A Secure Authentication Protocol for Multi-Sever-Based E-Healthcare Using a Fuzzy Commitment Scheme

被引:46
|
作者
Barman, Subhas [1 ]
Shum, Hubert P. H. [2 ]
Chattopadhyay, Samiran [3 ]
Samanta, Debasis [4 ]
机构
[1] Jalpaiguri Govt Engn Coll, Jalpaiguri, India
[2] Northumbria Univ, Fac Engn & Environm, Newcastle Upon Tyne NE1 8ST, Tyne & Wear, England
[3] Jadavpur Univ, Dept Informat Technol, Kolkata 700098, India
[4] IIT Kharagpur, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
基金
英国工程与自然科学研究理事会;
关键词
Telecare medicine information system (THIS); fuzzy commitment scheme; BAN logic; real-or-random (ROR); AVISPA tool; KEY AGREEMENT PROTOCOL; USER AUTHENTICATION; PASSWORD AUTHENTICATION; INFORMATION; EFFICIENT; BIOMETRICS; DESIGN; EXCHANGE; PRIVACY; ATTACKS;
D O I
10.1109/ACCESS.2019.2893185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart card-based remote authentication schemes are widely used in multi-medicalserver-based telecare medicine information systems (TMISs). Biometric is one of the most trustworthy authenticators and is presently being advocated to use in the remote authentication of THIS. However, most of the existing TMISs consider a single-server-environment-based authentication system. Therefore, patients need to register and log into every server separately for different services. Furthermore, these schemes do not employ error correction technique to remove the errors from biometric data. Also, biometrics are inherent and demand diversification to generate a revocable template from inherent biometric data. In this paper, we propose a mutual authentication and key agreement scheme for a multi-medical server environment to overcome the limitations of the existing schemes. In the proposed scheme, a cancelable transformation of the raw biometric data is used to provide the privacy and the diversification of biometric data. The errors of the biometric data are corrected with error-correction techniques under the fuzzy commitment mechanism. A formal security analysis using the widely accepted real-or-random model, the Burrows-Abadi-Needham logic, and the automated validation of Internet security protocols and applications tool concludes that the proposed scheme is safe against known attacks. We also compare the computation and communication costs of our scheme to evaluate the performance with the others.
引用
收藏
页码:12557 / 12574
页数:18
相关论文
共 50 条
  • [31] A privacy-preserving and energy efficient authentication protocol for the cloud-based e-healthcare system
    Alzahrani, Abdulrahman
    Alzahrani, Hamdan A.
    ALEXANDRIA ENGINEERING JOURNAL, 2025, 118 : 59 - 90
  • [32] Lightweight secure communication system based on Message Queuing Transport Telemetry protocol for e-healthcare environments
    Naresh, Vankamamidi S.
    Reddi, Sivaranjani
    Allavarpu, V. V. L. Divakar
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (11)
  • [33] A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    Das, Ashok Kumar
    Shen, Jian
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 919 - 930
  • [34] A Note on “Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services”
    Zhengjun Cao
    Wireless Personal Communications, 2023, 133 : 2439 - 2444
  • [35] A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications
    Fan Wu
    Lili Xu
    Saru Kumari
    Xiong Li
    Ashok Kumar Das
    Jian Shen
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 919 - 930
  • [36] A Hybrid and Fast Authentication Protocol for Handoff Support in e-Healthcare Systems among WSNs
    Bruce, Ndibanje
    Hwang, Gi-Hyun
    Lee, Hoon Jae
    2013 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2013): FUTURE CREATIVE CONVERGENCE TECHNOLOGIES FOR NEW ICT ECOSYSTEMS, 2013, : 72 - 77
  • [37] A Note on "Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services"
    Cao, Zhengjun
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 133 (04) : 2439 - 2444
  • [38] Addressing a Secure Session-Key Scheme for Mobility Supported e-Healthcare Systems
    Kumar, Pardeep
    Porambage, Pawani
    Ylianttila, Mika
    Gurtov, Andrei
    Lee, Hoon-Jae
    Sain, Mangal
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 538 - 540
  • [39] Secure Electronic Healthcare Record Using Robust Authentication Scheme
    Yaseen, Aqeel A.
    Patel, Kalyani
    Yassin, Ali A.
    Aldarwish, Abdulla J.
    Hussein, Haitham A.
    IAENG International Journal of Computer Science, 2023, 50 (02):
  • [40] Secure and Effective Image Storage for Cloud Based E-healthcare Systems
    Song, Chunhe
    Lin, Xiaodong
    Shen, Xuemin
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 653 - 658