A Secure Authentication Protocol for Multi-Sever-Based E-Healthcare Using a Fuzzy Commitment Scheme

被引:47
|
作者
Barman, Subhas [1 ]
Shum, Hubert P. H. [2 ]
Chattopadhyay, Samiran [3 ]
Samanta, Debasis [4 ]
机构
[1] Jalpaiguri Govt Engn Coll, Jalpaiguri, India
[2] Northumbria Univ, Fac Engn & Environm, Newcastle Upon Tyne NE1 8ST, Tyne & Wear, England
[3] Jadavpur Univ, Dept Informat Technol, Kolkata 700098, India
[4] IIT Kharagpur, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
基金
英国工程与自然科学研究理事会;
关键词
Telecare medicine information system (THIS); fuzzy commitment scheme; BAN logic; real-or-random (ROR); AVISPA tool; KEY AGREEMENT PROTOCOL; USER AUTHENTICATION; PASSWORD AUTHENTICATION; INFORMATION; EFFICIENT; BIOMETRICS; DESIGN; EXCHANGE; PRIVACY; ATTACKS;
D O I
10.1109/ACCESS.2019.2893185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart card-based remote authentication schemes are widely used in multi-medicalserver-based telecare medicine information systems (TMISs). Biometric is one of the most trustworthy authenticators and is presently being advocated to use in the remote authentication of THIS. However, most of the existing TMISs consider a single-server-environment-based authentication system. Therefore, patients need to register and log into every server separately for different services. Furthermore, these schemes do not employ error correction technique to remove the errors from biometric data. Also, biometrics are inherent and demand diversification to generate a revocable template from inherent biometric data. In this paper, we propose a mutual authentication and key agreement scheme for a multi-medical server environment to overcome the limitations of the existing schemes. In the proposed scheme, a cancelable transformation of the raw biometric data is used to provide the privacy and the diversification of biometric data. The errors of the biometric data are corrected with error-correction techniques under the fuzzy commitment mechanism. A formal security analysis using the widely accepted real-or-random model, the Burrows-Abadi-Needham logic, and the automated validation of Internet security protocols and applications tool concludes that the proposed scheme is safe against known attacks. We also compare the computation and communication costs of our scheme to evaluate the performance with the others.
引用
收藏
页码:12557 / 12574
页数:18
相关论文
共 50 条
  • [1] Provably Secure Multi-Server Authentication Protocol Using Fuzzy Commitment
    Barman, Subhas
    Das, Ashok Kumar
    Samanta, Debasis
    Chattopadhyay, Samiran
    Rodrigues, Joel J. P. C.
    Park, Youngho
    IEEE ACCESS, 2018, 6 : 38578 - 38594
  • [2] A secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systems
    Lin, Han-Yu
    PLOS ONE, 2018, 13 (12):
  • [3] An e-healthcare authentication protocol employing cloud computing
    Mohit, Prerna
    Amin, Ruhul
    Biswas, G. P.
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2021, 36 (03) : 155 - 168
  • [4] A secure and improved multi server authentication protocol using fuzzy commitment
    Hafeez Ur Rehman
    Anwar Ghani
    Shehzad Ashraf Chaudhry
    Mohammed H. Alsharif
    Narjes Nabipour
    Multimedia Tools and Applications, 2021, 80 : 16907 - 16931
  • [5] A secure and improved multi server authentication protocol using fuzzy commitment
    Rehman, Hafeez Ur
    Ghani, Anwar
    Chaudhry, Shehzad Ashraf
    Alsharif, Mohammed H.
    Nabipour, Narjes
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (11) : 16907 - 16931
  • [6] Developing a Provable Secure and Cloud-Centric Authentication Protocol for the e-Healthcare System
    Alzahrani, Abdulrahman
    IEEE ACCESS, 2024, 12 : 183665 - 183687
  • [7] Secure-Anonymous User Authentication Scheme for e-Healthcare Application Using Wireless Medical Sensor Networks
    Ever, Yoney Kirsal
    IEEE SYSTEMS JOURNAL, 2019, 13 (01): : 456 - 467
  • [8] A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems
    Li, Chun-Ta
    Lee, Cheng-Chi
    Weng, Chi-Yao
    Chen, Song-Jhih
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
  • [9] A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems
    Chun-Ta Li
    Cheng-Chi Lee
    Chi-Yao Weng
    Song-Jhih Chen
    Journal of Medical Systems, 2016, 40
  • [10] An efficient mutual authentication and privacy prevention scheme for e-healthcare monitoring
    Mohit, Prerna
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63