Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services

被引:0
|
作者
Saru Kumari
Km. Renuka
机构
[1] Ch. Charan Singh University,Department of Mathematics
来源
关键词
Biometrics; Offline password guessing attack; Authentication; Telecare medical information system; Anonymity; Burrows–Abadi–Needham logic;
D O I
暂无
中图分类号
学科分类号
摘要
The telecare medical information system (TMIS) offers remote healthcare services to the patients at their doorstep. Including this serenity, it is compulsory to preserve privacy and to give guaranty to the patients for secured TMIS communication. Authentication protocols are usually exploited to ensure privacy and protect communication between patients and remote assistance. Currently, we observe the inaccuracy of an authentication protocol for TMIS. The scheme is recently proposed by Qiu et al. to realize healthcare services. We find that their protocol is vulnerable to offline password guessing, replay, and anonymity violation attacks. To avoid these weaknesses, we have developed an improved biometric-based protocol. Our proposed protocol is capable to prevent the said attacks. We validate the security of our proposed protocol using Burrows–Abadi–Needham logic. We compare the performance of the proposed protocol with the preceding protocols and conclude that the proposed protocol is more secure and efficient as compared to its former counterparts.
引用
收藏
页码:27 / 45
页数:18
相关论文
共 50 条
  • [41] Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing
    Shen, Jian
    Yang, Huijie
    Wang, Anxi
    Zhou, Tianqi
    Wang, Chen
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (04) : 924 - 933
  • [42] An Effective and Secure User Authentication and Key Agreement Scheme in m-Healthcare Systems
    Lee, Young Sil
    Ndibanje, Bruce
    Alasaarela, Esko
    Kim, TaeYong
    Lee, HoonJae
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1685 - 1690
  • [43] Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing
    Jian Shen
    Huijie Yang
    Anxi Wang
    Tianqi Zhou
    Chen Wang
    Peer-to-Peer Networking and Applications, 2019, 12 : 924 - 933
  • [44] Addressing a Secure Session-Key Scheme for Mobility Supported e-Healthcare Systems
    Kumar, Pardeep
    Porambage, Pawani
    Ylianttila, Mika
    Gurtov, Andrei
    Lee, Hoon-Jae
    Sain, Mangal
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 538 - 540
  • [45] An authentication and key agreement scheme for smart grid
    Safkhani, Masoumeh
    Kumari, Saru
    Shojafar, Mohammad
    Kumar, Sachin
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (03) : 1595 - 1616
  • [46] An authentication and key agreement scheme for smart grid
    Masoumeh Safkhani
    Saru Kumari
    Mohammad Shojafar
    Sachin Kumar
    Peer-to-Peer Networking and Applications, 2022, 15 : 1595 - 1616
  • [47] Security Enhancements of Smart Card-Based Remote User Password Authentication Scheme with Session Key Agreement
    An, Young-Hwa
    2015 17TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2015, : 669 - 674
  • [48] A Token Free Password Authentication Scheme with Multiple Key Agreements
    Chang, Chin-Chen
    Tsai, Hao-Chuan
    Lin, Shi-Yi
    2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 1086 - +
  • [49] Conditional privacy-preserving authentication and key agreement scheme for roaming services in VANETs
    Zhou, Yousheng
    Long, Xingwang
    Chen, Lvjun
    Yang, Zheng
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 (295-301) : 295 - 301
  • [50] Secure Pattern-Key Based Password Authentication Scheme
    Zaki, M. Hamza
    Husain, Adil
    Umar, M. Sarosh
    Khan, Muneeb H.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON MULTIMEDIA, SIGNAL PROCESSING AND COMMUNICATION TECHNOLOGIES (IMPACT), 2017, : 171 - 174