Open Access
ARTICLE
A Verifiably Secure and Efficient Authentication Protocol for Resource-Constrained IoT Devices in Cloud-Assisted E-Healthcare
1 Faculty of Computing and Information Technology, University of Bisha, Bisha, Saudi Arabia
2 Smart Cyber-Physical System Research Centre, University of Bisha, Bisha, Saudi Arabia
3 Higher Education Department of Khyber Pakhtunkhwa, Government Degree College Wari (Dir Upper), Wari, Pakistan
* Corresponding Author: Fahad Algarni. Email:
Computers, Materials & Continua 2026, 88(1), 73 https://doi.org/10.32604/cmc.2026.077157
Received 03 December 2025; Accepted 13 February 2026; Issue published 08 May 2026
Abstract
With the increasing connectivity and intelligence of Internet-of-Things (IoT) devices, which interface with numerous aspects of our daily lives, security remains a major concern for IoT devices deployed in e-healthcare systems. The existing solutions demonstrate that authentication of IoT devices across all domains, especially in healthcare, poses significant vulnerabilities, including side-channel, insider, and replay attacks. Alternatively, it is not feasible for resource-constrained IoT devices due to the computational, communicational, and space overheads of modular exponentiation or bilinear pairing, or because it requires four to five round-trips for authentication. The rapid growth of IoT in the e-healthcare sector is expected to cross “50 billion” or more by 2030, highlighting desynchronization, man-in-the-middle (MITM) attacks, and unavailability flaws in e-healthcare. If the aforementioned security concerns are not adequately addressed, they will, in turn, escalate and lead to severe consequences. Therefore, this article introduces a security protocol for an e-healthcare system to ensure secure communication for the voluminous data collected by IoT devices and to transfer it to the cloud safely. The proof of correctness and robustness of the proposed protocol was conducted using BAN (Burrows-Abadi-Needham) logic, the Real-Or-Random (ROR) model, the ProVerif verification toolkit, and pragmatic discussions. The performance analysis section was addressed by measuring several key metrics, including communication, computation, space, and energy consumption, along with scalability. The results obtained demonstrate that the communication cost may be reduced by up to 76%, the computation cost by up to 92%, and the energy consumption by up to 31%.Keywords
Cite This Article
Copyright © 2026 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools