| Literature DB >> 33924024 |
Tzu-Wei Lin1, Chien-Lung Hsu1,2,3,4,5, Tuan-Vinh Le1, Chung-Fu Lu6, Bo-Yu Huang2.
Abstract
Healthcare is now an important part of daily life because of rising consciousness of health management. Medical professionals can know users' health condition if they are able to access information immediately. Telemedicine systems, which provides long distance medical communication and services, is a multi-functional remote medical service that can help patients in bed in long-distance communication environments. As telemedicine systems work in public networks, privacy preservation issue of sensitive and private transmitted information is important. One of the means of proving a user's identity are user-controlled single sign-on (UCSSO) authentication scheme, which can establish a secure communication channel using authenticated session keys between the users and servers of telemedicine systems, without threats of eavesdropping, impersonation, etc., and allow patients access to multiple telemedicine services with a pair of identity and password. In this paper, we proposed a smartcard-based user-controlled single sign-on (SC-UCSSO) for telemedicine systems that not only remains above merits but achieves privacy preservation and enhances security and performance compared to previous schemes that were proved with BAN logic and automated validation of internet security protocols and applications (AVISPA).Entities:
Keywords: AVISPA; BAN logic; multi-server; single sign-on; telemedicine systems; user-controlled
Mesh:
Year: 2021 PMID: 33924024 PMCID: PMC8074165 DOI: 10.3390/s21082880
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1A general telemedicine system with asynchronous and synchronous telemedicine.
Figure 2System structure of the proposed scheme.
Notations of the proposed scheme.
| Notations | Definitions |
|---|---|
|
| Identity of user |
|
| Identity of server |
| ⊕ | Exclusive OR (XOR) operation. |
| Collision-resistant one-way hash function. | |
|
| Password of user |
|
| Secret value of server |
|
| Encryption/decryption key |
| A symmetric encryption/decryption algorithm with secret key | |
| Random numbers. | |
| Collision-resistance secure one-way chaotic hash function. | |
| USB | Portable USB device. |
|
| Server |
Figure 3Registration phase of the proposed scheme.
Figure 4The authenticated key exchange phase of the proposed scheme.
Figure 5Offline password change phase of the proposed scheme.
Notations of BAN logic [52] used in analyzing the proposed scheme.
| Notations | Definitions |
|---|---|
| Principles. | |
| Statements. | |
| Readers (receivers) and writers (senders). | |
|
| Encryption key. |
|
| |
|
| |
| Readers/writers of | |
|
| |
|
|
Figure 6HLPSL specification of user.
Figure 7HLPSL specification of server.
Figure 8HLPSL specification of session role, environment role, and goals.
Figure 9Results of AVISPA.
Comparisons of Security Requirements.
| Properties | [ | [ | [ | [ | [ | [ | [ | Ours |
|---|---|---|---|---|---|---|---|---|
| Preventing key-compromise impersonation attack | X | O | X | X | O | O | O | O |
| Preventing server spoofing attack | X | O | O | O | O | X | X | O |
| Multi-server environments | X | X | X | X | X | O | O | O |
| Preventing MITM attack | X | X | O | O | O | X | O | O |
| Stolen-verification table attack | X | O | O | O | X | X | O | O |
| Key confirmation | X | X | X | X | X | X | X | O |
| Preventing clock synchronization problem | O | X | X | O | X | O | X | O |
| User anonymity | X | X | O | O | O | X | O | O |
| Preventing denial-of-service (DoS) attack | X | X | X | O | O | X | O | O |
Comparisons of Computational Complexity.
| Roles | Lee et al. [ | Madhusudhan et al. [ | Sureshkumar et al. [ | Ours |
|---|---|---|---|---|
| User |
|
|
|
|
| Server |
|
|
|
|
| Both |
| 1588 | 1235 | 719 |
: Time for performing a Chebyshev chaotic maps operation; : Time for performing a symmetry encryption operation; : Time for performing a one-way hash function operation; 175; 2.5.
Figure 10Computational complexity of server with varying number of users.
Figure 11Computational complexity of user with varying number of servers.
Figure 12Multi-function smart token.
Figure 13Smartcard.
Figure 14Interface of registration.
Figure 15Interface of login.
Figure 16Interface of choosing services.
Figure 17Interface of account checking.