A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems

被引:162
作者
Li, Xiong [1 ,2 ]
Peng, Jieyao [1 ]
Obaidat, Mohammad S. [3 ,4 ]
Wu, Fan [5 ]
Khan, Muhammad Khurram [6 ]
Chen, Chaoyang [7 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[3] Nazarbayev Univ, Elect & Comp Engn Dept, Astana 010000, Kazakhstan
[4] Univ Jordan, King Abdullah II Sch Informat Technol, Amman 11942, Jordan
[5] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[6] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
[7] Hunan Univ Sci & Technol, Sch Informat Sci & Engn, Xiangtan 411201, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2020年 / 14卷 / 01期
关键词
Elliptic curve (EC) encryption; fuzzy commitment scheme (FCS); Internet of things (IoT); user authentication; wireless medical sensor network (WMSN); KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; HEALTH-CARE;
D O I
10.1109/JSYST.2019.2899580
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) enables all objects to connect to the Internet and exchange data via different emerging technologies, which makes the intelligent identification and management a reality. Wireless sensor networks (WSNs), as a crucial basis of IoT, have been applied in many fields like smart health care and smart transportation. With the development of WSNs, data security has attracted more and more attention, and user authentication is a popular mechanism to ensure the information security of WSNs. Recently, many authentication mechanisms for wireless medical sensor networks (WMSNs) have been proposed, but most of the protocols cannot achieve the features of local password change and forward secrecy while resisting stolen smart card attack. To enhance the security based on previous work, an ECC-based secure three-factor authentication protocol with forward secrecy for WMSN is proposed in this paper. It utilizes a fuzzy commitment scheme to handle the biometric information. Meanwhile, fuzzy verifier and honey_list techniques are used to solve the contradiction of local password verification and mobile device lost attack. The security of our protocol is evaluated by provable security, Proverif tool, and information analysis. Besides, the comparisons with the relevant protocols are given, and the results indicate that our protocol is robust and secure for WMSN systems.
引用
收藏
页码:39 / 50
页数:12
相关论文
共 39 条
[1]  
Abdalla M, 2008, LECT NOTES COMPUT SC, V5339, P133, DOI 10.1007/978-3-540-89641-8_10
[2]   Wireless sensor networks for healthcare: A survey [J].
Alemdar, Hande ;
Ersoy, Cem .
COMPUTER NETWORKS, 2010, 54 (15) :2688-2710
[3]   Detection of oxidative stress and DNA damage in freshwater snail Lymnea leuteola exposed to profenofos [J].
Ali, Daoud ;
Ali, Huma ;
Alifiri, Saud ;
Alkahtani, Saad ;
Alkahtane, Abdullah A. ;
Huasain, Shaik Althaf .
FRONTIERS OF ENVIRONMENTAL SCIENCE & ENGINEERING, 2018, 12 (05)
[4]   A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring [J].
Ali, Rifaqat ;
Pal, Arup Kumar ;
Kumari, Saru ;
Karuppiah, Marimuthu ;
Conti, Mauro .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 :200-215
[5]   A robust and anonymous patient monitoring system using wireless medical sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 :483-495
[6]   A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks [J].
Amin, Ruhul ;
Biswas, G. P. .
AD HOC NETWORKS, 2016, 36 :58-80
[7]  
[Anonymous], [No title captured]
[8]  
[Anonymous], SENSORS
[9]   An efficient cryptographic protocol verifier based on prolog rules [J].
Blanchet, B .
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, :82-96