An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce Using Chaotic Hash Function

被引:34
作者
Das, Ashok Kumar [1 ]
Goswami, Adrijit [2 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
[2] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
关键词
Telecare medicine information systems; Chaotic hash function; Biohashing; Security; Biometrics; Password; Anonymity; AVISPA; SMART-CARD SECURITY; PASSWORD AUTHENTICATION; USER; CRYPTANALYSIS; IMPROVEMENT; EFFICIENT;
D O I
10.1007/s10916-014-0027-z
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.
引用
收藏
页数:19
相关论文
共 28 条
[1]  
[Anonymous], AVISPA WEB TOOL
[2]  
[Anonymous], 2013, J. Med. Syst.
[3]  
Basin D., 2005, Int J Inf Secur, V4, P181, DOI DOI 10.1007/S10207-004-0055-7
[4]   A Robust and Novel Dynamic-ID-based Authentication Scheme for Care Team Collaboration with Smart Cards [J].
Chang, Ya-Fen ;
Chen, Chia-Chen ;
Chang, Pei-Yu .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
[5]   A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care [J].
Chang, Ya-Fen ;
Yu, Shih-Hui ;
Shiao, Ding-Rui .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
[6]   Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards [J].
Das, A. K. .
IET INFORMATION SECURITY, 2011, 5 (03) :145-151
[7]  
Das A. K., 2013, "Netw.Sci., V2, P12
[8]   A novel proxy signature scheme based on user hierarchical access control policy [J].
Das, Ashok Kumar ;
Massand, Ashish ;
Patil, Sagar .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2013, 25 (02) :219-228
[9]   A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care [J].
Das, Ashok Kumar ;
Goswami, Adrijit .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (03)
[10]   Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem [J].
Das, Ashok Kumar ;
Paul, Nayan Ranjan ;
Tripathy, Laxminath .
INFORMATION SCIENCES, 2012, 209 :80-92