ECKCI: An ECC-Based Authenticated Key Agreement Scheme Resistant to Key Compromise Impersonation Attack for TMIS

被引:0
|
作者
Pirmoradian, Fatemeh [1 ]
Dakhilalian, Seyed Mohammad [1 ]
Safkhani, Masoumeh [2 ,3 ]
机构
[1] Isfahan Univ Technol IUT, Dept Elect & Comp Engn, Esfahan, Iran
[2] Shahid Rajaee Teacher Training Univ, Dept Comp Engn, Tehran, Iran
[3] Inst Res Fundamental Sci IPM, Sch Comp Sci, Tehran, Iran
关键词
Authentication Protocols; Privacy; ProVerif Tool; Scyther Tool; PROTOCOL;
D O I
10.22042/isecure.2024.408640.989
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is an innovation in technology. Continuous advancements based on the IoT cloud have revolutionized the lives of humans, and remote health monitoring of patients is no exception. The Telecare Medicine Information System (TMIS) allows physicians, other health care providers and patients to observe the medical data electronically. Therefore, security in remote medicine has always been a serious challenge. Recently, to make a secure communication system, biometrics-based schemes have played a crucial role in IoT, Wireless Sensor Networks (WSN), etc. are gaining popularity due to their authenticity and high security properties. Many key agreement schemes have been presented in this literature. These schemes are only for authorized access to medical services and initiate a session to negotiate a shared essential between users and servers. Recently, Xiong et al. and Mehmood et al. presented key exchange methods for healthcare applications that claimed these schemes provide greater privacy. However, we show that these schemes suffer from privacy issues and key compromise impersonation attacks. In this paper, to remove such restrictions, a novel scheme (ECKCI) based on Elliptic Curve Cryptography (ECC) with KCI resistance property was proposed. Furthermore, we demonstrate that the ECKCI not only overcomes problems such as key compromise impersonation attacks in previous protocols, but also resists all specific attacks. Finally, a suitable equilibrium between the performance and security of ECKCI in comparison with recently proposed protocols was obtained. Also, the simulation results with the Scyther and ProVerif tools show that the ECKCI is safe. (c) 2024 ISC. All rights reserved.
引用
收藏
页码:115 / 136
页数:22
相关论文
共 50 条
  • [41] Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment
    Reddy, Alavalapati Goutham
    Yoon, Eun-Jun
    Das, Ashok Kumar
    Odelu, Vanga
    Yoo, Kee-Young
    IEEE ACCESS, 2017, 5 : 3622 - 3639
  • [42] Improvement on a batch authenticated key agreement scheme
    Qingfeng Cheng
    Ting Chen
    Siqi Ma
    Xinghua Li
    Frontiers of Computer Science, 2022, 16
  • [43] Improvement on a batch authenticated key agreement scheme
    Cheng, Qingfeng
    Chen, Ting
    Ma, Siqi
    Li, Xinghua
    FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (02)
  • [44] A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS
    Das, Ashok Kumar
    Odelu, Vanga
    Goswami, Adrijit
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (09)
  • [45] A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS
    Ashok Kumar Das
    Vanga Odelu
    Adrijit Goswami
    Journal of Medical Systems, 2015, 39
  • [46] A Pairing Free Attribute-Based Authenticated Key Agreement Protocol Using ECC
    Verma, Reshu
    Kumar, Abhimanyu
    4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2020, 1122 : 105 - 114
  • [47] Key-compromise Impersonation Attacks on Some Certificateless Key Agreement Protocols and Two Improved Protocols
    Gao Meng
    Zhang Futai
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 62 - 66
  • [48] AUTHENTICATED KEY AGREEMENT SCHEME BASED ON BLOCKCHAIN FOR AMI COMMUNICATION SECURITY
    Liu, Zhendong
    Meng, Liang
    Zhao, Qingyuan
    Li, Fei
    Song, Manrui
    Jian, Yuzhi
    Tian, Hongliang
    REVUE ROUMAINE DES SCIENCES TECHNIQUES-SERIE ELECTROTECHNIQUE ET ENERGETIQUE, 2023, 68 (02): : 218 - 223
  • [49] RETRACTED: ECC-Based Authenticated Key Exchange Protocol for Fog-Based IoT Networks (Retracted Article)
    Iqbal, Ummer
    Bhola, Jyoti
    Jayasudha, M.
    Ahmad, Mohd Wazih
    Neware, Rahul
    Yadav, Arvind R.
    Gelana, Fraol Waldamichael
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [50] An Interoperable ECC based Authentication and Key Agreement Scheme for IoT Environment
    Sahoo, Asit
    Sahoo, Shreeya Swagatika
    Sahoo, Sampa
    Sahoo, Bibhudatta
    Turuk, Ashok Kumar
    2020 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2020,