Nothing Special   »   [go: up one dir, main page]

Skip to main content

Advertisement

Log in

A secure three factor based authentication scheme for health care systems using IoT enabled devices

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

In recent years, the Internet of Things (IoT) has gained increasing popularity due to the usage of Internet-enabled devices. However, Internet-enabled devices, also known as smart devices, share the information using an insecure channel, i.e., the Internet. Hence, the security and privacy of shared information remain the biggest concern. To ensure both security and privacy, many smart card based and biometric based schemes have been proposed for different Internet-based applications. Telecare Medical Information System (TMIS) is such an application which makes medical treatment easier by interacting with the patient and doctors. However, the transmission of the patient’s private information over an insecure channel is prone to several attacks. In order to protect the medical privacy of the patient and the reliability of the system, both the patient and medical server should be mutually authenticated. In this paper, we propose a three factor-based authentication scheme for health care system using IoT enabled devices (TFASH) that are secure and more efficient than other relevant schemes. We use Elliptic Curve Cryptography (ECC) for the scheme due to its smaller key size and high level of security. The session key security and the mutual authentication of the TFASH scheme have been proved using Real-Or-Random (ROR) model and Burrows–Abadi–Needham (BAN) logic. The simulation result of the proposed scheme shows that the scheme is safe under the OFMC and CLAtSe models. Moreover, compared to the existing schemes, the TFASH scheme provides better communicational and computational cost, which makes it suitable for practical use.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Alemdar H, Ersoy Cem (2010) Wireless sensor networks for healthcare: a survey. Comput Netw 54(15):2688–2710

    Google Scholar 

  • Amin R, Biswas GP (2015) A secure three-factor user authentication and key agreement protocol for tmis with user anonymity. J Med Syst 39(8):78

    Google Scholar 

  • Amin R, Biswas GP (2015) An improved rsa based user authentication and session key agreement protocol usable in tmis. J Med Syst 39(8):79

    Google Scholar 

  • Amin R, Islam SKH, Biswas GP, Khan MK, Kumar N (2015) An efficient and practical smart card based anonymity preserving user authentication scheme for tmis using elliptic curve cryptography. J Med Syst 39(11):180

    Google Scholar 

  • Amin R, Kumar N, Biswas GP, Iqbal R, Chang V (2018) A light weight authentication protocol for iot-enabled devices in distributed cloud computing environment. Future Generation Comput Syst 78:1005–1019

    Google Scholar 

  • Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cuéllar J, Hankes Drielsma P, Héam P-C, Kouchnarenko O, Mantovani J, et al. (2005) The avispa tool for the automated validation of internet security protocols and applications. In: International conference on computer aided verification, pp 281–285. Springer

  • Arakala A, Jeffers J, and Horadam KJ (2007) Fuzzy extractors for minutiae-based fingerprint authentication. In: Lee S-W, Li SZ (eds) Advances in biometrics, pp 760–769, Berlin, Heidelberg, 2007. Springer Berlin Heidelberg

  • Arshad H, Nikooghadam M (2014) Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. J Med Syst 38(12):136

    Google Scholar 

  • AVISPA Automated Validation of Internet Security Protocols and Applications. http://www.avispa-project.org/, 2015

  • Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks. In: International conference on the theory and applications of cryptographic techniques, pp 139–155. Springer

  • Belguith S, Kaaniche N, Laurent M, Jemai A, Attia R (2020) Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. J Parallel Distributed Comput 135:1–20

    Google Scholar 

  • Belguith S, Kaaniche N, Laurent M, Jemai A, Attia R (2018) Phoabe: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted iot. Comput Netw 133:141–156

    Google Scholar 

  • Chaudhry SA, Naqvi H, Shon T, Sher M, Farash Mohammad Sabzinejad (2015) Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems. J Med Syst 39(6):66

    Google Scholar 

  • Chaudhry SA, Khan MT, Khan MK, Shon T (2016) A multiserver biometric authentication scheme for tmis using elliptic curve cryptography. J Med Syst 40(11):230

    Google Scholar 

  • Debiao He, Jianhua Chen, Rui Zhang (2012) A more secure authentication scheme for telecare medicine information systems. J Med Syst 36(3):1989–1995

    Google Scholar 

  • Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In International conference on the theory and applications of cryptographic techniques, pages 523–540. Springer

  • Dolev Danny, Yao Andrew (1983) On the security of public key protocols. IEEE Trans Inform Theory 29(2):198–208

    MathSciNet  MATH  Google Scholar 

  • Fan C-I, Lin Y-H (2009) Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. IEEE Trans Inform Forensics Secur 4(4):933

    Google Scholar 

  • Fan W, Lili X, Kumari S, Li X (2017) A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security. J Ambient Intell Human Comput 8(1):101–116

    Google Scholar 

  • Giri D, Maitra T, Amin R, Srivastava PD (2015) An efficient and robust rsa-based remote user authentication for telecare medical information systems. J Med Syst 39(1):145

    Google Scholar 

  • He D, Wang D (2014) Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 9(3):816–823

    Google Scholar 

  • He D, Kumar N, Chen J, Lee C-C, Chilamkurti Naveen, Yeo Seng-Soo (2015) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Syst 21(1):49–60

    Google Scholar 

  • Irshad A, Sher M, Nawaz O, Chaudhry SA, Khan I, Kumari S (2017) A secure and provable multi-server authenticated key agreement for tmis based on amin et al. scheme. Multimedia Tools Appl 76(15):16463–16489

    Google Scholar 

  • Islam SkH, Khan MK (2014) Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems. J Med Syst 38(10):135

    Google Scholar 

  • Jia X, He D, Kumar N, Raymond Choo K-K (2018) Authenticated key agreement scheme for fog-driven iot healthcare system. Wirel Netw. pp 1–14

  • Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in cryptology–CRYPTO’99, pp 789–789. Springer, 1999

  • Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770–772

    MathSciNet  Google Scholar 

  • Lee Tian-Fu (2013) An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems. J Med Syst 37(6):9985

    Google Scholar 

  • Lee JK, Ryu SR, Yoo KY (2002) Fingerprint-based remote user authentication scheme using smart cards. Electronics Letters 38(12):554–555

    Google Scholar 

  • Lee T-F, Chang I-P, Lin T-H, Wang C-C (2013) A secure and efficient password-based user authentication scheme using smart cards for the integrated epr information system. J Med Syst 37(3):9941

    Google Scholar 

  • Li Q, Guo M, Chang E-C (2008) Fuzzy extractors for asymmetric biometric representations. In: 2008 IEEE computer society conference on computer vision and pattern recognition workshops, pp 1–6

  • Li C-T, Hwang M-S (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33(1):1–5

    Google Scholar 

  • Li J, Sha F, Zhang Y, Huang X, Shen J (2017) Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length. Security Commun Netw , 2017

  • Maitra T, Islam SKH, Amin R, Giri D, Khan Muhammad Khurram, Kumar Neeraj (2016) An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design. Security Commun Netw 9(17):4615–4638

    Google Scholar 

  • Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552

    MathSciNet  MATH  Google Scholar 

  • Mir O, Nikooghadam M (2015) A secure biometrics based authentication with key agreement scheme in telemedicine networks for e-health services. Wirel Personal Commun 83(4):2439–2461

    Google Scholar 

  • Mishra D, Mukhopadhyay S, Chaturvedi A, Kumari S, Khan Muhammad Khurram (2014) Cryptanalysis and improvement of yan et al.’s biometric-based authentication scheme for telecare medicine information systems. J Med Syst 38(6):24

    Google Scholar 

  • Michael Burrows, Martin Abadi, and Roger M Needham. A logic of authentication. In: Proceedings of the royal society of London A: Mathematical, Physical and Engineering Sciences, volume 426, pages 233–271. The Royal Society, 1989

  • Pawar P, Jones V, Van Beijnum B-JF, Hermens H (2012) A framework for the comparison of mobile patient monitoring systems. Journal of Biomedical Informatics 45(3):544–556

    Google Scholar 

  • Raghupathi W, Raghupathi V (2014) Big data analytics in healthcare: promise and potential. Health Inform Sci Syst 2(1):3

    Google Scholar 

  • Srinivas J, Mishra D, Mukhopadhyay S, Kumari S (2018) Provably secure biometric based authentication and key agreement protocol for wireless sensor networks. J Ambient Intell Human Comput 9(4):875–895

    Google Scholar 

  • Soni P, Pal AK, Islam SKH (2019) An improved three-factor authentication scheme for patient monitoring using wsn in remote health-care system. Comput Methods Programs Biomed 182:105054

    Google Scholar 

  • Tan Zuowen et al (2013) An efficient biometrics-based authentication scheme for telecare medicine information systems. Network 2(3):200–204

    Google Scholar 

  • Tan Z (2014) A user anonymity preserving three-factor authentication scheme for telecare medicine information systems. J Med Syst 38(3):16

    Google Scholar 

  • Wei J, Xuexian H, Liu W (2012) An improved authentication scheme for telecare medicine information systems. J Med Syst 36(6):3597–3604

    Google Scholar 

  • Wu F, Li X, Sangaiah AK, Xu L, Kumari S, Wu L, Shen J (2018) A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Generation Comput Syst 82:727–737

    Google Scholar 

  • Xiao D, Liao X, Deng S (2007) A novel key agreement protocol based on chaotic maps. Inform Sci 177(4):1136–1142

    MathSciNet  Google Scholar 

  • Xin X, Zhu P, Wen Q, Jin Z, Zhang Hua, He Lian (2013) A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems. J Med Syst 38(1):9994

    Google Scholar 

  • Xue K, Hong P, Ma C (2014) A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J Comput Syst Sci 80(1):195–206

    MathSciNet  MATH  Google Scholar 

  • Yan X, Li W, Li P, Wang J, Hao Xinhong, Gong Peng (2013) A secure biometrics-based authentication scheme for telecare medicine information systems. J Med Syst 37(5):9972

    Google Scholar 

  • Zhu Zhian (2012) An efficient authentication scheme for telecare medicine information systems. J Med Syst 36(6):3833–3838

    Google Scholar 

  • Zhen-Yu W, Lee Y-C, Lai F, Lee H-C, Chung Yufang (2012) A secure authentication scheme for telecare medicine information systems. J Med Syst 36(3):1529–1535

    Google Scholar 

  • Zhang L, Zhu Shaohui (2015) Robust ecc-based authenticated key agreement scheme with privacy protection for telecare medicine information systems. J Med Syst 39(5):49

    Google Scholar 

  • Zhou L, Li X, Yeh K-H, Chunhua S, Chiu W (2019) Lightweight iot-based authentication scheme in cloud computing circumstance. Future Generation Comput Syst 91:244–251

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shreeya Swagatika Sahoo.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sahoo, S.S., Mohanty, S. & Majhi, B. A secure three factor based authentication scheme for health care systems using IoT enabled devices. J Ambient Intell Human Comput 12, 1419–1434 (2021). https://doi.org/10.1007/s12652-020-02213-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02213-6

Keywords

Navigation