Secure Delegation-Based Authentication for Telecare Medicine Information Systems

被引:8
|
作者
Tan, Zuowen [1 ,2 ,3 ]
机构
[1] Jiangxi Univ Finance & Econ, Sch Informat Technol, Nanchang 330032, Jiangxi, Peoples R China
[2] Nanchang Inst Sci & Technol, Nanchang 330108, Jiangxi, Peoples R China
[3] Guangzhou Univ, Sch Math & Informat Sci, Key Lab Informat Secur, Guangzhou 510006, Guangdong, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Authentication; BAN; cryptography; delegation; ROAMING SERVICE; PROTOCOL; SCHEME; CLOUD; PRIVACY;
D O I
10.1109/ACCESS.2018.2832077
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The telecare medicine information systems (TMISs) enable patients to gain health monitoring at home and obtain medical services over mobile networks. In recent years, many authentication schemes have been proposed to address the security and privacy issues in the TMISs. For example, Kim et al. and Huang et al. proposed efficient delegation-based authentication protocols by using elliptic curve cryptography. These protocols have a prerequisite that both the home location register and the visited location register must share secrets beforehand. In this paper, we show that Kim et al.'s and Hwang et al.'s schemes are vulnerable to known key attacks. Moreover, they fail to provide communication confidentiality. We then present a new secure delegation-based authentication protocol by using the identity-based cryptography. The proposed protocol removes the weaknesses of the above-mentioned protocols. Through the analysis of the Burrows Abadi Needham logic, along with a random oracle model, we demonstrate that the proposed scheme provides secure authentication. In addition, the proposed scheme can provide more security functionaries than the existing delegation-based authentication protocols. Better tradeoff among security and functionality features and communication and computation costs makes our scheme suitable and applicable in the TMISs.
引用
收藏
页码:26091 / 26110
页数:20
相关论文
共 50 条
  • [1] A Secure Authentication Scheme for Telecare Medicine Information Systems
    Wu, Zhen-Yu
    Lee, Yueh-Chun
    Lai, Feipei
    Lee, Hung-Chang
    Chung, Yufang
    JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (03) : 1529 - 1535
  • [2] A Secure Authentication Scheme for Telecare Medicine Information Systems
    Zhen-Yu Wu
    Yueh-Chun Lee
    Feipei Lai
    Hung-Chang Lee
    Yufang Chung
    Journal of Medical Systems, 2012, 36 : 1529 - 1535
  • [3] A More Secure Authentication Scheme for Telecare Medicine Information Systems
    He Debiao
    Chen Jianhua
    Zhang Rui
    JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (03) : 1989 - 1995
  • [4] A More Secure Authentication Scheme for Telecare Medicine Information Systems
    He Debiao
    Chen Jianhua
    Zhang Rui
    Journal of Medical Systems, 2012, 36 : 1989 - 1995
  • [5] A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information Systems
    Yan, Xiaopeng
    Li, Weiheng
    Li, Ping
    Wang, Jiantao
    Hao, Xinhong
    Gong, Peng
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (05)
  • [6] A Secure Sketch-based Authentication Scheme for Telecare Medicine Information Systems
    Zhang, Min
    Zhang, Jia-Shu
    Tan, Wen-Rong
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (02) : 389 - 402
  • [7] A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information Systems
    Xiaopeng Yan
    Weiheng Li
    Ping Li
    Jiantao Wang
    Xinhong Hao
    Peng Gong
    Journal of Medical Systems, 2013, 37
  • [8] Secure Delegation-Based Authentication Protocol for Wireless Roaming Service
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    IEEE COMMUNICATIONS LETTERS, 2012, 16 (07) : 1100 - 1102
  • [9] An enhanced secure delegation-based anonymous authentication protocol for PCSs
    Gope, Prosanta
    Ghayvat, Hemant
    Cheng, Yongqiang
    Kabir, Sohag
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2023, 36 (12)
  • [10] Cryptanalysis and enhancements of delegation-based authentication protocol for secure roaming service
    Wang, Yichen
    Pu, Qiong
    Wu, Shuhua
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 252 - 260