Open Access iconOpen Access

ARTICLE

crossmark

Analysis of the Desynchronization Attack Impact on the E2EA Scheme

Shadi Nashwan*

Computer Science Department, College of Computer and Information Sciences, Jouf University, Sakaka, 42421, Saudi Arabia

* Corresponding Author: Shadi Nashwan. Email: email

Computer Systems Science and Engineering 2022, 41(2), 625-644. https://doi.org/10.32604/csse.2022.020799

Abstract

The healthcare IoT system is considered to be a significant and modern medical system. There is broad consensus that these systems will play a vital role in the achievement of economic growth in numerous growth countries. Among the major challenges preventing the fast and widespread adoption of such systems is the failure to maintain the data privacy of patients and the integrity of remote clinical diagnostics. Recently, the author proposed an end-to-end authentication scheme for healthcare IoT systems (E2EA), to provide a mutual authentication with a high data rate between the communication nodes of the healthcare IoT systems. Although the E2EA authentication scheme supports numerous attractive security services to resist various types of attack, there is an ambiguous view of the impact of the desynchronization attack on the E2EA authentication scheme. In general, the performance of the authentication scheme is considered a critical issue when evaluating the applicability of such schemes, along with the security services that can be achieved. Therefore, this paper discusses how the E2EA authentication scheme can resist the desynchronization attack through all possible attack scenarios. Additionally, the effect of the desynchronization attack on the E2EA scheme performance is analyzed in terms of its computation and communication costs, based on a comparison with the recently related authentication schemes that can prevent such attack. Moreover, this research paper finds that the E2EA authentication scheme can not only prevent the desynchronization attack, but also offers a low cost in terms of computations and communications, and can maintain consistency and synchronization between the communication nodes of the healthcare IoT systems during the next authentication sessions.

Keywords


Cite This Article

APA Style
Nashwan, S. (2022). Analysis of the desynchronization attack impact on the E2EA scheme. Computer Systems Science and Engineering, 41(2), 625-644. https://doi.org/10.32604/csse.2022.020799
Vancouver Style
Nashwan S. Analysis of the desynchronization attack impact on the E2EA scheme. Comput Syst Sci Eng. 2022;41(2):625-644 https://doi.org/10.32604/csse.2022.020799
IEEE Style
S. Nashwan, “Analysis of the Desynchronization Attack Impact on the E2EA Scheme,” Comput. Syst. Sci. Eng., vol. 41, no. 2, pp. 625-644, 2022. https://doi.org/10.32604/csse.2022.020799



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1404

    View

  • 897

    Download

  • 0

    Like

Share Link