SHAPARAK: Scalable healthcare authentication protocol with attack-resilience and anonymous key-agreement

被引:35
作者
Hajian, R. [1 ]
ZakeriKia, S. [2 ]
Erfani, S. H. [3 ]
Mirabi, M. [3 ]
机构
[1] Islamic Azad Univ, Dept Informat Technol Engn, South Tehran Branch, Tehran, Iran
[2] Islamic Azad Univ, Dept Comp Engn, Sci & Res Branch, Tehran, Iran
[3] Islamic Azad Univ, Fac Engn, Dept Comp Engn, South Tehran Branch, Tehran, Iran
关键词
Internet of things; Key agreement; Wearable sensing device; TMIS; Mutual Authentication; GNY logic; USER AUTHENTICATION; SECURITY; SCHEME;
D O I
10.1016/j.comnet.2020.107567
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security in wearable sensor networks and telecare medical information systems (TMIS) has turned to an issue of scholarly interest in recent years. Adequate security to agree on a temporary session key is essential for establishing a secure connection on various layers of the protocol stack in the Internet of Things (IoT) environments. Recently, Gupta et al. proposed a lightweight authentication and key agreement scheme for wearable sensing devices. Our analysis of Gupta et al.'s scheme revealed that it is insecure against privileged-insider attack, compromise sensing device, and desynchronization attacks in wearable sensor registration and login and authentication phases. In this paper, a Scalable Healthcare Authentication Protocol with Attack-Resilience and Anonymous Key-agreement, SHAPARAK, is proposed to overcome security flaws of existing schemes. The proposed protocol offers more scalability as it uses a public channel in the process of registration of each wearable sensing device. It also contains the password and biometrics changing phase without involvement of the trusted server. The security analysis of the proposed scheme is evaluated using the GNY logic, AVISPA tool, random oracle model, and informal security analysis. It is also shown that the proposed protocol is cost-efficient in terms of computation and communication overheads, compared to the existing schemes.
引用
收藏
页数:18
相关论文
共 30 条
[1]   Efficient provably-secure privacy-preserving signature-based key establishment protocol [J].
Abbasinezhad-Mood, Dariush ;
Ostad-Sharif, Arezou ;
Nikooghadam, Morteza .
AD HOC NETWORKS, 2020, 100
[2]   An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (11)
[3]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[4]   Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems [J].
Arshad, Hamed ;
Rasoolzadegan, Abbas .
JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
[5]   A Survey of Authentication Schemes in Telecare Medicine Information Systems [J].
Aslam, Muhammad Umair ;
Derhab, Abdelouahid ;
Saleem, Kashif ;
Abbas, Haider ;
Orgun, Mehmet ;
Iqbal, Waseem ;
Aslam, Baber .
JOURNAL OF MEDICAL SYSTEMS, 2017, 41 (01)
[6]  
AVISPA, 2019, AVISPA AUTOMATED VAL
[7]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
[8]   A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography [J].
Chaudhry, Shehzad Ashraf ;
Khan, Muhammad Tawab ;
Khan, Muhammad Khurram ;
Shon, Taeshik .
JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
[9]   A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS [J].
Das, Ashok Kumar ;
Odelu, Vanga ;
Goswami, Adrijit .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (09)
[10]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208