Javascript must be enabled to continue!
An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme
View through CrossRef
In an end-to-end authentication (E2EA) scheme, the physician, patient, and sensor nodes authenticate each other through the healthcare service provider in three phases: the long-term authentication phase (LAP), short-term authentication phase (SAP), and sensor authentication phase (WAP). Once the LAP is executed between all communication nodes, the SAP is executed (m) times between the physician and patient by deriving a new key from the PSij key generated by healthcare service provider during the LAP. In addition, the WAP is executed between the connected sensor and patient (m + 1) times without going back to the service provider. Thus, it is critical to determine an appropriate (m) value to maintain a specific security level and to minimize the cost of E2EA. Therefore, we proposed an analytic model in which the authentication signaling traffic is represented by a Poisson process to derive an authentication signaling traffic cost function for the (m) value. wherein the residence time of authentication has three distributions: gamma, hypo-exponential, and exponential. Finally, using the numerical analysis of the derived cost function, an optimal value (m) that minimizes the authentication signaling traffic cost of the E2EA scheme was determined.
Title: An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme
Description:
In an end-to-end authentication (E2EA) scheme, the physician, patient, and sensor nodes authenticate each other through the healthcare service provider in three phases: the long-term authentication phase (LAP), short-term authentication phase (SAP), and sensor authentication phase (WAP).
Once the LAP is executed between all communication nodes, the SAP is executed (m) times between the physician and patient by deriving a new key from the PSij key generated by healthcare service provider during the LAP.
In addition, the WAP is executed between the connected sensor and patient (m + 1) times without going back to the service provider.
Thus, it is critical to determine an appropriate (m) value to maintain a specific security level and to minimize the cost of E2EA.
Therefore, we proposed an analytic model in which the authentication signaling traffic is represented by a Poisson process to derive an authentication signaling traffic cost function for the (m) value.
wherein the residence time of authentication has three distributions: gamma, hypo-exponential, and exponential.
Finally, using the numerical analysis of the derived cost function, an optimal value (m) that minimizes the authentication signaling traffic cost of the E2EA scheme was determined.
Related Results
What is Analytic Philosophy
What is Analytic Philosophy
Special Issue: What is Analytic PhilosophyReferencesHaaparantaG. P. Baker and P. M. S. Hacker. Frege: Logical Excavations. Oxford, Blackwell, 1984.M. Dummett. The Interpretation of...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
TYPES OF AI ALGORİTHMS USED İN TRAFFİC FLOW PREDİCTİON
TYPES OF AI ALGORİTHMS USED İN TRAFFİC FLOW PREDİCTİON
The increasing complexity of urban transportation systems and the growing volume of vehicles have made traffic congestion a persistent challenge in modern cities. Efficient traffic...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
Traffic Prediction in 5G Networks Using Machine Learning
Traffic Prediction in 5G Networks Using Machine Learning
The advent of 5G technology promises a paradigm shift in the realm of
telecommunications, offering unprecedented speeds and connectivity. However, the
...
A Traffic Flow Prediction Method Based on Blockchain and Federated Learning
A Traffic Flow Prediction Method Based on Blockchain and Federated Learning
Abstract
Traffic flow prediction is the an important issue in the field of intelligent transportation, and real-time and accurate traffic flow prediction plays a crucial ro...
MODELİNG OF TRAFFİC LİGHT CONTROL SYSTEMS
MODELİNG OF TRAFFİC LİGHT CONTROL SYSTEMS
Traffic light control systems are commonly utilized to monitor and manage the flow of autos across multiple road intersections. Since traffic jams are ubiquitous in daily life, A c...

