Provably secure and lightweight three-factor authentication scheme for industrial medical CPS

被引:3
作者
Ding, Zixuan [1 ]
Xie, Qi [1 ]
机构
[1] Hangzhou Normal Univ, Key Lab Cryptog Zhejiang Prov, Hangzhou 311121, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication Protocol; Privacy Protection; Cyber-Physical System (CPS); Chaotic map; Provably secure; Lightweight; ELLIPTIC CURVE CRYPTOGRAPHY; EFFICIENT; SYSTEMS;
D O I
10.1016/j.jisa.2023.103656
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-Physical System (CPS) is a multidimensional complex system that integrates computing, network, and physical environment, which is widely used to promote the upgrading of industrial production and technology. Recently, the application of industrial CPS in the medical field has attracted the attention of scholars and medical experts. Medical CPS can establish a perfect medical network to help doctors monitor patients' conditions in real-time and make treatments. However, how to design a provably secure and lightweight authentication protocol for industrial medical CPS is a challenge. Very recently, Qi et al. proposed an authentication protocol for industrial medical CPS based on the chaotic map, the Artificial Intelligence (AI) biometric technique is used in the protocol to resist password guessing attack and smart card lost attack. However, we find that their protocol is still vulnerable to identity guessing attack, user impersonation attack, trace attack, desynchronization attack, and has no perfect forward secrecy. Therefore, we propose a security-enhanced and lightweight authentication protocol for industrial medical CPS. In the protocol, a dynamic temporary identity strategy is designed to protect anonymity and privacy, which enables the updating of temporary identities while resisting desynchronization attacks. The protocol is proved secure through formal security proof in random oracle model. Meanwhile, compared with the related protocols, our protocol is superior in security and cost to meet the lightweight requirements in medical scenarios.
引用
收藏
页数:14
相关论文
共 34 条
  • [1] An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems
    Chen, Hung-Ming
    Lo, Jung-Wen
    Yeh, Chang-Kuo
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) : 3907 - 3915
  • [2] Provably Secure Dynamic Anonymous Authentication Protocol for Wireless Sensor Networks in Internet of Things
    Ding, Zixuan
    Xie, Qi
    [J]. SUSTAINABILITY, 2023, 15 (07)
  • [3] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
  • [4] A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
    Fotouhi, Mahdi
    Bayat, Majid
    Das, Ashok Kumar
    Far, Hossein Abdi Nasib
    Pournaghi, S. Morteza
    Doostari, M. A.
    [J]. COMPUTER NETWORKS, 2020, 177
  • [5] Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks
    Gope, Prosanta
    Das, Ashok Kumar
    Kumar, Neeraj
    Cheng, Yongqiang
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (09) : 4957 - 4968
  • [6] Chaotic maps-based password-authenticated key agreement using smart cards
    Guo, Cheng
    Chang, Chin-Chen
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2013, 18 (06) : 1433 - 1440
  • [7] A secure and lightweight anonymous mutual authentication scheme for wearable devices in Medical Internet of Things
    Gupta, Ankur
    Tripathi, Meenakshi
    Muhuri, Samya
    Singal, Gaurav
    Kumar, Neeraj
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 68
  • [8] A More Secure Authentication Scheme for Telecare Medicine Information Systems
    He Debiao
    Chen Jianhua
    Zhang Rui
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (03) : 1989 - 1995
  • [9] A two-factor security authentication scheme for wireless sensor networks in IoT environments
    Hu, Bin
    Tang, Wen
    Xie, Qi
    [J]. NEUROCOMPUTING, 2022, 500 : 741 - 749
  • [10] An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography
    Huang, Baojun
    Khan, Muhammad Khurram
    Wu, Libing
    Bin Muhaya, Fahad T.
    He, Debiao
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (01) : 225 - 240