A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS

被引:20
作者
Das, Ashok Kumar [1 ]
Odelu, Vanga [2 ]
Goswami, Adrijit [2 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
[2] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
关键词
Telecare medicine information systems; Authentication; Key agreement; Multi-medical servers; Fuzzy extractor; Biometrics; User anonymity; AVISPA; ACCESS-CONTROL; EFFICIENT; IMPROVEMENT; PROTOCOL; CRYPTANALYSIS; BIOMETRICS; ARCHITECTURE;
D O I
10.1007/s10916-015-0276-5
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to other related schemes. As a result, our scheme is very appropriate for practical applications in TMIS.
引用
收藏
页数:24
相关论文
共 55 条
[21]  
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[22]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[23]   A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks [J].
Guo, Ping ;
Wang, Jin ;
Geng, Xue Hua ;
Kim, Chang Seob ;
Kim, Jeong-Uk .
JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (06) :929-935
[24]   Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks [J].
He, Debiao ;
Kumar, Neeraj ;
Chen, Jianhua ;
Lee, Cheng-Chi ;
Chilamkurti, Naveen ;
Yeo, Seng-Soo .
MULTIMEDIA SYSTEMS, 2015, 21 (01) :49-60
[25]   A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks [J].
He, Debiao ;
Kumar, Neeraj ;
Chilamkurti, Naveen .
INFORMATION SCIENCES, 2015, 321 :263-277
[26]   Authentication Protocol for an Ambient Assisted Living System [J].
He, Debiao ;
Zeadally, Sherali .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (01) :71-77
[27]   Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol [J].
He, Debiao ;
Kumar, Neeraj ;
Chilamkurti, Naveen ;
Lee, Jong-Hyouk .
JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (10)
[28]   Enhanced Three-factor Security Protocol for Consumer USB Mass Storage Devices [J].
He, Debiao ;
Kumar, Neeraj ;
Lee, Jong-Hyouk ;
Sherratt, R. Simon .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2014, 60 (01) :30-37
[29]   Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems [J].
Islam, S. K. Hafizul ;
Khan, Muhammad Khurram .
JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (10)
[30]   Biohashing: two factor authentication featuring fingerprint data and tokenised random number [J].
Jin, ATB ;
Ling, DNC ;
Goh, A .
PATTERN RECOGNITION, 2004, 37 (11) :2245-2255