| Literature DB >> 27218005 |
Wenhao Liu1, Qi Xie1, Shengbao Wang1, Bin Hu1.
Abstract
In telecare medicine information systems (TMIS), identity authentication of <span class="Species">patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.Entities:
Keywords: Authentication; Biometrics; Protocol; Smart card
Year: 2016 PMID: 27218005 PMCID: PMC4854862 DOI: 10.1186/s40064-016-2018-7
Source DB: PubMed Journal: Springerplus ISSN: 2193-1801
The notations
| Notations | Description |
|---|---|
|
| Patient in TMIS |
|
| Telecare server in TMIS |
|
| Patient |
|
| Patient |
|
| Telecare server’s secret key |
|
| Telecare server’s public key, where |
|
| Symmetric encryption/decryption algorithm with key |
|
| Secure one-way collision-resistant hash function |
| || | String concatenation operation |
| ⊕ | Exclusive OR operation |
Fig. 1The performance result
Security comparison between our scheme and other schemes
| Security attributes/schemes | Li and Hwang ( | Li et al. ( | Truong et al. ( | Awasthi and Srivastava ( | Dheerendra et al. ( | He and Wang ( | Vanga et al. ( | Ours |
|---|---|---|---|---|---|---|---|---|
| Provide user anonymity | N | N | Y | Y | N | N | Y | Y |
| Insider attack | N | Y | Y | Y | N | Y | Y | Y |
| Stolen smart card attack | Y | Y | Y | Y | N | Y | Y | Y |
| Replay attack | Y | Y | Y | Y | Y | N | Y | Y |
| Off-line password guessing attack | Y | Y | Y | N | Y | Y | Y | Y |
| Mutual authentication | N | Y | Y | N | Y | Y | Y | Y |
| Known session-specific temporary information attack | N | N | N | N | N | N | Y | Y |
| Perfect forward secrecy | N | N | N | N | N | Y | Y | Y |
| Impersonation attack | N | N | N | N | N | N | Y | Y |
| Provide lost smartcard revocation | N | N | N | N | N | N | Y | Y |
| Server spoofing attack | N | N | N | N | N | Y | Y | Y |
| Efficient login phase | N | N | N | Y | Y | Y | Y | Y |
| Efficient password change phase | N | N | N | N | Y | Y | Y | Y |
| Biometric update phase | N | N | N | N | N | Y | Y | Y |
The running time of different operations
| Operations | Point multiplication | Point addition | Hash function | Symmetric encryption/decryption |
|---|---|---|---|---|
| Time (ms) | 2.226 | 0.0288 | 0.0023 | 0.0046 |
Computation cost comparison in login and authentication phase
| Islam and Khan ( | Zhang and Zhou ( | Chaudhry et al. ( | Vanga et al. ( | Ours | |
|---|---|---|---|---|---|
| Computational cost | 6 | 6 | 7 | 5 | 6 |
| Estimated time (ms) | 13.4078 | 13.3905 | 15.6004 | 13.4767 | 13.3997 |