ECKCI: An ECC-Based Authenticated Key Agreement Scheme Resistant to Key Compromise Impersonation Attack for TMIS

被引:0
|
作者
Pirmoradian, Fatemeh [1 ]
Dakhilalian, Seyed Mohammad [1 ]
Safkhani, Masoumeh [2 ,3 ]
机构
[1] Isfahan Univ Technol IUT, Dept Elect & Comp Engn, Esfahan, Iran
[2] Shahid Rajaee Teacher Training Univ, Dept Comp Engn, Tehran, Iran
[3] Inst Res Fundamental Sci IPM, Sch Comp Sci, Tehran, Iran
关键词
Authentication Protocols; Privacy; ProVerif Tool; Scyther Tool; PROTOCOL;
D O I
10.22042/isecure.2024.408640.989
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is an innovation in technology. Continuous advancements based on the IoT cloud have revolutionized the lives of humans, and remote health monitoring of patients is no exception. The Telecare Medicine Information System (TMIS) allows physicians, other health care providers and patients to observe the medical data electronically. Therefore, security in remote medicine has always been a serious challenge. Recently, to make a secure communication system, biometrics-based schemes have played a crucial role in IoT, Wireless Sensor Networks (WSN), etc. are gaining popularity due to their authenticity and high security properties. Many key agreement schemes have been presented in this literature. These schemes are only for authorized access to medical services and initiate a session to negotiate a shared essential between users and servers. Recently, Xiong et al. and Mehmood et al. presented key exchange methods for healthcare applications that claimed these schemes provide greater privacy. However, we show that these schemes suffer from privacy issues and key compromise impersonation attacks. In this paper, to remove such restrictions, a novel scheme (ECKCI) based on Elliptic Curve Cryptography (ECC) with KCI resistance property was proposed. Furthermore, we demonstrate that the ECKCI not only overcomes problems such as key compromise impersonation attacks in previous protocols, but also resists all specific attacks. Finally, a suitable equilibrium between the performance and security of ECKCI in comparison with recently proposed protocols was obtained. Also, the simulation results with the Scyther and ProVerif tools show that the ECKCI is safe. (c) 2024 ISC. All rights reserved.
引用
收藏
页码:115 / 136
页数:22
相关论文
共 50 条
  • [31] SGAK: A Robust ECC-Based Authenticated Key Exchange Protocol for Smart Grid Networks
    Khan, Akber Ali
    Kumar, Vinod
    Prasad, Ramakant
    Idrisi, M. Javed
    IEEE ACCESS, 2024, 12 : 195745 - 195759
  • [32] ECC-Based Password-Authenticated Key Exchange in the Three-Party Setting
    Tingting Liu
    Qiong Pu
    Yong Zhao
    Shuhua Wu
    Arabian Journal for Science and Engineering, 2013, 38 : 2069 - 2077
  • [33] ECC-Based Password-Authenticated Key Exchange in the Three-Party Setting
    Liu, Tingting
    Pu, Qiong
    Zhao, Yong
    Wu, Shuhua
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2013, 38 (08): : 2069 - 2077
  • [34] A Novel Authentication and Key Agreement Scheme for Countering MITM and Impersonation Attack in Medical Facilities
    Maikol, Steve Olsen
    Khan, Adnan Shahid
    Javed, Yasir
    Bunsu, Anderson Lau Anak
    Petrus, Chelsten
    George, Heindwick
    Jau, Simon
    INTERNATIONAL JOURNAL OF INTEGRATED ENGINEERING, 2021, 13 (02): : 127 - 135
  • [35] Attack on an ID-based authenticated group key agreement scheme from PKC 2004
    Zhang, FG
    Chen, XF
    INFORMATION PROCESSING LETTERS, 2004, 91 (04) : 191 - 193
  • [36] A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme
    Irshad, Azeem
    Sher, Muhammad
    Nawaz, Omer
    Chaudhry, Shehzad Ashraf
    Khan, Imran
    Kumari, Saru
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (15) : 16463 - 16489
  • [37] Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement
    Shohaimay, Fairuz
    Ismail, Eddie Shahril
    MATHEMATICS, 2023, 11 (01)
  • [38] A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme
    Azeem Irshad
    Muhammad Sher
    Omer Nawaz
    Shehzad Ashraf Chaudhry
    Imran Khan
    Saru Kumari
    Multimedia Tools and Applications, 2017, 76 : 16463 - 16489
  • [39] Cryptanalysis of the modified authenticated key agreement scheme
    Lee, KH
    Lee, BJ
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (01) : 280 - 284
  • [40] Improvement on a batch authenticated key agreement scheme
    CHENG Qingfeng
    CHEN Ting
    MA Siqi
    LI Xinghua
    Frontiers of Computer Science, 2022, 16 (02)