Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems

被引:89
作者
Jiang, Qi [1 ]
Chen, Zhiren [1 ]
Li, Bingyan [1 ]
Shen, Jian [2 ]
Yang, Li [1 ,3 ]
Ma, Jianfeng [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
[3] Sci & Technol Commun Networks Lab, Shijiazhuang 050081, Hebei, Peoples R China
基金
中国国家自然科学基金;
关键词
Telecare medical information system; Authentication; Key agreement; Password; Smart card; Biometric; Privacy; KEY AGREEMENT PROTOCOL; USER AUTHENTICATION; BIOMETRICS;
D O I
10.1007/s12652-017-0516-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The deployment of telecare medical information system (TMIS) over public networks gives rise to the threat of exposing sensitive medical information to illegal entities. Although a number of three-factor authentication (3FA) schemes have been developed to address this challenge, most of them are found to be flawed. Understanding security and privacy failures of authentication protocols is a prerequisite to both fixing existing protocols and designing future ones. In this paper, we investigate the 3FA protocol of Lu et al. for TMIS (J Med Syst 39:32, 2015) and reveal that it cannot achieve the claimed security and privacy goals. (1) It fails to provide anonymity and untraceability, and is susceptible to the following attacks targeting user privacy: identity revelation attack, identity guessing attack and tracking attack. (2) It is susceptible to offline password guessing attack, user impersonation attack, and server impersonation attack. Then we present an improved 3FA scheme and show that the new scheme fulfills session key secrecy and mutual authentication using the formal verification tool ProVerif. Moreover, detailed heuristic security analysis is also presented to demonstrate that our new scheme is capable of withstanding various attacks, and provides desired security features. Additionally, performance analysis shows that our proposed protocol is a practical solution for TMIS.
引用
收藏
页码:1061 / 1073
页数:13
相关论文
共 51 条
[1]   A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity [J].
Amin, Ruhul ;
Biswas, G. P. .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (08)
[2]  
[Anonymous], MULTIMEDIA TOOLS APP
[3]  
[Anonymous], J MED SYST
[4]  
[Anonymous], INT C BROADB WIR COM
[5]   Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol [J].
Arshad, Hamed ;
Nikooghadam, Morteza .
JOURNAL OF SUPERCOMPUTING, 2015, 71 (08) :3163-3180
[6]   Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems [J].
Arshad, Hamed ;
Nikooghadam, Morteza .
JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (12)
[7]   A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce [J].
Awasthi, Amit K. ;
Srivastava, Keerti .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (05)
[8]   An efficient cryptographic protocol verifier based on prolog rules [J].
Blanchet, B .
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, :82-96
[10]   An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce Using Chaotic Hash Function [J].
Das, Ashok Kumar ;
Goswami, Adrijit .
JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (06)