A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care

被引:94
作者
Das, Ashok Kumar [1 ]
Goswami, Adrijit [2 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
[2] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
关键词
Connected health care; User authentication; Hash function; Security; Biometrics; Smart cards; Anonymity; AVISPA; IMPROVEMENT;
D O I
10.1007/s10916-013-9948-1
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37: 9902, 2013]. Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication.
引用
收藏
页数:16
相关论文
共 21 条
[1]  
[Anonymous], 2005, INT J NETW SECUR
[2]  
[Anonymous], 1993, 1801 NIST FIPS PUB
[3]  
Aumasson JP, 2010, LECT NOTES COMPUT SC, V6225, P1, DOI 10.1007/978-3-642-15031-9_1
[4]  
Basin D., 2005, Int J Inf Secur, V4, P181, DOI DOI 10.1007/S10207-004-0055-7
[5]   A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care [J].
Chang, Ya-Fen ;
Yu, Shih-Hui ;
Shiao, Ding-Rui .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
[6]   Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards [J].
Das, A. K. .
IET INFORMATION SECURITY, 2011, 5 (03) :145-151
[7]  
Das A. K., 2013, "Netw.Sci., V2, P12
[8]   A novel proxy signature scheme based on user hierarchical access control policy [J].
Das, Ashok Kumar ;
Massand, Ashish ;
Patil, Sagar .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2013, 25 (02) :219-228
[10]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090