Home / Journals / CMC / Online First / doi:10.32604/cmc.2026.077157
Special Issues
Table of Content

Open Access

ARTICLE

A Verifiably Secure and Efficient Authentication Protocol for Resource-Constrained IoT Devices in Cloud-Assisted E-Healthcare

Fahad Algarni1,2,*, Saeed Ullah Jan3
1 Faculty of Computing and Information Technology, University of Bisha, Bisha, Saudi Arabia
2 Smart Cyber-Physical System Research Centre, University of Bisha, Bisha, Saudi Arabia
3 Higher Education Department of Khyber Pakhtunkhwa, Government Degree College Wari (Dir Upper), Wari, Pakistan
* Corresponding Author: Fahad Algarni. Email: email

Computers, Materials & Continua https://doi.org/10.32604/cmc.2026.077157

Received 03 December 2025; Accepted 13 February 2026; Published online 24 April 2026

Abstract

With the increasing connectivity and intelligence of Internet-of-Things (IoT) devices, which interface with numerous aspects of our daily lives, security remains a major concern for IoT devices deployed in e-healthcare systems. The existing solutions demonstrate that authentication of IoT devices across all domains, especially in healthcare, poses significant vulnerabilities, including side-channel, insider, and replay attacks. Alternatively, it is not feasible for resource-constrained IoT devices due to the computational, communicational, and space overheads of modular exponentiation or bilinear pairing, or because it requires four to five round-trips for authentication. The rapid growth of IoT in the e-healthcare sector is expected to cross “50 billion” or more by 2030, highlighting desynchronization, man-in-the-middle (MITM) attacks, and unavailability flaws in e-healthcare. If the aforementioned security concerns are not adequately addressed, they will, in turn, escalate and lead to severe consequences. Therefore, this article introduces a security protocol for an e-healthcare system to ensure secure communication for the voluminous data collected by IoT devices and to transfer it to the cloud safely. The proof of correctness and robustness of the proposed protocol was conducted using BAN (Burrows-Abadi-Needham) logic, the Real-Or-Random (ROR) model, the ProVerif verification toolkit, and pragmatic discussions. The performance analysis section was addressed by measuring several key metrics, including communication, computation, space, and energy consumption, along with scalability. The results obtained demonstrate that the communication cost may be reduced by up to 76%, the computation cost by up to 92%, and the energy consumption by up to 31%.

Keywords

Authentication; confidentiality; logic; cryptography; vulnerability; authentication
  • 206

    View

  • 17

    Download

  • 0

    Like

Share Link