A Robust Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care

被引:16
作者
Wen, Fengtong [1 ]
机构
[1] Univ Jinan, Sch Math Sci, Jinan 250022, Peoples R China
关键词
Connected health care; User authentication; Security; Biometrics; Smart cards; Anonymity; EFFICIENT; SECURE; IMPROVEMENT;
D O I
10.1007/s10916-013-9980-1
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e. g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.
引用
收藏
页数:9
相关论文
共 20 条
[1]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[2]   A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care [J].
Chang, Ya-Fen ;
Yu, Shih-Hui ;
Shiao, Ding-Rui .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
[3]   An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems [J].
Chen, Hung-Ming ;
Lo, Jung-Wen ;
Yeh, Chang-Kuo .
JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) :3907-3915
[4]   Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards [J].
Das, A. K. .
IET INFORMATION SECURITY, 2011, 5 (03) :145-151
[5]   A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care [J].
Das, Ashok Kumar ;
Goswami, Adrijit .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (03)
[6]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[7]   A More Secure Authentication Scheme for Telecare Medicine Information Systems [J].
He Debiao ;
Chen Jianhua ;
Zhang Rui .
JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (03) :1989-1995
[8]   A new remote user authentication scheme using smart cards [J].
Hwang, MS ;
Li, LH .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) :28-30
[9]   Biohashing: two factor authentication featuring fingerprint data and tokenised random number [J].
Jin, ATB ;
Ling, DNC ;
Goh, A .
PATTERN RECOGNITION, 2004, 37 (11) :2245-2255
[10]   Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices [J].
Khan, Muhammad Khurram ;
Zhang, Jiashu ;
Wang, Xiaomin .
CHAOS SOLITONS & FRACTALS, 2008, 35 (03) :519-524