ECKCI: An ECC-Based Authenticated Key Agreement Scheme Resistant to Key Compromise Impersonation Attack for TMIS

被引:0
|
作者
Pirmoradian, Fatemeh [1 ]
Dakhilalian, Seyed Mohammad [1 ]
Safkhani, Masoumeh [2 ,3 ]
机构
[1] Isfahan Univ Technol IUT, Dept Elect & Comp Engn, Esfahan, Iran
[2] Shahid Rajaee Teacher Training Univ, Dept Comp Engn, Tehran, Iran
[3] Inst Res Fundamental Sci IPM, Sch Comp Sci, Tehran, Iran
关键词
Authentication Protocols; Privacy; ProVerif Tool; Scyther Tool; PROTOCOL;
D O I
10.22042/isecure.2024.408640.989
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is an innovation in technology. Continuous advancements based on the IoT cloud have revolutionized the lives of humans, and remote health monitoring of patients is no exception. The Telecare Medicine Information System (TMIS) allows physicians, other health care providers and patients to observe the medical data electronically. Therefore, security in remote medicine has always been a serious challenge. Recently, to make a secure communication system, biometrics-based schemes have played a crucial role in IoT, Wireless Sensor Networks (WSN), etc. are gaining popularity due to their authenticity and high security properties. Many key agreement schemes have been presented in this literature. These schemes are only for authorized access to medical services and initiate a session to negotiate a shared essential between users and servers. Recently, Xiong et al. and Mehmood et al. presented key exchange methods for healthcare applications that claimed these schemes provide greater privacy. However, we show that these schemes suffer from privacy issues and key compromise impersonation attacks. In this paper, to remove such restrictions, a novel scheme (ECKCI) based on Elliptic Curve Cryptography (ECC) with KCI resistance property was proposed. Furthermore, we demonstrate that the ECKCI not only overcomes problems such as key compromise impersonation attacks in previous protocols, but also resists all specific attacks. Finally, a suitable equilibrium between the performance and security of ECKCI in comparison with recently proposed protocols was obtained. Also, the simulation results with the Scyther and ProVerif tools show that the ECKCI is safe. (c) 2024 ISC. All rights reserved.
引用
收藏
页码:115 / 136
页数:22
相关论文
共 50 条
  • [1] ECC-Based Authenticated Key Agreement Protocol for Industrial Control System
    Chen, Yanru
    Yin, Fengming
    Hu, Shunfang
    Sun, Limin
    Li, Yang
    Xing, Bin
    Chen, Liangyin
    Guo, Bing
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (06) : 4688 - 4697
  • [2] A Noval and Efficient ECC-Based Authenticated Key Agreement Scheme for Smart Metering in the Smart Grid
    Wang, Cong
    Li, Su
    Ma, Maode
    Tong, Xin
    Zhang, Yiying
    Zhang, Bo
    ELECTRONICS, 2022, 11 (20)
  • [3] An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation
    Inam ul haq
    Jian Wang
    Youwen Zhu
    Saad Maqbool
    Digital Communications and Networks, 2021, 7 (01) : 140 - 150
  • [4] An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation
    ul Haq, Inam
    Wang, Jian
    Zhu, Youwen
    Maqbool, Saad
    DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (01) : 140 - 150
  • [5] Robust ECC-based Authenticated Key Agreement Scheme with Privacy Protection for Telecare Medicine Information Systems
    Zhang, Liping
    Zhu, Shaohui
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (05) : 1 - 11
  • [6] Robust ECC-based Authenticated Key Agreement Scheme with Privacy Protection for Telecare Medicine Information Systems
    Liping Zhang
    Shaohui Zhu
    Journal of Medical Systems, 2015, 39
  • [7] RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications
    Safkhani, Masoumeh
    Bagheri, Nasour
    Kumari, Saru
    Tavakoli, Hamidreza
    Kumar, Sachin
    Chen, Jiahui
    IEEE ACCESS, 2020, 8 : 200851 - 200862
  • [8] A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid
    Wang, Cong
    Huo, Peng
    Ma, Maode
    Zhou, Tong
    Zhang, Yiying
    COMPUTING, 2023, 105 (11) : 2511 - 2537
  • [9] Outsider Key Compromise Impersonation Attack on a Multi-factor Authenticated Key Exchange Protocol
    Ma, Zhiqiang
    He, Jun
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 320 - 337
  • [10] A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid
    Cong Wang
    Peng Huo
    Maode Ma
    Tong Zhou
    Yiying Zhang
    Computing, 2023, 105 : 2511 - 2537