An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System

被引:74
|
作者
Li, Chun-Ta [1 ]
Wu, Tsu-Yang [2 ,3 ]
Chen, Chin-Ling [4 ,5 ]
Lee, Cheng-Chi [6 ,7 ]
Chen, Chien-Ming [8 ]
机构
[1] Tainan Univ Technol, Dept Informat Management, 529 Zhongzheng Rd, Tainan 71002, Taiwan
[2] Fujian Univ Technol, Fujian Prov Key Lab Big Data Min & Applicat, Fuzhou 350118, Fujian, Peoples R China
[3] Fujian Univ Technol, Natl Demonstrat Ctr Expt Elect Informat & Elect T, 3 Xueyuan Rd, Fuzhou 350118, Fujian, Peoples R China
[4] Chaoyang Univ Technol, Dept Comp Sci & Informat Engn, 168 Jifeng East Rd, Taichung 41349, Taiwan
[5] Changchun Univ Technol, Sch Informat Engn, Changchun 130600, Jilin, Peoples R China
[6] Fu Jen Catholic Univ, Dept Lib & Informat Sci, 510 Jhongjheng Rd, New Taipei 24205, Taiwan
[7] Asia Univ, Dept Photon & Commun Engn, 500 Lioufeng Rd, Taichung 41354, Taiwan
[8] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
来源
SENSORS | 2017年 / 17卷 / 07期
关键词
elliptic curve cryptography (ECC); Internet of Things (IoTs); medical care system; smart cards; user authentication; wireless sensor networks (WSNs); WIRELESS SENSOR NETWORKS; KEY AGREEMENT; MUTUAL AUTHENTICATION; PROTOCOL;
D O I
10.3390/s17071482
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu-Chung's scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Security Analysis of a User Authentication Scheme for IoT-Based Healthcare
    Wang, Shengbao
    Zhou, Xin
    Wen, Kang
    Weng, Bosen
    Zeng, Peng
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (07) : 6527 - 6530
  • [2] Security-Enhanced Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare
    Zhou, Xin
    Wang, Shengbao
    Wen, Kang
    Hu, Bin
    Tan, Xiao
    Xie, Qi
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) : 9599 - 9609
  • [3] Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare
    Masud, Mehedi
    Gaba, Gurjot Singh
    Choudhary, Karanjeet
    Hossain, M. Shamim
    Alhamid, Mohammed F.
    Muhammad, Ghulam
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) : 2649 - 2656
  • [4] A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare
    Chen, Chien-Ming
    Liu, Shuangshuang
    Chaudhry, Shehzad Ashraf
    Chen, Yeh-Cheng
    Khan, Muhammad Asghar
    [J]. CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2022, 131 (01): : 307 - 329
  • [5] Security enhancements of a remote user authentication scheme preserving user anonymity
    An, Younghwa
    Yang, Hyungkyu
    [J]. International Journal of Multimedia and Ubiquitous Engineering, 2013, 8 (01): : 129 - 138
  • [6] Provably Secure Mutual Authentication and Key Agreement Scheme with User Anonymity
    Hwang, Tzonelih
    Gope, Prosanta
    [J]. 2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,
  • [7] An Energy Efficient Remote User Authentication Scheme Preserving User Anonymity
    Bapana, Surekha
    Narayana, K. Lakshmi
    Vorugunti, Chandra Sekhar
    [J]. 2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 1296 - 1301
  • [8] An efficient user authentication model for IOT-based healthcare environment
    Elngar, Ahmed A.
    [J]. International Journal of Information and Computer Security, 2019, 11 (4-5): : 431 - 446
  • [9] Remote user authentication scheme with user anonymity
    Lee, WB
    Chen, HB
    Dow, CR
    [J]. SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 412 - 417
  • [10] Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Xiong, Hu
    Wang, Xiaofeng
    Li, Fagen
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 256 - 258