A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS

被引:0
|
作者
Ashok Kumar Das
Vanga Odelu
Adrijit Goswami
机构
[1] International Institute of Information Technology,Center for Security, Theory and Algorithmic Research
[2] Indian Institute of Technology,Department of Mathematics
来源
Journal of Medical Systems | 2015年 / 39卷
关键词
Telecare medicine information systems; Authentication; Key agreement; Multi-medical servers; Fuzzy extractor; Biometrics; User anonymity; AVISPA;
D O I
暂无
中图分类号
学科分类号
摘要
The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas’s scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to other related schemes. As a result, our scheme is very appropriate for practical applications in TMIS.
引用
收藏
相关论文
共 50 条
  • [31] An improved and secure chaotic map based authenticated key agreement in multi-server architecture
    Azeem Irshad
    Muhammad Sher
    Shehzad Ashraf Chaudhry
    Qi Xie
    Saru Kumari
    Fan Wu
    Multimedia Tools and Applications, 2018, 77 : 1167 - 1204
  • [32] An improved and secure chaotic map based authenticated key agreement in multi-server architecture
    Irshad, Azeem
    Sher, Muhammad
    Chaudhry, Shehzad Ashraf
    Xie, Qi
    Kumari, Saru
    Wu, Fan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (01) : 1167 - 1204
  • [33] An Adaptive Secure Handover Authenticated Key Agreement for Multi-Server Architecture Communication Applications
    Wang, Wenming
    Huang, Haiping
    Xiao, Fu
    Li, Qi
    Xue, Lingyan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (09) : 9830 - 9839
  • [34] A Simple and Robust Authenticated Multiple Key Agreement Scheme
    Chang, Chin-Chen
    Tsai, Hao-Chuan
    Chiu, Yen-Chang
    SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 214 - +
  • [35] Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT
    Vinoth, R.
    Deborah, Lazarus Jegatha
    Vijayakumar, Pandi
    Kumar, Neeraj
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (05) : 3801 - 3811
  • [36] Provably Secure Authenticated Key Agreement Scheme for Smart Grid
    Odelu, Vanga
    Das, Ashok Kumar
    Wazid, Mohammad
    Conti, Mauro
    IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (03) : 1900 - 1910
  • [37] An Authenticated Key Agreement Scheme for Secure Communication in Smart Grid
    Baruah, Barnana
    Dhal, Subhasish
    2021 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2021, : 447 - 455
  • [38] Robust Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment
    Toan-Thinh Truong
    Minh-Triet Tran
    Anh-Duc Duong
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2013, PT V, 2013, 7975 : 502 - 515
  • [39] Robust secure dynamic ID based remote user authentication scheme for multi-server environment
    Truong, Toan-Thinh
    Tran, Minh-Triet
    Duong, Anh-Duc
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 7971 : 502 - 515
  • [40] Cryptanalysis of a multi-server password authenticated key agreement scheme using smart cards
    Ku, WC
    Chuang, HM
    Chiang, MH
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (11) : 3235 - 3238