https://dx.doi.org/10.1109/JSAC.2016.2525398]
4. Fettweis, G.P. The tactile internet: Applications and challenges. IEEE Veh. Technol. Mag.; 2014; 9, pp. 64-70. [DOI: https://dx.doi.org/10.1109/MVT.2013.2295069]
5. Amin, R.; Islam, S.H.; Biswas, G.P.; Khan, M.K.; Kumar, N. A robust and anonymous patient moni-toring system using wireless medical sensor networks. Future Gener. Comput. Syst.; 2018; 80, pp. 483-495. [DOI: https://dx.doi.org/10.1016/j.future.2016.05.032]
6. Wu, F.; Li, X.; Sangaiah, A.K.; Xu, L.; Kumari, S.; Wu, L.; Shen, J. A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Gener. Comput. Syst.; 2018; 82, pp. 727-737. [DOI: https://dx.doi.org/10.1016/j.future.2017.08.042]
7. Chandrakar, P.A. Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks. Int. J. Ambient Comput. Intell.; 2019; 10, pp. 96-116. [DOI: https://dx.doi.org/10.4018/IJACI.2019010106]
8. Kaur, K.; Garg, S.; Kaddoum, G.; Guizani, M. Secure authentication and key agreement protocol for tactile internet-based tele-surgery ecosystem. Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC); Dublin, Ireland, 7–11 June 2020; pp. 1-6.
9. Nykvist, C.; Larsson, M.; Sodhro, A.H.; Gurtov, A. A lightweight portable intrusion detection communication system for auditing applications. Int. J. Commun. Syst.; 2020; 33, e4327. [DOI: https://dx.doi.org/10.1002/dac.4327]
10. Bolton, T.; Dargahi, T.; Belguith, S.; Al-Rakhami, M.; Sodhro, A. On the Security and Privacy Challenges of Virtual Assistants. Sensors; 2021; 21, 2312. [DOI: https://dx.doi.org/10.3390/s21072312]
11. Kamil, I.A.; Ogundoyin, S.O. A lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment. Comput. Commun.; 2021; 170, pp. 1-18. [DOI: https://dx.doi.org/10.1016/j.comcom.2021.01.025]
12. Wazid, M.; Das, A.K.; Lee, J.H. User authentication in a tactile internet based remote surgery environment: Security issues, challenges, and future research directions. Pervasive Mob. Comput.; 2019; 54, pp. 71-85. [DOI: https://dx.doi.org/10.1016/j.pmcj.2019.02.004]
13. Burrows, M.; Abadi, M.; Needham, R.M. A logic of authentication. Proc. R. Soc. Lond. A Math. Phys. Sci.; 1989; 426, pp. 233-271.
14. Guo, H.; Xu, Y.G.T.; Zhang, X.; Ye, J. A secure and efficient three-factor multigateway authenti-cation protocol for wireless sensor networks. Ad Hoc Netw.; 2019; 95, 101965. [DOI: https://dx.doi.org/10.1016/j.adhoc.2019.101965]
15. Soni, P.; Pal, A.K.; Islam, S.H. An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system. Comput. Methods Programs Biomed.; 2019; 182, 105054. [DOI: https://dx.doi.org/10.1016/j.cmpb.2019.105054] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/31499422]
16. Li, X.; Peng, J.; Obaidat, M.S.; Wu, F.; Khan, M.K.; Chen, C. A secure three-factor user authentica-tion protocol with forward secrecy for wireless sensor network systems. IEEE Syst. J.; 2020; 4, pp. 39-50. [DOI: https://dx.doi.org/10.1109/JSYST.2019.2899580]
17. He, D.; Kumar, N.; Lee, J.-H.; Sherratt, R.S. Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans. Consum. Electron.; 2014; 60, pp. 30-37. [DOI: https://dx.doi.org/10.1109/tce.2014.6780922]
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
The Tactile Internet enables physical touch to be transmitted over the Internet. In the context of electronic medicine, an authenticated key agreement for the Tactile Internet allows surgeons to perform operations via robotic systems and receive tactile feedback from remote patients. The fifth generation of networks has completely changed the network space and has increased the efficiency of the Tactile Internet with its ultra-low latency, high data rates, and reliable connectivity. However, inappropriate and insecure authentication key agreements for the Tactile Internet may cause misjudgment and improper operation by medical staff, endangering the life of patients. In 2021, Kamil et al. developed a novel and lightweight authenticated key agreement scheme that is suitable for remote surgery applications in the Tactile Internet environment. However, their scheme directly encrypts communication messages with constant secret keys and directly stores secret keys in the verifier table, making the scheme vulnerable to possible attacks. Therefore, in this investigation, we discuss the limitations of the scheme proposed by Kamil scheme and present an enhanced scheme. The enhanced scheme is developed using a one-time key to protect communication messages, whereas the verifier table is protected with a secret gateway key to mitigate the mentioned limitations. The enhanced scheme is proven secure against possible attacks, providing more security functionalities than similar schemes and retaining a lightweight computational cost.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details



1 Department of Medical Informatics, Tzu Chi University, No. 701, Zhongyang Road, Sec. 3, Hualien 970, Taiwan
2 Department of Computer Science, University of Tsukuba, Tsukuba 3058577, Japan
3 Department of Medical Informatics, Chung Shan Medical University, No. 110, Section 1, Jianguo North Road, South District, Taichung City 402, Taiwan; Department of Information Management, Ming Chuan University, No. 5 De Ming Rd., Taoyuan City 333, Taiwan