A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS

被引:43
|
作者
Kumar, Vinod [1 ]
Ahmad, Musheer [1 ]
Kumari, Adesh [2 ]
机构
[1] Jamia Millia Islamia, Dept Appl Sci & Humanities, New Delhi 110025, India
[2] Jamia Millia Islamia, Dept Math, New Delhi 110025, India
关键词
Cloud computing; Elliptic curve cryptography; TMIS; Medical data; Mutual authentication; KEY AGREEMENT SCHEME; CRYPTANALYSIS; IMPROVEMENT; ANONYMITY;
D O I
10.1016/j.tele.2018.09.001
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
With the fast progress of network communication, its technologies and the developing popularity of telecare medical information system (TMIS), doctors provide treatment to patients via Internet without visiting hospitals. By using mobile device, wireless body area network and cloud based architecture, the patients can gather their physiological information and upload to cloud via their mobile devices. The authenticated doctor provides online treatment to patient at anytime and anywhere. Moreover, TMIS maintains security and privacy of the patients in information communication and authenticated to all the participants before assessing this system. Recently Li et al. (2018) presented a cloud-assisted authentication and privacy preservation scheme for TMIS. They believed that their scheme secure against all well-known privacy and security attributes. In the proposed work, we reviewed Li et al. authentication protocol and found that it has various security flaws like as message authentication fails in healthcare center upload phase, session key is not possible in healthcare center upload phase, impersonation attack in patient data upload phase, patient anonymity and patient unlinkability. Further, we introduced enhance protocol in similar environment. The proposed protocol secure against man-in-the-middle attack, patient anonymity, replay attack, known-key security property, data confidentiality, data non-repudiation, message authentication, impersonation attack, session key security and patient unlinkability. We compared the proposed protocol with existing related protocols in same cloud based TMIS. The proposed protocol ensures of all desirable security prerequisites and managed the efficiency in terms of computation and communication costs for cloud-assisted TMIS.
引用
收藏
页码:100 / 117
页数:18
相关论文
共 50 条
  • [11] A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
    Kumari, Saru
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Wu, Fan
    Kumar, Neeraj
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (12): : 6428 - 6453
  • [12] Authentication protocol based on elliptic curve cryptography
    Constantinescu, Nicolae
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (02): : 83 - 91
  • [13] A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
    Saru Kumari
    Marimuthu Karuppiah
    Ashok Kumar Das
    Xiong Li
    Fan Wu
    Neeraj Kumar
    The Journal of Supercomputing, 2018, 74 : 6428 - 6453
  • [14] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    Arshad, R.
    Ikram, N.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (02) : 165 - 178
  • [15] A secure authentication scheme for session initiation protocol based on elliptic curve cryptography
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Naqvi, Husnain
    Sher, Muhammad
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1961 - 1966
  • [16] A Mutual Authentication Protocol for IoT Devices using Elliptic Curve Cryptography
    Tewari, Aakanksha
    Gupta, B. B.
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 716 - 720
  • [17] An Advanced Elliptic Curve Cryptography based Mutual Authentication Scheme for Session Initiation Protocol
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (04): : 393 - 400
  • [18] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Dinarvand, Negin
    Barati, Hamid
    WIRELESS NETWORKS, 2019, 25 (01) : 415 - 428
  • [19] An Improved Secure RFID Authentication Protocol Using Elliptic Curve Cryptography
    Liu, Wan-Rong
    Ji, Zhi-Yong
    Chu, Cheng-Chen
    International Journal of Network Security, 2024, 26 (01) : 106 - 115
  • [20] A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
    Reddy, Alavalapati Goutham
    Das, Ashok Kumar
    Yoon, Eun-Jun
    Yoo, Kee-Young
    IEEE ACCESS, 2016, 4 : 4394 - 4407