{"id":38233,"date":"2025-07-04T14:08:12","date_gmt":"2025-07-04T14:08:12","guid":{"rendered":"https:\/\/www.europesays.com\/us\/38233\/"},"modified":"2025-07-04T14:08:12","modified_gmt":"2025-07-04T14:08:12","slug":"a-lightweight-and-secure-authentication-and-privacy-protection-scheme-for-internet-of-medical-things","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/us\/38233\/","title":{"rendered":"A lightweight and secure authentication and privacy protection scheme for internet of medical things"},"content":{"rendered":"<p>In this section, we examined the working methods, applications, and research limits of current schemes. As a result of the advent of the digital age, numerous industries have been presented with an abundance of opportunities and innovations, which have been characterized by an ever-increasing dependence on technology. However, these improvements also carry with them several challenges, particularly in the realm of cybersecurity<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 9\" title=\"Echenim, K.U. &amp; Joshi, K.P. Iot-reg: A comprehensive knowledge graph for real-time iot data privacy compliance. In: 2023 IEEE International conference on big data (BigData), pp. 2897&#x2013;2906 (2023). IEEE.\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR9\" id=\"ref-link-section-d472966759e607\" target=\"_blank\" rel=\"noopener\">9<\/a>. Insider threats, also known as damaging activities that originate from within an organization, have emerged as a significant worry in recent years, despite the fact that outside threats have traditionally been the primary focus of security measures<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 10\" title=\"Pooranian, Z., Shojafar, M., Taheri, R. &amp; Tafazolli, R. Pascoinfog\/pasfog: Privacy-preserving data deduplication algorithms for fog storage systems. IEEE Consumer Electronics Magazine (2023).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR10\" id=\"ref-link-section-d472966759e611\" target=\"_blank\" rel=\"noopener\">10<\/a>.<\/p>\n<p>The use of a trustworthy server that saves the data is a common feature of the methods now in use. Access control relies on software checks to ensure that a person can access a piece of data only if authorized. From a security perspective, this arrangement is not very desirable. We then encrypt the data using the public key of the intended set and classify it according to the hierarchy. There are some drawbacks to these techniques. If a user of a set needs to provide access to a third party to access data for that set, the user must either provide the third party with their private decryption key so that it may access all entries or act as an intermediary and decode all relevant entries<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 11\" title=\"Bissessar, D. &amp; Adams, C. Construction and implementation of a privacy-preserving identity-based encryption architecture. J. Inf. Secur. 14(4), 304&#x2013;329 (2023).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR11\" id=\"ref-link-section-d472966759e618\" target=\"_blank\" rel=\"noopener\">11<\/a>.<\/p>\n<p>In contrast to conventional PKI, identity-based public key cryptography (ID-PKC) addresses the issue of key authenticity through various procedures. An entity\u2019s public key in ID-PKC is directly obtained from distinct characteristics of its identity, such as an IP address that belongs to a network host or an email address that is connected to a user. The public key generator (PKG) constructs private keys for entities. Before launching an attack, the adversary in a typical PKI must issue a new certificate and persuade entities to accept the new public keys. These factors suggest that applications with low-security requirements or small, closed groups could be the only ones permitted the user ID-PKC<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 12\" title=\"Das, M. L. A key escrow-free identity-based signature scheme without using secure channel. Cryptologia 35(1), 58&#x2013;72 (2010).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR12\" id=\"ref-link-section-d472966759e625\" target=\"_blank\" rel=\"noopener\">12<\/a>.<\/p>\n<p>The authors present a brand-new public key cryptography paradigm, referring to it as certificateless public key cryptography (CL-PKC)<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 13\" title=\"Liu, X., Sun, Y. &amp; Dong, H. A pairing-free certificateless searchable public key encryption scheme for iomt. J. Syst. Architect. 139, 102885 (2023).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR13\" id=\"ref-link-section-d472966759e632\" target=\"_blank\" rel=\"noopener\">13<\/a>. The search for public key schemes without requirements for certificates and without ID-PKC\u2019s built-in key escrow capability provided developers with the idea of CL-PKC. One of the most important issues with public key infrastructures (PKIs) has always been the efficient revocation of public key certificates. In RSA-type cryptosystems, Boneh presented a technique for getting instantaneous revocation of a user\u2019s public key privileges<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 14\" title=\"Boneh, D., Ding, X., Tsudik, G. &amp; Wong, C.M. A method for fast revocation of public key certificates and security capabilities. In: 10th USENIX Security Symposium (USENIX Security 01) (2001).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR14\" id=\"ref-link-section-d472966759e636\" target=\"_blank\" rel=\"noopener\">14<\/a>.<\/p>\n<p>According to the description, the system known as mediated RSA (mRSA) uses threshold RSA, in which both parties share the private key. The encryption and verification processes in the SEM architecture are identical to those in traditional RSA, making it transparent to both the sender and the verifier of a signature. Additionally, adopting SEM design eliminates the requirement to check a public key\u2019s status before using it. Users don\u2019t need to worry about any certificate\u2019s validity before using another user\u2019s key to encrypt a message.<\/p>\n<p>Identity-based cryptosystems are another way to streamline key management. This idea was first presented by Shamir in 1984, with the goal of removing as many public key certificates as feasible by enabling a public key to be uniquely generated from the user\u2019s identifying data like email address, phone number, and social security number<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 15\" title=\"Shamir, A. Identity-based cryptosystems and signature schemes. Adv Cryptol: Proc CRYPTO 84(4), 47&#x2013;53 (1985) (Springer).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR15\" id=\"ref-link-section-d472966759e647\" target=\"_blank\" rel=\"noopener\">15<\/a>.<\/p>\n<p>Additionally, it makes key management simpler because there\u2019s no need to maintain a huge database with a list of public keys and their owners. COVID-19 had a significant impact on the healthcare industry, which was the global pandemic problem. The COVID-19 outbreak resulted in an exponential increase in demand for IoMT devices, which then impacted the global market. The IoMT dramatically reduces patient costs, easing the financial strain on individuals and governments. According to a report published by Fortune Business Insights on August 26, 2024, the IoMT market was estimated to be worth USD 47.32 billion in 2023. During the projection period, the market is expected to increase from USD 60.03 billion in 2024 to USD 814.28 billion in 2032, with a CAGR of 38.5 %<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 16\" title=\"Methodology - Internet of Medical Things (IoMT) Market | Fortune Business Insights &#x2014; fortunebusinessinsights.com. &#010;                  https:\/\/www.fortunebusinessinsights.com\/industry-reports\/methodology\/internet-of-medical-things-iomt-market-101844&#010;                  &#010;                . [Accessed 12-09-2024]\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR16\" id=\"ref-link-section-d472966759e654\" target=\"_blank\" rel=\"noopener\">16<\/a>.<\/p>\n<p>The authors present a sensor cloud architecture that uses virtualized physical sensors and dynamic sensor placement based on patient movement and health to continuously monitor high-risk patients<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 17\" title=\"Guezguez, M. J., Rekhis, S. &amp; Boudriga, N. A sensor cloud for the provision of secure and qos-aware healthcare services. Arab. J. Sci. Eng. 43(12), 7059&#x2013;7082 (2018).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR17\" id=\"ref-link-section-d472966759e661\" target=\"_blank\" rel=\"noopener\">17<\/a>. The research uses a threat model to address wearable payment security. For near-field communication pairs of devices, ECC encrypts messages, and biometrics authenticates safe payments<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 18\" title=\"Bojjagani, S. et al. The use of iot-based wearable devices to ensure secure lightweight payments in fintech applications. J King Saud Univ-Comput Inf Sci 35(9), 101785 (2023).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR18\" id=\"ref-link-section-d472966759e665\" target=\"_blank\" rel=\"noopener\">18<\/a>.<\/p>\n<p>The authors present an identity-based signature system without key escrow that issues private keys without a secure connection. It employs binding\u2013blinding to avoid key escrow and eliminate the need for a secure connection during private issuance<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 19\" title=\"Sahana, S. C., Das, M. L. &amp; Bhuyan, B. A provable secure key-escrow-free identity-based signature scheme without using secure channel at the phase of private key issuance. S&#x101;dhan&#x101; 44, 1&#x2013;9 (2019).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR19\" id=\"ref-link-section-d472966759e672\" target=\"_blank\" rel=\"noopener\">19<\/a>. To ensure the confidentiality of patient information while it is shared and integrated across healthcare providers, they offer a system based on knowledge graphs<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 20\" title=\"Walid, R., Joshi, K.P., Elluri, L., et al. Secure and privacy-compliant data sharing: An essential framework for healthcare organizations. In: 10th International conference on mathematics and computing ICMC 2024 (2024).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR20\" id=\"ref-link-section-d472966759e676\" target=\"_blank\" rel=\"noopener\">20<\/a>. Fog computing with private blockchain offers a trustworthy method of storing and transferring patient data while simultaneously improving the identification of security risks and bolstering the privacy and security of medical data<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 21\" title=\"Al-Zubaidie, M.H. &amp; Razzaq, R.H. Maintaining security of patient data by employing private blockchain and fog computing technologies based on internet of medical things. Informatica48(12) (2024).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR21\" id=\"ref-link-section-d472966759e680\" target=\"_blank\" rel=\"noopener\">21<\/a>.<\/p>\n<p>The MD5 hash technique securely stores user passwords for use in authentication procedures. Integrating an MD5 checksum into the original patient record file presents an additional barrier to security and verification<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 22\" title=\"Patil, A., Ashwini, D., TP, R.R. &amp; Srinivas, T. A mobile cloud based approach for secure medical data management. International Journal of Computer Applications119(5) (2015).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR22\" id=\"ref-link-section-d472966759e687\" target=\"_blank\" rel=\"noopener\">22<\/a>. To create a cryptographic method that satisfies the essential requirements of contemporary smart healthcare cyber-physical systems, the research uses ECC, hash functions, and digital signatures<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 23\" title=\"Kumar, M. &amp; Chand, S. A provable secure and lightweight smart healthcare cyber-physical system with public verifiability. IEEE Syst. J. 16(4), 5501&#x2013;5508 (2021).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR23\" id=\"ref-link-section-d472966759e691\" target=\"_blank\" rel=\"noopener\">23<\/a>.<\/p>\n<p>An authentication strategy for IoMT devices is proposed to enhance the security and performance of existing authentication schemes. Through the development of an offline authentication model that directly checks identities, the suggested authentication system successfully authenticates users and IoMT devices within the local area network<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 24\" title=\"Maarouf, A., Sakr, R., &amp; Elmougy, S. An offline direct authentication scheme for the internet of medical things based on elliptic curve cryptography. IEEe Access (2024).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR24\" id=\"ref-link-section-d472966759e699\" target=\"_blank\" rel=\"noopener\">24<\/a>. A scalable and adaptable distributed group key agreement protocol is used to reduce CPU overhead by running elliptic curve Diffie-Hellman using multiplications instead of exponential calculations to secure data transmissions in WSN<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 25\" title=\"Lin, H. Y. Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks. Connect. Sci. 34(1), 274&#x2013;300 (2022).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR25\" id=\"ref-link-section-d472966759e703\" target=\"_blank\" rel=\"noopener\">25<\/a>.<\/p>\n<p>The prospect of IoMT-related attacks poses the most severe threat to the security and privacy of patient medical records. The suggested approach protects the secrecy of IoMT devices linked to the patient\u2019s body while communicating. The XOR operator, hash function, and concatenation were used to save processing power<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 26\" title=\"Samal, K., Sunanda, S. K., Jena, D. &amp; Patnaik, S. A lightweight privacy preservation authentication protocol for iomt using ECC based blind signature. Int J Eng Bus Manag 17, 18479790251318536 (2025).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR26\" id=\"ref-link-section-d472966759e710\" target=\"_blank\" rel=\"noopener\">26<\/a>. An authenticated key agreement protocol for the IoMT using elliptic curve encryption and zero-knowledge proof methods is used to preserve the privacy of patient\u2019s critical information<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 27\" title=\"Misra, G., Hazela, B., &amp; Chaurasia, B.K. A user-adaptive privacy-preserving authentication of iomt using zero knowledge proofs with ecc. Multimedia Tools and Applications, 1&#x2013;32 (2025).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR27\" id=\"ref-link-section-d472966759e714\" target=\"_blank\" rel=\"noopener\">27<\/a>.<\/p>\n<p>In order to secure the transfer of medical records, a research uses signcryption with an identity-based authentication system based on elliptic curve cryptography. Based on bilinear pairing, the suggested protocol covers a number of security characteristics, such as data confidentiality and authentication with efficient key management<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 28\" title=\"Patil, R. Y., Karati, A. &amp; Patil, Y. H. A signcryption with identity-based authentication for secure EHR sharing in iomt utilizing ECC. Int. J. Inf. Technol. 16(8), 5133&#x2013;5148 (2024).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR28\" id=\"ref-link-section-d472966759e721\" target=\"_blank\" rel=\"noopener\">28<\/a>.<\/p>\n<p>iSecureHealth, a lightweight and reliable key exchange mechanism, addresses security, authentication, and privacy issues. To secure communication between IoMT sensors and the gateway node, it adds a security control node. The system uses ECDH for key exchange and HMAC-SHA256-based JSON Web Token for session key creation<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 29\" title=\"Dhar, C. K. &amp; Majumder, A. isecurehealth: an efficient and secure technique to exchange health data using iomt devices. Smart Health 33, 100504 (2024).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR29\" id=\"ref-link-section-d472966759e728\" target=\"_blank\" rel=\"noopener\">29<\/a>.<\/p>\n<p>Our goal in writing this paper is to add to the increasing quantity of information on insider threat detection by providing theoretical understanding and useful solutions to one of the most important cybersecurity problems of our day. The relation between various existing security models, threat models, and their limitations is discussed in Table <a data-track=\"click\" data-track-label=\"link\" data-track-action=\"table anchor\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#Tab1\" target=\"_blank\" rel=\"noopener\">1<\/a>.<\/p>\n<p><b id=\"Tab1\" data-test=\"table-caption\">Table 1 Relation between various related security schemes and its limitations.<\/b>Health monitoring with body sensors<\/p>\n<p>Wireless Sensor Networks are also utilized for in-home patient monitoring. A system for distributed telemonitoring was proposed. It employs the Services Layers over the Physical Devices paradigm. The architecture model is service-oriented. The distribution of resources among several WSNs is the primary goal. This concept can also link several networks with different wireless technologies. The device was placed within the patient\u2019s home and gathered motion data and several feature values, such as activity, mobility, and non-response levels. To distinguish between normal and pathological behaviors, the Support Vector Data Description method was applied. An algorithm for categorizing behavior patterns was employed to group the patterns in this instance. There is no evidence to support the expectation that these methods will work in a home setting<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 30\" title=\"Cano, C.A.G., Castillo, V.S., Castillo-Gonzalez, W., Vit&#xF3;n-Castillo, A.A., &amp; Gonzalez-Argote, J. Internet of things and wearable devices: a mixed literature review. EAI Endorsed Transactions on Internet of Things9(4) (2023).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR30\" id=\"ref-link-section-d472966759e1394\" target=\"_blank\" rel=\"noopener\">30<\/a>,<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 31\" title=\"Chen, C.-M., Liu, S., Li, X., Islam, S. H. &amp; Das, A. K. A provably-secure authenticated key agreement protocol for remote patient monitoring iomt. J. Syst. Architect. 136, 102831 (2023).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR31\" id=\"ref-link-section-d472966759e1397\" target=\"_blank\" rel=\"noopener\">31<\/a>.<\/p>\n<p>A Body Sensor Network with several body sensors is developed for the best possible resource allocation. This solution effectively addressed the two main issues facing health monitoring systems: a sustainable power source and quality of service. A survey was conducted on wearable sensor-based health monitoring systems. Evaluation aspects led to the evaluation of several systems<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 32\" title=\"Ouiazzane, S., Addou, M. &amp; Barramou, F. A zero-trust model for intrusion detection in drone networks. Int. J. Adv. Comput. Sci. Appl14(11) (2023).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR32\" id=\"ref-link-section-d472966759e1404\" target=\"_blank\" rel=\"noopener\">32<\/a>,<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 33\" title=\"Liu, S., Wang, Z., Kumari, S., Lv, J. &amp; Chen, C.-M. Provably secure anti-phishing scheme for medical information in smart healthcare. IEEE Internet of Things Journal (2024).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR33\" id=\"ref-link-section-d472966759e1407\" target=\"_blank\" rel=\"noopener\">33<\/a>.<\/p>\n<p>The Wireless Patient Portable Unit, which is likewise affixed to the patient\u2019s body, received data relating to cardiac monitoring that was continuously recorded in the home module. The Wireless Access Point Unit was then used to transfer it via the Internet to the hospital. If the doctor notices any irregularities in the signals the patient got while in the hospital, they can get in touch with them, offer some guidance, or, in an emergency, send an ambulance to the patient\u2019s home. This technology does not provide security or surveillance of the outer environment.<\/p>\n<p>Health monitoring using smart phones<\/p>\n<p>Wearable sensors served as the foundation for the sensor network. The sensors obtained the patient\u2019s vital signs, which were then sent to the patient\u2019s mobile phone. The data is safely received, stored, and sent to reliable medical specialists by the mobile device. Only the data\u2019s accessibility to outside parties is under the patient\u2019s control. No PC was utilized in this process; instead, all tasks were completed via mobile device. The handheld gadget transfers only the relevant data after data mining techniques were applied to filter out extraneous data sequences. The expert\u2019s equipment and the patient\u2019s mobile phone communicated over Bluetooth or WLAN 802.11. When an emergency occurs, the patient\u2019s device generates an emergency call, which is then routed to the caregiver\u2019s device.<\/p>\n<p>A brand-new Wearable Mobility Monitoring System was unveiled. It recognized a state change and utilized a smartphone to take pictures. A solution for on-demand tracking and placement was suggested. It was designed for vast spaces and was based on devices with Global Positioning enabled. The first communication between the two terminals was done via a smartphone.<\/p>\n<p>First communication takes place during the synchronization phase. In this case, the requested terminal T1 sends the desired terminal T2 a synchronization Short Message Service (SMS). T2 completes the operation if it rejects the message. If not, the terminal\u2019s position is sent in one of the following formats: multimedia (MMS) or text (SMS). The graphic that shows the position map of the terminal was present in the multimedia format, but the text format just contained the coordinate values of the terminal. A straightforward Peer-to-peer (P2P) protocol is used to facilitate communication between two terminals.<\/p>\n<p>Health monitoring with security<\/p>\n<p>For health monitoring, various security and privacy protocols were applied<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 34\" title=\"Gaur, R. &amp; Prakash, S. Privacy prevention and nodes optimization, detection of iout based on artificial intelligence. Wirel Personal Commun 138(1), 67&#x2013;97 (2024).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR34\" id=\"ref-link-section-d472966759e1437\" target=\"_blank\" rel=\"noopener\">34<\/a>. The patient\u2019s vital signs were transmitted, stored, and received via a smartphone. A multimedia format was provided between sensors and the central hub encryption scheme, which depicts the location map of the terminal. Peer-to-peer (P2P) protocol is a straightforward means of communication between two terminals.<\/p>\n<p>Cipher text Policy Attribute Based Encryption (CP-ABE) with security enhancement techniques was presented. The two main issues in CPABE were the user revocation and the key escrow problem. In CP-ABE, a set of user attributes is applied to KGC\u2019s master secret keys, allowing KGC to produce the users\u2019 private keys. Because KGC may decrypt user ciphertext to obtain the original data, it was not considered trustworthy. It is called the \u201ckey escrow problem.\u201d Users may periodically alter their properties or certain secret keys may be hacked. Regular updates are required for every characteristic to keep the system secure. We refer to this as user revocation. Both of these issues were resolved<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 35\" title=\"Li, X., Wang, H., Ma, S., Xiao, M. &amp; Huang, Q. Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud. Cybersecurity 7(1), 1&#x2013;19 (2024).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR35\" id=\"ref-link-section-d472966759e1444\" target=\"_blank\" rel=\"noopener\">35<\/a>.<\/p>\n<p>Threat model<\/p>\n<p>This subsection covered privacy and security breaches involving patient data. The threat model primarily targets the cybersecurity domains of application-level security, communication-level security, and device-level security. We will discuss the following points related to threat model:<\/p>\n<ul class=\"u-list-style-bullet\">\n<li>\n<p>We analyze a robust adversary model, assuming that, except for the certificate authority, we cannot fully trust any of the entities. Though strange, the hospital and payment gateway are regarded as trustworthy.<\/p>\n<\/li>\n<li>\n<p>External adversaries could listen in on the conversation and deduce private information about patients as the records are being transmitted.<\/p>\n<\/li>\n<li>\n<p>To fraudulently accuse lawful patients of overspending, attackers may initiate collision assaults.<\/p>\n<\/li>\n<li>\n<p>While paying a doctor\u2019s charge or ordering medicine online, an eavesdropper may attack the system by providing false information or by pretending to be another real patient, utilizing their hospital account.<\/p>\n<\/li>\n<li>\n<p>Multiple system attacks may compromise employee privacy when client-server communication stores and forwards private information to several external parties. Via network vulnerabilities or the acquisition of the access point identifier, the attacker, for instance, can seize the patients and examine the network traffic.<\/p>\n<\/li>\n<li>\n<p>Problems with data communication arise when sensitive data is sent and processed between different detachments participating in the transmission security and privacy problems arise.<\/p>\n<\/li>\n<li>\n<p>Problems with digital devices and Internet of Things devices, as well as the outcomes for patients using these devices.<\/p>\n<\/li>\n<li>\n<p>The stakeholders that are considered in the framework are the entities that are a part of this entire procedure (e.g., hospital servers, employees, and patients).<\/p>\n<\/li>\n<li>\n<p>Digital electronic devices that are incorporated with advanced cryptography tools preserve patient data.<\/p>\n<\/li>\n<\/ul>\n<p>The prevalence of attacks came from the communication and application levels, which we addressed and stopped. The adversary may launch significant assaults and seriously harm financial institutions and other protocol participants if they discover any gaps or vulnerabilities in these areas. We are using the lightweight cryptography techniques provided by ECDSA to create and validate signatures. Similar to this, we have employed the elliptic curve integrated encryption scheme (ECIES) as an asymmetric method of encryption and decryption while employing an encryption\/decryption algorithm for symmetric purposes<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 36\" title=\"Gaur, R. et al. A machine-learning-blockchain-based authentication using smart contracts for an ioht system. Sensors 22(23), 9074 (2022).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR36\" id=\"ref-link-section-d472966759e1514\" target=\"_blank\" rel=\"noopener\">36<\/a>.<\/p>\n<p>Secure network model<\/p>\n<p>This subsection discusses the various security models used in data security in the cloud-based system. The The security model provides two-channel digital device connectivity to hospitals, merchants, application providers, and doctors. The main duty of the hospital server, which is a reputable third-party server, is to gather and transmit patients, employees, and doctors\u2019 information to merchants. Put differently, this organization determines the information in the patient\u2019s database and responds to the hospital employee with an acceptance or rejection of the patient\u2019s queries<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 37\" title=\"Khan, N. et al. An ECC-based mutual data access control protocol for next-generation public cloud. J Cloud Comput 12(1), 101 (2023).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR37\" id=\"ref-link-section-d472966759e1526\" target=\"_blank\" rel=\"noopener\">37<\/a>,<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 38\" title=\"Mondal, A. &amp; Chatterjee, P.S. A systematic literature survey on data security techniques in a cloud environment. In: 2022 OITS International conference on information technology (OCIT), pp. 451&#x2013;456 (2022). IEEE.\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR38\" id=\"ref-link-section-d472966759e1529\" target=\"_blank\" rel=\"noopener\">38<\/a>. Figure <a data-track=\"click\" data-track-label=\"link\" data-track-action=\"figure anchor\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#Fig1\" target=\"_blank\" rel=\"noopener\">1<\/a> represents the IoMT-based secure netwok model. The information flow in the framework is as follows:<\/p>\n<ul class=\"u-list-style-bullet\">\n<li>\n<p>The hospital receives requests from patients to provide information digitally.<\/p>\n<\/li>\n<li>\n<p>The staff member\u2019s request is sent to the smartphone. Through a wireless connection, the smartphone and the digital devices establish a secure connection.<\/p>\n<\/li>\n<li>\n<p>Once a link has been made, the application uses password and biometric authentication to verify patients\u2019 requests for authentication.<\/p>\n<\/li>\n<li>\n<p>After the patient\u2019s authentication is successful, information is sent from the wireless device to the employee\u2019s smartphone through hospital applications that have been loaded.<\/p>\n<\/li>\n<li>\n<p>Patients initiate and submit requests, such as information portal requests, to any institution.<\/p>\n<\/li>\n<li>\n<p>The staff member chooses any patient data and submits the request to the appropriate server, like the staff member\u2019s server, which manages patient communications records.<\/p>\n<\/li>\n<li>\n<p>An employee of the hospital verifies the information in their database, validates the patient data, and redirects the exchange of data to the patient\u2019s devices.<\/p>\n<\/li>\n<li>\n<p>The hospital database server uses a secure network to confirm patient information and send data to physicians related to specific medical conditions.<\/p>\n<\/li>\n<li>\n<p>After completing all verification, the patient\u2019s account is credited with the amount of the payment order.<\/p>\n<\/li>\n<li>\n<p>The server will notify the appropriate entities of the patient\u2019s initiator and service provider upon successful validation by the hospital.<\/p>\n<\/li>\n<\/ul>\n<p>Addressing the drawbacks in<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 17\" title=\"Guezguez, M. J., Rekhis, S. &amp; Boudriga, N. A sensor cloud for the provision of secure and qos-aware healthcare services. Arab. J. Sci. Eng. 43(12), 7059&#x2013;7082 (2018).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR17\" id=\"ref-link-section-d472966759e1600\" target=\"_blank\" rel=\"noopener\">17<\/a> could considerably improve the effectiveness and security in healthcare architecture. The<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 18\" title=\"Bojjagani, S. et al. The use of iot-based wearable devices to ensure secure lightweight payments in fintech applications. J King Saud Univ-Comput Inf Sci 35(9), 101785 (2023).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR18\" id=\"ref-link-section-d472966759e1604\" target=\"_blank\" rel=\"noopener\">18<\/a> refers to a lack of research into advanced or emerging security protocols that could improve protection against new types of cyber threats, whereas the<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 11\" title=\"Bissessar, D. &amp; Adams, C. Construction and implementation of a privacy-preserving identity-based encryption architecture. J. Inf. Secur. 14(4), 304&#x2013;329 (2023).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR11\" id=\"ref-link-section-d472966759e1609\" target=\"_blank\" rel=\"noopener\">11<\/a>,<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 13\" title=\"Liu, X., Sun, Y. &amp; Dong, H. A pairing-free certificateless searchable public key encryption scheme for iomt. J. Syst. Architect. 139, 102885 (2023).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR13\" id=\"ref-link-section-d472966759e1612\" target=\"_blank\" rel=\"noopener\">13<\/a> improves understanding and effectiveness of revocation mechanisms in certificateless public key cryptography, resulting in more robust and practical cryptographic systems. Next,<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 19\" title=\"Sahana, S. C., Das, M. L. &amp; Bhuyan, B. A provable secure key-escrow-free identity-based signature scheme without using secure channel at the phase of private key issuance. S&#x101;dhan&#x101; 44, 1&#x2013;9 (2019).\" href=\"http:\/\/www.nature.com\/articles\/s41598-025-05910-4#ref-CR19\" id=\"ref-link-section-d472966759e1616\" target=\"_blank\" rel=\"noopener\">19<\/a> aims to improve the creation and use of identity-based signature schemes, resulting in more secure and practical cryptography solutions based on cloud technologies in healthcare settings.<\/p>\n<p><b id=\"Fig1\" class=\"c-article-section__figure-caption\" data-test=\"figure-caption-text\">Figure 1<\/b><a class=\"c-article-section__figure-link\" data-test=\"img-link\" data-track=\"click\" data-track-label=\"image\" data-track-action=\"view figure\" href=\"https:\/\/www.nature.com\/articles\/s41598-025-05910-4\/figures\/1\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" aria-describedby=\"Fig1\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/07\/41598_2025_5910_Fig1_HTML.png\" alt=\"figure 1\" loading=\"lazy\" width=\"685\" height=\"521\"\/><\/a><\/p>\n<p>IoMT based secure network model.<\/p>\n","protected":false},"excerpt":{"rendered":"In this section, we examined the working methods, applications, and research limits of current schemes. As a result&hellip;\n","protected":false},"author":3,"featured_media":38234,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[25291,26265,30880,1142,10046,65,712,30878,30879,10047,30881,159,158,67,132,68],"class_list":{"0":"post-38233","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-internet","8":"tag-authentication","9":"tag-computer-science","10":"tag-ecc","11":"tag-healthcare","12":"tag-humanities-and-social-sciences","13":"tag-information-technology","14":"tag-internet","15":"tag-internet-of-medical-things","16":"tag-lightweight","17":"tag-multidisciplinary","18":"tag-schnorr","19":"tag-science","20":"tag-technology","21":"tag-united-states","22":"tag-unitedstates","23":"tag-us"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@us\/114795361571979319","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/38233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/comments?post=38233"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/38233\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media\/38234"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media?parent=38233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/categories?post=38233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/tags?post=38233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}