Novel Authentication Schemes for IoT Based Healthcare Systems

With the advancement of information communication technologies, the evolution of the Internet has given rise to a ubiquitous network consisting of interconnected objects (or things), called the Internet of Things (IoT). Recently, the academic community has made great strides in researching and developing security for IoT based applications, focusing, in particular, on healthcare systems based on IoT networks. In this paper, we propose a sensor (or sensor tags) based communication architecture for future IoT based healthcare service systems. A secure single sign-on based authentication scheme and a robust coexistence proof protocol for IoT based healthcare systems are proposed. With the formal security analysis, the robustness of the two proposed schemes is guaranteed under the adversary model.


Introduction
The rapid growth of population in cities calls for adequate provision of services and infrastructure to meet the needs of urban inhabitants. Various information and communications technologies (ICTs), such as Bluetooth, WiFi, 3G/4G, and NFC/RFID, go a long way to achieving this objective and create the possibility of smart cities where human based services and city monitoring are more aware, interactive, and efficient. Following this trend, the comprehensive evolution of the traditional Internet has given rise to a ubiquitous network consisting of interconnected objects (or things), called the Internet of Things (IoT). In IoT based environments, information sensing and human interaction with the physical world are fundamental concepts for the provision of human value-added services. Among these services, in particular, IoT oriented healthcare support systems are among the most promising and important directions for development and are therefore a major focus of government and industry.
Cyber attackers generally exploit security vulnerabilities in computer hardware, software, and communications protocols to target the IoT ecosystems within enterprise, industrial, and government systems. The confidentiality, integrity, and availability of these systems are thus undermined, and serious attacks (e.g., ones resulting in financial losses, property damage, etc.) may be launched on IoT based environments. It is known that the IoT brings with it a broad array of new security challenges for the research community with respect to general system security, network security, and application security. We present the following observations: (i) Securing IoT-networked devices requires implementation of secure cryptographic primitives on the devices. However, the limited computational resources of low-power-consuming and low-cost IoT based devices make the design of security components for such devices difficult. As it stands, some devices cannot even execute the currently existing encryption schemes. Hence, we must reconsider the implementation efficiency of security primitives (or cryptocomponents) on IoT-networked devices. In other words, a new lightweight cryptographic technique is urgently needed to meet the critical security and performance requirements of IoT based devices.
(ii) Owing to the level of mutual connectivity between IoT based devices, every time a user turns on an IoT-networked device which is infected by malware or is simply open to unauthorized third-party exploitation, the vulnerability may spread through the network in a short time. In light of these 2 International Journal of Distributed Sensor Networks conditions, devices cannot be seen as stand-alone, as they once were in traditional security settings. In addition, owing to its advantages in terms of computation efficiency and identification accuracy, Bluetooth Low Energy (i.e., BLE) technology has been widely adopted in recent years for smartphones and intelligent wearable-devices such as the Apple Watch, the Sony SmartWatch, and Samsung Gear. For an IoT based application, the user may be an entry point for triggering specific services. Hence, an appropriate authentication scheme for entity verification is indispensable.
(iii) One of the most important goals of IoT is to enrich people's daily lives. Sensor-based objects may be involved with several services at the same time. In that case, to guarantee both communication security and retrieval efficiency during interactions between sensor-based objects, a secure and intelligent access control scheme is promptly required. Moreover, as most IoT based technologies are still in the research stage, the development of a real and practical IoT application has been the focus of industry and business. The feasibility and practicability of proposed IoT based applications must be evaluated via testing scenarios.
(iv) In an IoT-wide universe, a mechanism capable of proving a group of tagged objects (or sensor tags) existing at the same time and the same place can be very useful. For example, a consignment of medication should always be accompanied by a usage leaflet to comply with pharmaceutical safety regulations. If all tablet containers and usage leaflets are labeled with RF tags, a coexistence proof mechanism on RF tags can provide the evidence that each tablet container was associated with an appropriate leaflet during medication distribution. This tag coexistence concept has been widely applied in recent years.
Based on the above analysis, in this paper we would like to present a new IoT based secure healthcare process consisting of a refinement of the traditional authentication scheme, from a performance standpoint. The security components adopted in the proposed authentication scheme have been redesigned to meet the hardware requirements of IoT based devices. The suitability of the proposed authentication scheme as the main protection mechanism for the entry point of an IoT based healthcare system is evaluated. In addition, we introduce a coexistence scheme for proving the correctness of the coexisting medical items for which the ultra low-cost IoT based sensors, such as passive RF tags, are utilized. Medicine error prevention and patient safety can thus be guaranteed.

Related Work
The next generation of context-aware mobile applications require the continuous updating of relevant information about a user's surroundings to create low latency notifications and guarantee a high quality of experience. Forsström et al. [1] studied the possibilities of doing so via transmission and monitoring of contextual information from mobile devices and found that the impact of the contextual information was to overload IoT networks. In addition, the authors presented an evaluation model to achieve dynamic control of the information flow without any centralized authority. Recently, the IoT based EPC (Electronic Product Code) system has emerged as a revolutionary new technology for modern logistics management. The IoT can achieve the properties of realtime location returning, object tracking and monitoring, and intelligent recognition. For this type of envisioned scenario, Wang [2] investigated relevant laws and technical standards with a view to increasing government investment and setting up business models for the promotion of future IoT based applications. On the other hand, as the capability to provide personalized healthcare is limited by the data available from patients, which is dynamic and often incomplete, knowledge mining, analysis, and trending are increasingly important. Therefore, Jara et al. [3] presented a knowledge acquisition and management platform relying on IoT based architecture. The platform focused on the management of personal and mobile health and enabled delivery of new services by virtue of its capabilities to predict health anomalies in real-time, offer feedback to patients, and support security and privacy.
In 2011, Zakriti and Guennoun [4] investigated an IoT based model to support interconnectivity and interoperability among smart objects. The proposed method solved various challenges, such as the integration of heterogeneity among devices, the development of diversified protocols, the desired properties of self-manageability and selforganization, and adaptive security and privacy for IoT networks. Then, Tozlu et al. [5] demonstrated three types of sensor-based application scenarios and examined the feasibility of low-power WiFi technology to enable IP connectivity between battery-powered objects. Next, Jin et al. [6] proposed a framework encompassing an urban information system with a view to furthering the realization of smart cities through the concept of the IoT. The introduced framework includes cloud-based integration of respective systems and services and forms a transformational part of the existing cyber systems. This framework can be adapted to enhance the level of interconnectivity and interoperability of important city services. In 2014, Stankovic [7] investigated eight key research topics, that is, massive scaling, architecture and dependencies, creating knowledge and big data, robustness, openness, security, privacy, and human-in-the-loop, to look at how the IoT could change the world, and concluded that the future will see the IoT gradually becoming an increasingly sophisticated utility in terms of sensing, actuation, communications, control, and creating knowledge from vast amounts of data.
In 2013, Hou et al. [8] designed a technique that enables secure initialization of a group of wireless devices, called Chorus, to defend against attack by an adversary. In order to achieve the key authentication property, the authors used Chorus to provide in-band group message authentication and group authenticated key agreement. In addition, two secure protocols are proposed to satisfy minimal hardware requirements and allow for minimal user effort; hence, the International Journal of Distributed Sensor Networks 3 protocols are scalable to a large group of wireless devices. Next, in light of the coupling between diverse IoT sensors, applications, and services, Ukil et al. [9] presented the specific characteristics, visions, and challenges relating to the IoT. Based on the observations and conclusions, the authors developed a privacy preservation framework as a part of an IoT platform, including a data masking tool, for both privacy and utility preservation. After that, since security and privacy are two of the most pressing challenges for the development of IoT applications or architecture, Alqassem [10] specified the essential privacy and security requirements for the IoT and further established an engineering framework as the proof of concept. With the emerging technology brought about by the IoT, the connectivity between objects, such as home appliances and consumer electronics, can be successfully created and applied. On the other hand, as trillions of objects each require their own unique identifications, low-cost RFID technology has begun to attract attention. For this reason, Aggarwal and Das [11] developed a lightweight RFID based protocol to enhance system security while retaining the protocol's efficiency. Later, Torjusen et al. [12] proposed a solution to integrate run-time verification enablers in the feedback adaptation loop of the ASSET [13], that is, an adaptive security framework for the IoT in the eHealth environment, and implemented the framework with colored Petri Nets. The run-time enablers produce machine based formal models of a system's status and context available at run-time. Moreover, the authors presented requirements for verification at run-time as formal specifications and introduced dynamic context monitoring and adaptation.
In recent years, IoT technologies have created an environment characterized by linkage between software systems and the physical world and have catalyzed a movement towards invisible and natural interactions among objects. However, providing efficient and customized personal services requires information about every distinct individual or entity, and this leads to the potential for privacy invasion. Hence, the information flow control and the design of low-cost tags (or, alternatively, small data size) become very important issues. From these observations, Evans and Eyers [14] introduced code templates for two small microcontrollers that make meaningful tagging possible. Later, Skarmeta et al. [15] proposed a capability-based access control mechanism that is built on public key cryptography. The essential ideas are based on the design of a lightweight token used for accessing CoAP (Constrained Application Protocol) resources and a digital signature algorithm inside the smart object. Being based on these two newly proposed techniques, the presented access control mechanism can provide better security and privacy for IoT based networks.
Different wireless communication technologies and network infrastructures are continuously being integrated, such as WSN, RFID systems, 3G technology, WIMAX, PAN, and so forth. In order to solve related security problems, Chen et al. [16] proposed a security architecture for an IoT environment. The proposed system architecture is adaptive to the IoT environment, and, in addition, a security verification mechanism was introduced. Later, Berhanu et al. [17] described a setup for adaptive security for IoT devices in an eHealth environment and discussed the validation of the setup through the study of the impact of antenna orientation on energy consumption. The authors then studied the feasibility of adopting lightweight security solutions as part of the ASSET infrastructure [13]. Next, Ning et al. [18] proposed an authentication scheme for IoT networks. The authors exploited U2loT architecture to design an aggregated-proof based hierarchical authentication scheme for layered networks. In this authentication mechanism, several concepts, such as anonymous data transmission, mutual authentication, and different access authorities, were incorporated to achieve hierarchical access control. Moreover, Chen [19] proposed a possible solution based on an IBE (identity-based encryption) cryptosystem to efficiently and effectively solve the privacy and security threats encountered in the IoT. The elliptic curve cryptosystem is applied for achieving security in the IoT, and the authors established that essential security problems could be solved without too much resource consumption. After that, Paar [20] developed a concept that took into account both the destructive and constructive aspects embedded in the security of the IoT. The purpose was to examine the efficiency of tradeoffs between the desired security and the lowest possible cost.
Li and Xiong [21] developed a secure scheme for achieving confidentiality, integrity, authentication, and nonrepudiation in a logical single step. The proposed method splits the signcryption into two phases, with an online phase and an offline phase, and allows a sensor node in an identitybased cryptosystem to send a message to an Internet host. Hence, this scheme successfully provides an efficient solution for integrating WSN into IoT. Afterwards, in [22] the author analyzed the security requirements in different layers of the IoT and arrived at two conclusions: (a) the future security issues related to the IoT will mainly involve an open security system, individual privacy protection, and terminal security functionality; and (b) the security of the IoT must be seen from a perspective of integration which mandates the need for a series of policies, laws, and regulations, as well as a perfect security management system for mutual collocation. In 2013, Hummen et al. [23] introduced an IoT oriented authentication scheme which is based on the designs of prevalidation, session resumption, and handshake delegation. The proposed scheme can provide peer authentication and secure data transmission. In the following year, Kantarci and Hussein [24] demonstrated a framework for ensuring public safety in a cloud-centric IoT environment, where smartphones equipped with various types of sensors are deployed. To ensure trustworthiness in the framework, the authors proposed a reputation-based S2aaS scheme, called Trustworthy Sensing for Crowd Management (TSCM), which is able to collect sensing data based on a cloud model. In addition, the authors designed an auction procedure to select mobile devices for particular sensing tasks and to determine the appropriate payments to the users of the mobile devices that provide data. Furthermore, Tilanus et al. [25] discussed the motivations for opening up a given IoT so as to make the "things" it contains part of the global IoT. The proposed method comprises the definition and control of access rights to the discovery and use of virtual objects. It has the potential 4 International Journal of Distributed Sensor Networks to play a central role in the verification of access rights to virtual objects in the deployment of the IoT.

The Proposed Schemes
With the advancement of IoT networks, numerous network services and mobile devices have been deployed in pursuit of the betterment of human wellbeing. In general, users may register with the server once and maintain a set of verified data (or parameters) as the login token for system resource and service retrieval. The concept is called the single sign-on (SSO), whereby legal users are allowed to use the unitary token to access different services (or devices). Our proposed authentication scheme is based on the SSO technique, whereby a mobile application allows a user to utilize a mobile device with a unitary token to access multiple services. The techniques of a one-way hash function and random nonce are adopted to simultaneously ensure system efficiency and security robustness. In addition, we present a coexistence mechanism to prove the correctness of the coexisting medical items. With a proof for a group of tagged objects existing at the same time and the same place, medicine error prevention and patient safety can further be enhanced.

The Proposed Authentication Scheme.
In our scheme, three entities, that is, the user or the authentication server AS , and a trusted third-party authority TTPA, exist. The server and the trusted authority TTPA do not require the maintenance of any registration table for each registered communication entity. First, the TTPA selects two large primes and and computes = ⋅ . Then, the TTPA determines the key pair ( , ) such that ⋅ ≡ 1 mod ( ), where ( ) = ( − 1)( − 1). Next, the TTPA chooses a generator over the finite field * , where is a large-enough odd prime number. Finally, the TTPA protects the secret and publishes ( , , , ). Note that all the information about the parameters and is erased after initialization of the system. Now, both the user and the server need to store only one set of public parameters, that is, { , , , , , ℎ(⋅)} published by the TTPA, where is a secret generated by the TTPA and ℎ(⋅) is a collision-resistant one-way hash function.
Registration Phase. In the registration phase, each user registers a unique and fixed bit-length identity ID at the TTPA side and obtains a secret token from the TTPA through a secure channel. The secret token is as = (ID ‖ ℎ(ID ‖ )) mod , where is also a secret generated by the TTPA. Similarly, the server AS registers a unique identity ID at the TTPA side and obtains a secret token from the TTPA through a secure channel, where = (ℎ(ID ‖ )) mod . Note that ID is public for each service request. (Figure 1). If the user wants to request an authentication service from AS , the user identification and verification phase is invoked.
(4) After receiving 4 , derives the session key = ( 2 3 ) 1 mod and examines the validity of values and . In other words, computes ℎ(ID ‖ ( 2 ) 3 ‖ 1 ) and ℎ(ID ‖ ) and examines whether the following two equations hold or not.
If these two examinations hold, believes that AS is an authorized service provider with current session key . (Figure 2). Recently, the concept of coexistence proof for RF tags has been introduced to prove multiple tagged objects existing at the same time in the same place. Such proofs can be utilized in the application field of inpatient safety and medication management. In the proposed mechanism, each RF tag requires supporting lightweight operations, that is, a 16-bit pseudorandom number generation (PRNG) function and bitwise exclusive OR (XOR) operation, and the backend coexistence server maintains two secret keys and , an index-pseudonym ID , and a unique identity ID for each . In addition, the timestamp scheme and a random one-way permutation function mapping within range [1,2 ] are U i AS j TTPA g n 1 mod N (g a ) n 1 mod N A = (S i ‖ n 1 ) ⊕ h(g an 1 ) m 1 = {ID j , g n 1 , A} g n 2 mod N (g a ) n 2 mod N B = (S j ‖ n 2 ) ⊕ h(g an 2 ) m 2 = {ID j , g n 1 , A, g n 2 , B} (g n 1 ) a mod N (g n 2 ) a mod N (S i ‖ n 1 ) = A ⊕ h(g n 1 a ) (S j ‖ n 2 ) = B ⊕ h(g n 2 a ) (S i ) e mod N = (ID i ‖ h(ID i ‖ b)) de mod N (S j ) e mod N = (h(ID j ‖ b)) de mod N Verify h(ID i ‖ b) and h(ID j ‖ b)?

The Proposed Coexistence Mechanism
(g n 1 ) n 3 mod N (g n 2 ) n 3 mod N C = h((g n 1 ) n 3 ‖ (g n 2 ) n 3 ‖ n 2 ) D = h(ID j ‖ (g n 2 ) n 3 ‖ n 1 ) m 3 = {g n 1 n 3 , C, g n 2 n 3 , D} K ij = (g n 2 n 3 ) n 2 mod N Verify C? E = h(ID j ‖ K ij ) m 4 = {g n 2 n 3 , D, E} K ij = (g n 2 n 3 ) n 1 mod N Verify D and E? adopted in the proposed mechanism, where is the security parameter. The implementation of is based on PRNG and XOR to obtain operational efficiency for low-cost RF tags [26].
Step 1. First, the RF reader requests a well-protected timestamp ( ⊕ ) from the backend server, where is the server's secret key. Note that a corresponding log is created. An initial message {Hello, ( ⊕ )} is then issued to and . After and get the incoming message, they both send {ID , , V = ( ( ) ⊕ ( ⊕ ) ⊕ )} and {ID , , V = ( ( ) ⊕ ( ⊕ ) ⊕ )} to the reader, respectively. And the reader immediately forwards these two responses with ( ⊕ ) to the backend server. At the server side, if the verification of ( ⊕ ) holds, (i.e., the validity of the current process time-period is verified), the server will then verify V and V . Once the examinations of V and V hold, the server sends two derived key values, that is,  Step 2. Upon obtaining and , the reader computes = ( ⊕ ( ( ⊕ ) ⊕ ID )) and sends { , ( ( ⊕ ) ⊕ ID )} to .
Step 6. Upon receiving { , }, the reader performs the verification of = ( ( ) ⊕ ). If it holds, the reader confirms the coexistence of and with a valid proof = (ID , ID , , , ).

Security Analyses
In this section, we analyze the security of the proposed authentication scheme for IoT based healthcare systems. We first present the adversary model and then conduct the security analysis of the proposed authentication scheme and the coexistence proof mechanism.

Adversary Model.
In the communication model, we assume that a user intends to establish a session key Key ( , ) with an authentication server via the help of the trusted third-party authority TTPA. We assume that the adversary can interact with the participants via oracle queries.
The following major queries model the capabilities of the adversary. Note that Π is denoted as the instance of a participant .  (iii) Corrupt( ): this query returns the long-term secret key of .
(iv) Execute(Π , Π ): this query models passive attacks in which the adversary can obtain the messages exchanged during the honest execution of the protocol between two oracles Π and Π .
(v) Hash( ): the one-way hash function can be viewed as random functions within the appropriate range in the ideal hash model. Note that if has never been queried before, it returns a truly random number to the adversary and stores ( , ) in the hash table.
Otherwise, it returns the previously generated result to the adversary.
(vi) Test(Π ): this query models the security of the session key, that is, whether the real session key can be distinguished from a random string or not. For answering this question, an unbiased coin is flipped by the oracle Π . When the adversary issues a single Test query to Π , the adversary obtains either the real session key Key ( , ) if = 1 or a random string if = 0.

Security Analysis of the Proposed Authentication Scheme.
In this subsection, we present the formal analysis of our proposed authentication scheme based on [27][28][29].
(i) AKE security (session key security): the adversary tries to guess the hidden bit involved in a Test query via a guess . We say that the adversary wins the game of breaking the session key security of an AKE (Authenticated Key Exchange) protocol if the adversary issues Test queries to a fresh oracle Π and guesses the hidden bit successfully. The probability that the adversary wins the game is Pr [ = ]. In brief, the advantage of an adversary Eve in attacking protocol can be defined as Adv AKE (Eve) = |2 × Pr[ = ] − 1|. In brief, is AKE-secure if Adv AKE (Eve) is negligible.
In the following subsection, we formally analyze the security of our proposed authentication protocol. Notations and definitions are presented first, and the formal security analysis is then demonstrated. We define Eve as the adversary's total running time, and , , , , and ℎ are the number of Send, Reveal, Corrupt, Execute, and Hash queries, respectively.
(ii) Computational Diffie-Hellman (CDH) assumption: let = ⟨ ⟩ be a multiplicative cyclic group of order , and let two random numbers and be chosen in * . Given , , and , the adversary Eve has a negligible success probability Succ CDH (Eve) of obtaining an element ∈ , such that = within polynomial time. Proof. Let Eve be an adversary that is able to get an advantage to break the AKE-secure protocol within time Eve . We can International Journal of Distributed Sensor Networks 7 construct a CDH attacker ATT from Eve to respond to all of Eve's queries and deal with the CDH problem, where ATT is given a challenge Ω = ( , ) and outputs an element such that = . First, when Eve issues a Send 1 query as a start command, ATT responds with 1 = {ID , 1 , } to Eve. Second, when Eve issues a Send 2 query, ATT randomly chooses two integers 1 and 2 from [1, 2 ]. If 1 ̸ = 2 , ATT responds with {ID , 1 , , 2 , } to Eve. Otherwise, ATT replaces the corresponding parameters of 2 = {ID , 1 , , 2 , } with the element from Ω to generate a new and random message 2 and then responds with the message 2 to Eve. Third, once ATT receives the Send 3 query from Eve, ATT answers with the message 3 = { 1 3 , , 2 3 , } as the protocol. If the input of the query is from Ω, ATT generates a new message 3 and then responds with 3 to Eve. Fourth, when Eve issues the Send 4 query, ATT answers with 4 = { 2 3 , , } to Eve. Otherwise, a random string 4 will be generated and sent to Eve. Finally, ATT answers a null string via a Send 5 query and then sets the protocol as being successful (or sets all conditions to true).
In the alternative, when Eve issues a Reveal(Π ) or a Reveal(Π ) query, ATT checks whether the oracle has been accepted and is fresh or not. If the result is positive, ATT answers with the session key Key ( , ) to Eve. Otherwise, if the session key has been constructed from the challenge Ω, ATT terminates. When Eve issues Corrupt( ), Corrupt( ), Execute(Π , Π ), Hash( ) queries, ATT answers in a straightforward way. When Eve issues a Test query, ATT answers in a straightforward way. Otherwise, if the session key has been constructed from the challenge Ω, ATT answers Eve with a random string with the same length as the session key Key ( , ) . The above simulation is indistinguishable from any execution of the proposed protocol except for one execution which involves the challenge Ω. The probability that ATT correctly guesses the session key, which Eve will make a Test query on, is equal to the probability of 1 = 2 . Hence, we have = 1/ 2 ≥ 1/ . Assume that Eve issues a Test query to output , where = . This means that Eve knows the session key, so there must be at least one Hash query that returns the session key. The probability that ATT will choose the Hash query correctly is ≥ 1/ ℎ . The successful probability Succ CDH (ATT) that ATT will expose from the challenge Ω is thus Succ CDH (ATT) = × × ≥ × (1/ ) × (1/ ℎ ). Finally, the advantage of Eve to break the AKE security of the protocol is derived as follows: = Adv AKE (Eve, , ℎ ) ≤ ℎ × Succ CDH ( Eve ) . (1)

Security Analysis of the Proposed Coexistence Scheme.
In this subsection, we present the security claims of our proposed coexistence mechanism, such as data confidentiality and the resistance to proof counterfeit attack and replay attack. Claim 1. The proposed coexistence mechanism is secure against proof counterfeit attack.
In our proposed coexistence mechanism, the timestamp is generated from the backend server and is well-protected by the server's secret key. This design removes the possibility of creating a legitimate but fake timestamp. Hence, it is impossible to create a counterfeit proof involving fake timestamp for the purpose of deception. In addition, the proposed mechanism is based on the random one-way permutation function which is an efficient and robust computation component for low-cost RF tags [26]. As all the transmitted information is involved with the function , it is difficult to derive the information without knowing all the communication entities' secret keys and the corresponding timestamps. Therefore, the proposed scheme can guarantee resistance to proof counterfeit attack. At the same time, system efficiency is delivered by virtue of the lightweight computation cost of the permutation function .
Claim 2. The proposed coexistence mechanism can provide data confidentiality and resist against replay attack.
We assume that a malicious adversary Eve can intercept all messages communicated between RF tags , , and the reader. Because the adversary Eve cannot derive the private keys, that is, or for the target tag , from messages transmitted via the public channel, the data involved in the transmitted messages cannot be retrieved. In addition, the one-way property of the function serves to guarantee the unrecovery of the input data, so that data confidentiality can thus be achieved. Moreover, in each session of our proposed scheme, we exploit random numbers, that is, and , in randomizing transmitted messages. In addition, the timestamp is involved with the construction of the verification message . These random numbers and the timestamp can not only randomize the transmitted messages but can ensure resistance against replay attack.

Conclusion
In this paper, we have introduced two secure communication protocols for IoT based healthcare systems, in which a SSO based authentication scheme and a coexistence proof mechanism are proposed. The proposed authentication scheme is appropriate for use as the main protection technique for an IoT based healthcare environment consisting of various types of sensors, such as thin/fat sensors, sensor tags, or tagged items. For IoT network services, the proposed authentication scheme can provide robust entity authentication and secure data communication. In addition, we further present a coexistence proof protocol for proving multiple tagged objects (or sensors and/or sensor tags) existing at the same time and the same place. The generated proofs can be utilized in the application field of inpatient safety and medication 8 International Journal of Distributed Sensor Networks management. Based on the security analysis results we have conducted, we are confident that the feasibility of these two proposed schemes can be guaranteed.