Secure Delegation-Based Authentication for Telecare Medicine Information Systems

被引:8
|
作者
Tan, Zuowen [1 ,2 ,3 ]
机构
[1] Jiangxi Univ Finance & Econ, Sch Informat Technol, Nanchang 330032, Jiangxi, Peoples R China
[2] Nanchang Inst Sci & Technol, Nanchang 330108, Jiangxi, Peoples R China
[3] Guangzhou Univ, Sch Math & Informat Sci, Key Lab Informat Secur, Guangzhou 510006, Guangdong, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Authentication; BAN; cryptography; delegation; ROAMING SERVICE; PROTOCOL; SCHEME; CLOUD; PRIVACY;
D O I
10.1109/ACCESS.2018.2832077
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The telecare medicine information systems (TMISs) enable patients to gain health monitoring at home and obtain medical services over mobile networks. In recent years, many authentication schemes have been proposed to address the security and privacy issues in the TMISs. For example, Kim et al. and Huang et al. proposed efficient delegation-based authentication protocols by using elliptic curve cryptography. These protocols have a prerequisite that both the home location register and the visited location register must share secrets beforehand. In this paper, we show that Kim et al.'s and Hwang et al.'s schemes are vulnerable to known key attacks. Moreover, they fail to provide communication confidentiality. We then present a new secure delegation-based authentication protocol by using the identity-based cryptography. The proposed protocol removes the weaknesses of the above-mentioned protocols. Through the analysis of the Burrows Abadi Needham logic, along with a random oracle model, we demonstrate that the proposed scheme provides secure authentication. In addition, the proposed scheme can provide more security functionaries than the existing delegation-based authentication protocols. Better tradeoff among security and functionality features and communication and computation costs makes our scheme suitable and applicable in the TMISs.
引用
收藏
页码:26091 / 26110
页数:20
相关论文
共 50 条
  • [41] Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems
    Hamed Arshad
    Abbas Rasoolzadegan
    Journal of Medical Systems, 2016, 40
  • [42] EFFICIENT DELEGATION-BASED AUTHENTICATION PROTOCOL WITH STRONG MOBILE PRIVACY
    Lu, Jian-Zhu
    Ren, Hong-Qing
    Zhou, Jiping
    2011 PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION NETWORKS AND SYSTEMS (WINSYS 2011), 2011, : 123 - 127
  • [43] A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems
    Li, Chun-Ta
    Lee, Cheng-Chi
    Weng, Chi-Yao
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (09)
  • [44] A Secure RFID Protocol for Telecare Medicine Information Systems using ECC
    Pokala, Jaya Prakash
    Reddy, M. ChandraMouli
    Jeelan, Abdul S.
    Bapana, Surekha
    Vorugunti, Chandra Sekhar
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 2295 - 2300
  • [45] A Lightweight Biometric-based Authentication Scheme for Telecare Medicine Information Systems Using ECC
    Sahoo, Shreeya Swagatika
    Mohanty, Sujata
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
  • [46] Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Wei-Chuen Yau
    Raphael C.-W. Phan
    Journal of Medical Systems, 2013, 37
  • [47] A Dynamic Identity Based Authentication Scheme Using Chaotic Maps for Telecare Medicine Information Systems
    Wang, Zhiheng
    Huo, Zhanqiang
    Shi, Wenbo
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (01)
  • [48] A Robust and Anonymous Two Factor Authentication and Key Agreement Protocol for Telecare Medicine Information Systems
    Xiong, Hu
    Tao, Junyi
    Chen, Yanan
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
  • [49] A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems
    Mir, Omid
    van der Weide, Theo
    Lee, Cheng-Chi
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (09)
  • [50] Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems
    SK Hafizul Islam
    Muhammad Khurram Khan
    Journal of Medical Systems, 2014, 38