SLMAS: A Secure and Light Weight Mutual Authentication Scheme for the Smart Wheelchair
-
Published:2023-05-28
Issue:11
Volume:13
Page:6564
-
ISSN:2076-3417
-
Container-title:Applied Sciences
-
language:en
-
Short-container-title:Applied Sciences
Author:
Almazroi Abdulwahab Ali1ORCID, Liaqat Misbah1, Ali Rana Liaqat2ORCID, Gani Abdullah3
Affiliation:
1. Department of Information Technology, College of Computing and Information Technology at Khulais, University of Jeddah, Jeddah 21959, Saudi Arabia 2. Department of Physics, COMSATS University Islamabad, Islamabad 45550, Pakistan 3. Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur 50603, Malaysia
Abstract
The modern innovation called the Internet of Things (IoT) empowers individuals to connect to anybody and anything at any point, wherever. The application of the IoT in smart cities concerning smart healthcare management can improve patient welfare, user acceptance, the standard of living, and accurate illness monitoring. Powered wheelchairs (PW) with sensors, computers, and other connected assistive technologies are called smart wheelchairs. Smart wheelchairs with sensing abilities are intended to offer universal connectivity using cloud and edge computing technology. Numerous outstanding people were impacted by paralyzing phenomena, including Stephen Hawking and Max Brito. The issue of legitimacy is one of the most important difficulties in e-health applications, because of how sensitive the technology is, and this needs to be appropriately handled. To safeguard the data transport, usage, and interchange between sensor nodes/smart wheelchairs and servers, e-health applications require an authentication method. As all conversations use wireless channels, e-health apps are exposed to various vulnerabilities. Additionally, the IoT has limited computational and power capacity limitations. To combat the various security risks, the present research offers a user authentication technique that is efficient and ensures anonymity. The suggested method creates a safe connection for the authorized entity and forbids unauthorized entities from accessing the Internet of Things sensor nodes. The suggested approach has lower communication and computation overheads than the traditional techniques, making it more effective. In addition, the security verification of the presented protocol is scrutinized through AVISPA. The proposed scheme, on average, requires only 12.4% more computation cost to execute. Compared to the existing approaches, the suggested protocol’s extra computational cost can be compensated for by its enhanced security, while the suggested method’s communication cost is 46.3% smaller.
Funder
University of Jeddah, Jeddah, Saudi Arabia
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference55 articles.
1. Oueida, S., Kotb, Y., Aloqaily, M., Jararweh, Y., and Baker, T. (2018). An edge computing based smart healthcare framework for resource management. Sensors, 18. 2. Al Shabibi, M.A.K., and Kesavan, S.M. (2021, January 30–31). Iot based smart wheelchair for disabled people. Proceedings of the 2021 International Conference on System, Computation, Automation and Networking (ICSCAN), Puducherry, India. 3. Bourgeois-Doyle, R.I. (2004). George J. Klein: The Great Inventor, NRC Research Press. Number 2. 4. A secure communication protocol for unmanned aerial vehicles;Khan;Comput. Mater. Contin.,2022 5. AI-based smart and intelligent wheelchair;Rahimunnisa;J. Appl. Res. Technol.,2020
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|