Open Access iconOpen Access

ARTICLE

crossmark

LSAP-IoHT: Lightweight Secure Authentication Protocol for the Internet of Healthcare Things

Marwa Ahmim1, Nour Ouafi1, Insaf Ullah2,*, Ahmed Ahmim3, Djalel Chefrour3, Reham Almukhlifi4

1 Networks and Systems Laboratory, Department of Computer Science, Badji Mokhtar University, Annaba, 23000, Algeria
2 Institute for Analytics and Data Science, University of Essex, Colchester, CO4 3SQ, UK
3 Department of Computer Science, University of Souk-Ahras, Souk-Ahras, 41000, Algeria
4 Cybersecurity Department, College of Computer Science and Engineering, Taibah University, Medina, 42353, Saudi Arabia

* Corresponding Author: Insaf Ullah. Email: email

Computers, Materials & Continua 2025, 85(3), 5093-5116. https://doi.org/10.32604/cmc.2025.067641

Abstract

The Internet of Healthcare Things (IoHT) marks a significant breakthrough in modern medicine by enabling a new era of healthcare services. IoHT supports real-time, continuous, and personalized monitoring of patients’ health conditions. However, the security of sensitive data exchanged within IoHT remains a major concern, as the widespread connectivity and wireless nature of these systems expose them to various vulnerabilities. Potential threats include unauthorized access, device compromise, data breaches, and data alteration, all of which may compromise the confidentiality and integrity of patient information. In this paper, we provide an in-depth security analysis of LAP-IoHT, an authentication scheme designed to ensure secure communication in Internet of Healthcare Things environments. This analysis reveals several vulnerabilities in the LAP-IoHT protocol, namely its inability to resist various attacks, including user impersonation and privileged insider threats. To address these issues, we introduce LSAP-IoHT, a secure and lightweight authentication protocol for the Internet of Healthcare Things (IoHT). This protocol leverages Elliptic Curve Cryptography (ECC), Physical Unclonable Functions (PUFs), and Three-Factor Authentication (3FA). Its security is validated through both informal analysis and formal verification using the Scyther tool and the Real-Or-Random (ROR) model. The results demonstrate strong resistance against man-in-the-middle (MITM) attacks, replay attacks, identity spoofing, stolen smart device attacks, and insider threats, while maintaining low computational and communication costs.

Keywords

Internet of healthcare things (IoHT); authentication protocol; cryptanalysis; attacks

Cite This Article

APA Style
Ahmim, M., Ouafi, N., Ullah, I., Ahmim, A., Chefrour, D. et al. (2025). LSAP-IoHT: Lightweight Secure Authentication Protocol for the Internet of Healthcare Things. Computers, Materials & Continua, 85(3), 5093–5116. https://doi.org/10.32604/cmc.2025.067641
Vancouver Style
Ahmim M, Ouafi N, Ullah I, Ahmim A, Chefrour D, Almukhlifi R. LSAP-IoHT: Lightweight Secure Authentication Protocol for the Internet of Healthcare Things. Comput Mater Contin. 2025;85(3):5093–5116. https://doi.org/10.32604/cmc.2025.067641
IEEE Style
M. Ahmim, N. Ouafi, I. Ullah, A. Ahmim, D. Chefrour, and R. Almukhlifi, “LSAP-IoHT: Lightweight Secure Authentication Protocol for the Internet of Healthcare Things,” Comput. Mater. Contin., vol. 85, no. 3, pp. 5093–5116, 2025. https://doi.org/10.32604/cmc.2025.067641



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 680

    View

  • 162

    Download

  • 0

    Like

Share Link