Cryptanalysis and Biometric-Based Enhancement of a Remote User Authentication Scheme for E-Healthcare System

被引:0
作者
Rifaqat Ali
Arup Kumar Pal
机构
[1] Indian Institute of Technology (Indian School of Mines),Department of Computer Science and Engineering
来源
Arabian Journal for Science and Engineering | 2018年 / 43卷
关键词
Authentication; logic; Random oracle model; E-healthcare system;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, E-healthcare system is quite popular and the easiest medium to avail high-quality healthcare services from the specialized medical professions. In this system, the security is one of the major concern issues since during diagnosis process the patient’s medical-related documents are sensitive and it is always desirable that the authorized users can avail this facility in a secure way. Several remote user authentication schemes are reported to make E-healthcare system secure. Recently, Li et al. proposed a user authentication scheme for E-healthcare system and claimed that their scheme is able to withstand most of the common security attacks. However, we have reviewed their scheme and pointed out some vulnerabilities like identity and password guessing attacks; privileged insider attack; user impersonation attack; and smartcard theft attack. In order to overcome these security vulnerabilities, a biometric-based remote user authentication scheme is proposed for improving the security in E-healthcare system. The proposed scheme is validated using well-accepted Burrows–Abadi–Needham (BAN) logic and random oracle model. The informal security analysis ensures that the proposed scheme is able to resist several types of malicious cryptography attacks. Further, the proposed scheme is simulated using the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and the simulation results reveal that the scheme is secure against active and passive attacks. The proposed scheme is also compared with the existing schemes in terms of evaluation parameters like smartcard storage cost, communication cost, computation cost, and estimated time.
引用
收藏
页码:7837 / 7852
页数:15
相关论文
共 113 条
[1]  
Messerges TS(2002)Examining smart-card security under the threat of power analysis attacks IEEE Trans. Comput. 51 541-552
[2]  
Dabbish EA(2012)An improved authentication scheme for telecare medicine information systems J. Med. Syst. 36 3597-3604
[3]  
Sloan RH(2012)An efficient authentication scheme for telecare medicine information systems J. Med. Syst. 36 3833-3838
[4]  
Wei J(2015)Cryptanalysis and security enhancement of zhu’s authentication scheme for telecare medicine information system Secur. Commun. Netw. 8 149-158
[5]  
Hu X(2015)On the security of a two-factor authentication and key agreement scheme for telecare medicine information systems J. Med. Syst. 39 76-204
[6]  
Liu W(2013)An authentication scheme for secure access to healthcare services J. Med. Syst. 37 9954-6
[7]  
Zhu Z(2013)An efficient biometrics-based authentication scheme for telecare medicine information systems Network 2 200-475
[8]  
Bin Muhaya FT(2013)A secure biometrics-based authentication scheme for telecare medicine information systems J. Med. Syst. 5 1-88
[9]  
Arshad H(2014)Cryptanalysis and improvement of yan et al’.s biometric-based authentication scheme for telecare medicine information systems J. Med. Syst. 38 24-244
[10]  
Teymoori V(2017)Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme IEEE J. Biomed. Health Inf. 21 465-2001