An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks

被引:117
作者
Wu, Fan [1 ]
Xu, Lili [2 ]
Kumari, Saru [3 ]
Li, Xiong [4 ,5 ]
机构
[1] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[2] Xiamen Univ, Sch Informat Sci & Technol, Xiamen 361005, Peoples R China
[3] Ch Charan Singh Univ, Dept Math, Meerut 250005, Uttar Pradesh, India
[4] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[5] Nanjing Univ Informat Sci & Technol, Nanjing 210044, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Wireless medical sensor network; Smart card; The off-line guessing attack; The sensor capture attack; Mutual authentication; USER AUTHENTICATION; SMART-CARD; SECURITY; EFFICIENT; SCHEMES;
D O I
10.1007/s00530-015-0476-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) are fast developed and widely used in many applications. One of the most important applications is wireless medical sensor network (WMSN) which makes modern health-care more popular. The doctor can get the patient's physiological data collected by special sensors deployed on or in the patient's body in real time with the mobile devices via the wireless communication channel. The collected data are important and should be confidential. So security measures are considered in the process of communication. Recently, He et al. (Multimed Syst, 21(1), 49-60, 2015) proposed a new two-factor authentication scheme for health-care with WMSNs and claimed it to be secure. But we find that it is vulnerable to the off-line guessing attack, the user impersonation attack, and the sensor node capture attack. Moreover, we present an improved scheme to overcome the disadvantages. Through the formal verification with Proverif and the analysis presented by us, our scheme is secure. It is more practical for applications through the comparison between some recent schemes for WMSNs.
引用
收藏
页码:195 / 205
页数:11
相关论文
共 35 条
[1]   A Robust Mutual Authentication Protocol for Wireless Sensor Networks [J].
Chen, Tien-Ho ;
Shih, Wei-Kuan .
ETRI JOURNAL, 2010, 32 (05) :704-712
[2]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[3]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[4]   Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks [J].
He, Debiao ;
Zeadally, Sherali ;
Wu, Libing .
IEEE SYSTEMS JOURNAL, 2018, 12 (01) :64-73
[5]   Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks [J].
He, Debiao ;
Kumar, Neeraj ;
Chen, Jianhua ;
Lee, Cheng-Chi ;
Chilamkurti, Naveen ;
Yeo, Seng-Soo .
MULTIMEDIA SYSTEMS, 2015, 21 (01) :49-60
[6]   A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks [J].
He, Debiao ;
Kumar, Neeraj ;
Chilamkurti, Naveen .
INFORMATION SCIENCES, 2015, 321 :263-277
[7]   Authentication Protocol for an Ambient Assisted Living System [J].
He, Debiao ;
Zeadally, Sherali .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (01) :71-77
[8]   A Web Service System Supporting Three-dimensional Post-processing of Medical Images Based on WADO Protocol [J].
He, Longjun ;
Xu, Lang ;
Ming, Xing ;
Liu, Qian .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (02)
[9]   An Authentication Scheme to Healthcare Security under Wireless Sensor Networks [J].
Hsiao, Tsung-Chih ;
Liao, Yu-Ting ;
Huang, Jen-Yan ;
Chen, Tzer-Shyong ;
Horng, Gwo-Boa .
JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) :3649-3664
[10]   Privacy-preserving telecardiology sensor networks: Toward a low-cost portable wireless hardware/software codesign [J].
Hu, Fei ;
Jiang, Meng ;
Wagner, Mark ;
Dong, De-Cun .
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2007, 11 (06) :619-627