z-logo
open-access-imgOpen Access
An Efficient and Secure Authentication for Ambient Assisted Living System
Author(s) -
Myung-Kyu Yi,
Taeg Keun Whangbo
Publication year - 2022
Publication title -
journal of web engineering/journal of web engineering on line
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.151
H-Index - 13
eISSN - 1544-5976
pISSN - 1540-9589
DOI - 10.13052/jwe1540-9589.2136
Subject(s) - computer science , authentication (law) , computer security , scheme (mathematics) , hash function , cryptography , message authentication code , bitwise operation , computer network , mathematical analysis , mathematics , programming language
Although the birthrate is declining, the average life expectancy continues to increase. Therefore, it is more important for elderly people to maintain their independence while staying at home. Ambient Assisted Living (AAL) includes the use of devices and methods of ensuring that elderly people can stay safe and age at home rather than at a facility. Assisted living services help people live as independently and safely as possible when they can no longer perform everyday activities on their own. Because the information transmitted in AAL systems is personal, the security and privacy of such data are becoming important issues that must be addressed. Herein, we propose an efficient and secure authentication scheme for an AAL system. Our proposed authentication scheme not only satisfies several important security requirements of such a system but also withstands various types of attacks. Moreover, the proposed authentication scheme achieves lightweight performance by manipulating basic cryptographic operations including bitwise-eXclusive-OR (XOR) and hash functions. We simulated our proposed authentication scheme using Automated Validation of Internet Security Protocols and Applications (AVISPA), which is a prominent security verification tool. Security and performance analysis show that our proposed scheme is not only robust against several attacks and has a lower computational cost in terms of execution time than those of existing authentication schemes.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here