A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS

被引:0
|
作者
Ashok Kumar Das
Vanga Odelu
Adrijit Goswami
机构
[1] International Institute of Information Technology,Center for Security, Theory and Algorithmic Research
[2] Indian Institute of Technology,Department of Mathematics
来源
Journal of Medical Systems | 2015年 / 39卷
关键词
Telecare medicine information systems; Authentication; Key agreement; Multi-medical servers; Fuzzy extractor; Biometrics; User anonymity; AVISPA;
D O I
暂无
中图分类号
学科分类号
摘要
The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas’s scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to other related schemes. As a result, our scheme is very appropriate for practical applications in TMIS.
引用
收藏
相关论文
共 50 条
  • [21] A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards
    Mishra, Dheerendra
    Das, Ashok Kumar
    Mukhopadhyay, Sourav
    EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (18) : 8129 - 8143
  • [22] An anonymous authenticated key-agreement scheme for multi-server infrastructure
    Akram, Muhammad Arslan
    Ghaffar, Zahid
    Mahmood, Khalid
    Kumari, Saru
    Agarwal, Kadambri
    Chen, Chien-Ming
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2020, 10 (01)
  • [23] Cryptanalysis and Improvement of an Anonymous Multi-server Authenticated Key Agreement Scheme
    Kumari, Shipra
    Om, Hari
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (02) : 2513 - 2537
  • [24] An Efficient Multi-server Password Authenticated Key Agreement Scheme Revisited
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 396 - +
  • [25] Cryptanalysis and Improvement of an Anonymous Multi-server Authenticated Key Agreement Scheme
    Shipra Kumari
    Hari Om
    Wireless Personal Communications, 2017, 96 : 2513 - 2537
  • [26] Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity
    Kang, Dongwoo
    Jung, Jaewook
    Kim, Hyoungshick
    Lee, Youngsook
    Won, Dongho
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [27] A Secure DoS-resistant User Authenticated Key Agreement Scheme with Perfect Secrecies
    Lin, Jeng-Ping
    Fu, Jih-Ming
    LIFE SCIENCE JOURNAL-ACTA ZHENGZHOU UNIVERSITY OVERSEAS EDITION, 2010, 7 (01): : 88 - 94
  • [28] An efficient and secure multi-server authentication scheme with key agreement
    Tsaur, Woei-Jiunn
    Li, Jia-Hong
    Lee, Wei-Bin
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (04) : 876 - 882
  • [29] An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (04) : 2571 - 2598
  • [30] An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems
    Vanga Odelu
    Ashok Kumar Das
    Adrijit Goswami
    Wireless Personal Communications, 2015, 84 : 2571 - 2598