Secure Delegation-Based Authentication for Telecare Medicine Information Systems

被引:8
|
作者
Tan, Zuowen [1 ,2 ,3 ]
机构
[1] Jiangxi Univ Finance & Econ, Sch Informat Technol, Nanchang 330032, Jiangxi, Peoples R China
[2] Nanchang Inst Sci & Technol, Nanchang 330108, Jiangxi, Peoples R China
[3] Guangzhou Univ, Sch Math & Informat Sci, Key Lab Informat Secur, Guangzhou 510006, Guangdong, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Authentication; BAN; cryptography; delegation; ROAMING SERVICE; PROTOCOL; SCHEME; CLOUD; PRIVACY;
D O I
10.1109/ACCESS.2018.2832077
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The telecare medicine information systems (TMISs) enable patients to gain health monitoring at home and obtain medical services over mobile networks. In recent years, many authentication schemes have been proposed to address the security and privacy issues in the TMISs. For example, Kim et al. and Huang et al. proposed efficient delegation-based authentication protocols by using elliptic curve cryptography. These protocols have a prerequisite that both the home location register and the visited location register must share secrets beforehand. In this paper, we show that Kim et al.'s and Hwang et al.'s schemes are vulnerable to known key attacks. Moreover, they fail to provide communication confidentiality. We then present a new secure delegation-based authentication protocol by using the identity-based cryptography. The proposed protocol removes the weaknesses of the above-mentioned protocols. Through the analysis of the Burrows Abadi Needham logic, along with a random oracle model, we demonstrate that the proposed scheme provides secure authentication. In addition, the proposed scheme can provide more security functionaries than the existing delegation-based authentication protocols. Better tradeoff among security and functionality features and communication and computation costs makes our scheme suitable and applicable in the TMISs.
引用
收藏
页码:26091 / 26110
页数:20
相关论文
共 50 条
  • [31] An Efficient Authentication Scheme for Telecare Medicine Information Systems
    Zhian Zhu
    Journal of Medical Systems, 2012, 36 : 3833 - 3838
  • [32] A Secure Authentication and Key Agreement Protocol for Telecare Medicine Information System
    Li, Xuanang
    Zheng, Zhiming
    Zhang, Xiao
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 275 - 281
  • [33] An Improved Delegation-Based Authentication Protocol for PCSs
    Lee, Cheng-Chi
    Chang, Rui-Xiang
    Chen, Te-Yu
    Chen, Lung Albert
    INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (03): : 258 - 267
  • [34] A new delegation-based authentication protocol for use in portable communication systems
    Lee, WB
    Yeh, CK
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2005, 4 (01) : 57 - 64
  • [35] A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Xinhong Hao
    Jiantao Wang
    Qinghai Yang
    Xiaopeng Yan
    Ping Li
    Journal of Medical Systems, 2013, 37
  • [36] A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Hao, Xinhong
    Wang, Jiantao
    Yang, Qinghai
    Yan, Xiaopeng
    Li, Ping
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
  • [37] A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce
    Amit K. Awasthi
    Keerti Srivastava
    Journal of Medical Systems, 2013, 37
  • [38] A New Secure Authentication Protocol for Telecare Medicine Information System and Smart Campus
    Safkhani, Masoumeh
    Vasilakos, Athanasios
    IEEE ACCESS, 2019, 7 : 23514 - 23526
  • [39] Security Weaknesses on a Delegation-Based Authentication Protocol for PCSs
    Gope, Prosanta
    Hwang, Tzonelih
    INFORMATION TECHNOLOGY AND CONTROL, 2015, 44 (03): : 329 - 333
  • [40] A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce
    Awasthi, Amit K.
    Srivastava, Keerti
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (05)