An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring

被引:44
作者
Ali R. [1 ]
Pal A.K. [1 ]
Kumari S. [2 ]
Sangaiah A.K. [3 ]
Li X. [4 ]
Wu F. [5 ]
机构
[1] Department of Computer Science and Engineering, Indian Institute of Technology (ISM), Dhanbad
[2] Department of Mathematics, Ch. Charan Singh University, Uttar Pradesh, Meerut
[3] School of Computing Science and Engineering, VIT University, Vellore, Tamil Nadu
[4] School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan
[5] Department of Computer Science and Engineering, Xiamen Institute of Technology, Xiamen
关键词
Authentication; Cryptanalysis; Security attacks; Wireless medical sensor networks;
D O I
10.1007/s12652-018-1015-9
中图分类号
学科分类号
摘要
With the rapid growth of wireless medical sensor networks (WMSNs) based healthcare applications, protecting both the privacy and security from illegitimate users, are major concern issues since patient’s precise information is vital for the proper diagnosis procedure. So, authentication protocol is one of the efficient mechanisms to deal with trustworthy and authentic users. Several authentication protocols have been proposed in WMSNs environment. However, the most of these protocols are so susceptible to security threats and not suitable for practical use. In this article, recently proposed Amin et al.’s authentication scheme is reviewed and some vulnerabilities like off-line password guessing attack, user impersonation attack, known session-key temporary information attack, the revelation of secret parameters, and identity guessing attack are pointed out. To overcome all the above mentioned vulnerabilities, we have proposed an enhanced three-factor based remote user authentication protocol in WMSNs environment. Further, the proposed protocol is validated using Burrows–Abadi–Needham logic and then simulated using Automated Validation of Internet Security Protocols and Applications tool. Moreover, the security analysis ensures that the proposed protocol is well protected from various types of malicious attacks. In addition, the performance evaluation shows better efficiency and suitability of our protocol over other related protocols. © Springer-Verlag GmbH Germany, part of Springer Nature 2018.
引用
收藏
页码:1165 / 1186
页数:21
相关论文
共 49 条
[1]  
Ali R., Pal A.K., A secure and robust three-factor based authentication scheme using RSA cryptosystem, Int J Bus Data Commun Netw, 13, 1, pp. 74-84, (2017)
[2]  
Ali R., Pal A.K., Cryptanalysis and biometric-based enhancement of a remote user authentication scheme for e-healthcare system, Arab J Sci Eng, (2018)
[3]  
Ali R., Pal A.K., An efficient three factor-based authentication scheme in multiserver environment using ECC, Int J Commun Syst, 31, (2018)
[4]  
Ali R., Pal A.K., A secure three-factor remote user authentication scheme using elliptic curve cryptosystem, In: Proceedings of the International Conference on Microelectronics, Computing and Communication Systems, pp. 9-24, (2018)
[5]  
Ali R., Pal A.K., Kumari S., Karuppiah M., Conti M., A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring, Futur Gener Comput Syst, (2017)
[6]  
Amin R., Islam S.H., Biswas G., Khan M.K., Kumar N., A robust and anonymous patient monitoring system using wireless medical sensor networks, Futur Gener Comput Syst, 80, pp. 483-495, (2018)
[7]  
Amin R., Islam S.H., Biswas G., Khan M.K., Leng L., Kumar N., Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks, Comput Netw, 101, pp. 42-62, (2016)
[8]  
An Y., Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards, Biomed Res Int, (2012)
[9]  
Burrows M., Abadi M., Needham R.M., A logic of authentication, Proc R Soc Lond A Math Phys Eng Sci, 426, pp. 233-271, (1989)
[10]  
Chandrakar P., Om H., A secure two-factor remote user authentication and session key agreement scheme, Int J Bus Data Commun Netw, 12, 2, pp. 62-79, (2016)