A Secure Authentication Protocol for Multi-Sever-Based E-Healthcare Using a Fuzzy Commitment Scheme

被引:46
|
作者
Barman, Subhas [1 ]
Shum, Hubert P. H. [2 ]
Chattopadhyay, Samiran [3 ]
Samanta, Debasis [4 ]
机构
[1] Jalpaiguri Govt Engn Coll, Jalpaiguri, India
[2] Northumbria Univ, Fac Engn & Environm, Newcastle Upon Tyne NE1 8ST, Tyne & Wear, England
[3] Jadavpur Univ, Dept Informat Technol, Kolkata 700098, India
[4] IIT Kharagpur, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
基金
英国工程与自然科学研究理事会;
关键词
Telecare medicine information system (THIS); fuzzy commitment scheme; BAN logic; real-or-random (ROR); AVISPA tool; KEY AGREEMENT PROTOCOL; USER AUTHENTICATION; PASSWORD AUTHENTICATION; INFORMATION; EFFICIENT; BIOMETRICS; DESIGN; EXCHANGE; PRIVACY; ATTACKS;
D O I
10.1109/ACCESS.2019.2893185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart card-based remote authentication schemes are widely used in multi-medicalserver-based telecare medicine information systems (TMISs). Biometric is one of the most trustworthy authenticators and is presently being advocated to use in the remote authentication of THIS. However, most of the existing TMISs consider a single-server-environment-based authentication system. Therefore, patients need to register and log into every server separately for different services. Furthermore, these schemes do not employ error correction technique to remove the errors from biometric data. Also, biometrics are inherent and demand diversification to generate a revocable template from inherent biometric data. In this paper, we propose a mutual authentication and key agreement scheme for a multi-medical server environment to overcome the limitations of the existing schemes. In the proposed scheme, a cancelable transformation of the raw biometric data is used to provide the privacy and the diversification of biometric data. The errors of the biometric data are corrected with error-correction techniques under the fuzzy commitment mechanism. A formal security analysis using the widely accepted real-or-random model, the Burrows-Abadi-Needham logic, and the automated validation of Internet security protocols and applications tool concludes that the proposed scheme is safe against known attacks. We also compare the computation and communication costs of our scheme to evaluate the performance with the others.
引用
收藏
页码:12557 / 12574
页数:18
相关论文
共 50 条
  • [41] Hybrid Cryptographic Scheme for Secure Communication in Mobile Ad Hoc Network-Based E-Healthcare System
    Sirajuddin, Mohammad
    Rupa, Ch
    Bhatia, Surbhi
    Thakur, R. N.
    Mashat, Arwa
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [42] A real-time secure medical device authentication for personal E-Healthcare services on cloud computing
    Padmaja, K.
    Seshadri, R.
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2021,
  • [43] Provably Secure Message Recovery Proxy Signature Scheme for Wireless Sensor Networks in e-Healthcare
    Verma, Girraj Kumar
    Singh, B. B.
    Singh, Harendra
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 99 (01) : 539 - 554
  • [44] SAS-SIP: A secure authentication scheme based on ECC and a fuzzy extractor for session initiation protocol
    Maitra, Tanmoy
    Giri, Debasis
    Mohapatra, Ram N.
    CRYPTOLOGIA, 2019, 43 (03) : 212 - 232
  • [45] Provably Secure Message Recovery Proxy Signature Scheme for Wireless Sensor Networks in e-Healthcare
    Girraj Kumar Verma
    B. B. Singh
    Harendra Singh
    Wireless Personal Communications, 2018, 99 : 539 - 554
  • [46] Lightweight Cloud Computing-Based RFID Authentication Protocols Using PUF for e-Healthcare Systems
    Lee, Tian-Fu
    Lin, Kun-Wei
    Hsieh, Yi-Pei
    Lee, Kuo-Chang
    IEEE SENSORS JOURNAL, 2023, 23 (06) : 6338 - 6349
  • [47] Flexible attribute-based encryption applicable to secure e-healthcare records
    Qin, Bo
    Deng, Hua
    Wu, Qianhong
    Domingo-Ferrer, Josep
    Naccache, David
    Zhou, Yunya
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (06) : 499 - 511
  • [48] Flexible attribute-based encryption applicable to secure e-healthcare records
    Bo Qin
    Hua Deng
    Qianhong Wu
    Josep Domingo-Ferrer
    David Naccache
    Yunya Zhou
    International Journal of Information Security, 2015, 14 : 499 - 511
  • [49] An Anonymous Blockchain-Based Authentication Scheme for Secure Healthcare Applications
    Rajasekaran, Arun Sekar
    Azees, M.
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [50] A secure multi-factor ECC based authentication scheme for Cloud-IoT based healthcare services
    Dhillon, Parwinder Kaur
    Kalra, Sheetal
    JOURNAL OF AMBIENT INTELLIGENCE AND SMART ENVIRONMENTS, 2019, 11 (02) : 149 - 164