A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS

被引:43
|
作者
Kumar, Vinod [1 ]
Ahmad, Musheer [1 ]
Kumari, Adesh [2 ]
机构
[1] Jamia Millia Islamia, Dept Appl Sci & Humanities, New Delhi 110025, India
[2] Jamia Millia Islamia, Dept Math, New Delhi 110025, India
关键词
Cloud computing; Elliptic curve cryptography; TMIS; Medical data; Mutual authentication; KEY AGREEMENT SCHEME; CRYPTANALYSIS; IMPROVEMENT; ANONYMITY;
D O I
10.1016/j.tele.2018.09.001
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
With the fast progress of network communication, its technologies and the developing popularity of telecare medical information system (TMIS), doctors provide treatment to patients via Internet without visiting hospitals. By using mobile device, wireless body area network and cloud based architecture, the patients can gather their physiological information and upload to cloud via their mobile devices. The authenticated doctor provides online treatment to patient at anytime and anywhere. Moreover, TMIS maintains security and privacy of the patients in information communication and authenticated to all the participants before assessing this system. Recently Li et al. (2018) presented a cloud-assisted authentication and privacy preservation scheme for TMIS. They believed that their scheme secure against all well-known privacy and security attributes. In the proposed work, we reviewed Li et al. authentication protocol and found that it has various security flaws like as message authentication fails in healthcare center upload phase, session key is not possible in healthcare center upload phase, impersonation attack in patient data upload phase, patient anonymity and patient unlinkability. Further, we introduced enhance protocol in similar environment. The proposed protocol secure against man-in-the-middle attack, patient anonymity, replay attack, known-key security property, data confidentiality, data non-repudiation, message authentication, impersonation attack, session key security and patient unlinkability. We compared the proposed protocol with existing related protocols in same cloud based TMIS. The proposed protocol ensures of all desirable security prerequisites and managed the efficiency in terms of computation and communication costs for cloud-assisted TMIS.
引用
下载
收藏
页码:100 / 117
页数:18
相关论文
共 50 条
  • [1] Secure Mutual Authentication Protocol for RFID Based on Elliptic Curve Cryptography
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jong Sung
    2016 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2016,
  • [2] A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography
    Yulei Chen
    Jianhua Chen
    Multimedia Tools and Applications, 2023, 82 : 16009 - 16032
  • [3] A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography
    Chen, Yulei
    Chen, Jianhua
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (11) : 16009 - 16032
  • [4] A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier
    Patel, Khushboo A.
    Shukla, Shivangi
    Patel, Sankita J.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (02):
  • [5] A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    He, Debiao
    Chen, Jianhua
    Chen, Yitao
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1423 - 1429
  • [6] A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography
    Jin, Chunhua
    Xu, Chunxiang
    Zhang, Xiaojun
    Zhao, Jining
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (03)
  • [7] A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography
    Chunhua Jin
    Chunxiang Xu
    Xiaojun Zhang
    Jining Zhao
    Journal of Medical Systems, 2015, 39
  • [8] A secure and robust elliptic curve cryptography-based mutual authentication scheme for session initiation protocol
    Nikooghadam, Mahdi
    Amintoosi, Haleh
    SECURITY AND PRIVACY, 2020, 3 (01):
  • [9] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    R. Arshad
    N. Ikram
    Multimedia Tools and Applications, 2013, 66 : 165 - 178
  • [10] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 521 - 530