A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks

被引:57
作者
Das, Ashok Kumar [1 ]
Sutrala, Anil Kumar [1 ]
Odelu, Vanga [2 ]
Goswami, Adrijit [3 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
[2] Indian Inst Informat Technol Chittoor, Dept Comp Sci & Engn, Sri City 517588, Andhra Pradesh, India
[3] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
关键词
Wireless medical sensor network; Authentication; Smart card; User anonymity; AVISPA; Security; ACCESS-CONTROL; PROTOCOL; KEY; CRYPTANALYSIS;
D O I
10.1007/s11277-016-3718-6
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
A wireless medical sensor network (WMSN ) is a professional application of the traditional wireless body area sensor networks in medicine. Using WMSNs, the parameters of patients' vital signs can be gathered from the sensor nodes deployed on the body of the patients and accessed by the healthcare professionals by using a mobile device. Due to wireless communication, securing communication becomes a vital issue in WMSNs. Since the vital signs parameters are sensitive to the patients' health status and these information must not be revealed to the others except the healthcare professionals, the protection of patients' privacy becomes another key issue for WMSNs applications. Thus, user authentication with anonymity property is the most basic and commonly used method in order to resolve the security and privacy issues of WMSNs. He et al. presented a user authentication protocol for healthcare applications using WMSNs to protect the security and privacy problems. However, Li et al. showed that their scheme is incorrect in authentication and session key agreement phase, has no wrong password detection mechanism and is vulnerable to denial of service caused by password change with wrong password. In this paper, we review Li et al.'s scheme and show that their scheme is still vulnerable to privileged-insider attack, sensor node capture attack and fails to provide user anonymity property. Moreover, we find that He et al.'s scheme is still vulnerable to the same attacks as we find out in Li et al.'s scheme. In order to remedy the security weaknesses found in both He et al.'s scheme and Li et al.'s scheme, we present a secure biometrics-based user authentication scheme in WMSNs using smart card. Through the rigorous formal and informal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications tool and the simulation results reveal that our scheme is secure. Our scheme is also efficient in computation and communication as compared to He et al.'s scheme, Li et al.'s scheme and other related schemes.
引用
收藏
页码:1899 / 1933
页数:35
相关论文
共 37 条
[1]  
[Anonymous], 2001, FIPS PUB
[2]  
[Anonymous], J MED SYSTEMS
[3]  
[Anonymous], 1995, FIPS PUB
[4]  
[Anonymous], WEAKNESS SECURED AUT
[5]  
Basin D., 2005, Int J Inf Secur, V4, P181, DOI DOI 10.1007/S10207-004-0055-7
[6]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[7]   An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks [J].
Chatterjee, Santanu ;
Das, Ashok Kumar .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (09) :1752-1771
[8]   An efficient dynamic group key agreement protocol for imbalanced wireless networks [J].
Chuang, Yun-Hsin ;
Tseng, Yuh-Min .
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2010, 20 (04) :167-180
[10]   An anonymous and secure biometric-based enterprise digital rights management system for mobile environment [J].
Das, Ashok Kumar ;
Mishra, Dheerendra ;
Mukhopadhyay, Sourav .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) :3383-3404