A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS

被引:20
作者
Das, Ashok Kumar [1 ]
Odelu, Vanga [2 ]
Goswami, Adrijit [2 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
[2] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
关键词
Telecare medicine information systems; Authentication; Key agreement; Multi-medical servers; Fuzzy extractor; Biometrics; User anonymity; AVISPA; ACCESS-CONTROL; EFFICIENT; IMPROVEMENT; PROTOCOL; CRYPTANALYSIS; BIOMETRICS; ARCHITECTURE;
D O I
10.1007/s10916-015-0276-5
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to other related schemes. As a result, our scheme is very appropriate for practical applications in TMIS.
引用
收藏
页数:24
相关论文
共 55 条
[1]   Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Li, Xiong .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (11)
[2]  
[Anonymous], J MED SYST
[3]  
[Anonymous], J MED SYST
[4]  
[Anonymous], J MED SYSTEMS
[5]  
[Anonymous], J MED SYST
[6]  
[Anonymous], HIGH LEVEL PROTOCOL
[7]  
Basin D., 2005, Int J Inf Secur, V4, P181, DOI DOI 10.1007/S10207-004-0055-7
[8]  
BURNETT A., 2007, International Journal of Network Security, V5, P317
[9]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[10]   An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks [J].
Chatterjee, Santanu ;
Das, Ashok Kumar .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (09) :1752-1771