Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services
Tóm tắt
Modern network technology yields new interface for telecare medicine information systems in short TMIS used for patient’s healthcare. This system is used to provide healthcare services to patients at their home. It can be observed, telecare medicine information systems generally suffer several attacks as information being transmitted over a public network. Therefore, various authentication and key agreement schemes are proposed for TMIS to ensure secure and authorized patients communication over given public network. However, most of the schemes fail to achieve essential attributes discussed in this article. Although the key attributes of security and efficiency should be achieved in a common framework. This paper proposes construction of an RSA based authentication scheme for authorized access to healthcare services and achieves desirable key attributes of authentication protocols. Proof of security against polynomial time adversary is given in the random oracle to justify the security of proposed scheme. Communication analysis and computation analysis of proposed scheme indicates that proposed scheme’s performance is comparable and having better security.
Tài liệu tham khảo
Cao, T., and Zhai, J., Improved dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):9912, 2013.
Chen, H. B., Lee, W. B., and Chen, T. H., A novel drm scheme for accommodating expectations of personal use. Multimed. Tools Appl. 77(18):23, 099–23, 114, 2018.
Chen, H. M., Lo, J. W., and Yeh, C. K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.
Dolev, D., and Yao, A., On the security of public key protocols. IEEE Trans. Inf. Theory 29(2):198–208, 1983.
Guo, C., and Chang, C. C., Chaotic maps-based password-authenticated key agreement using smart cards. Commun. Nonlinear. Sci. Num. Sim. 18(6):1433–1440, 2013.
Jiang, Q., Ma, J., Lu, X., and Tian, Y., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2):12, 2014.
Lee, T. F., Chang, I. P., Lin, T. H., and Wang, C. C., A secure and efficient password-based user authentication scheme using smart cards for the integrated epr information system. J. Med. Syst. 37(3):9941, 2013.
Li, C. T., Lee, C. C., Weng, C. Y., and Chen, S. J., A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems. J. Med. Syst. 40(11):233, 2016.
Li, X., Liu, S., Wu, F., Kumari, S., and Rodrigues, J. J.: Privacy preserving data aggregation scheme for mobile edge computing assisted iot applications. IEEE Internet of Things Journal , 2018
Lin, H. Y., On the security of a dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):9929, 2013.
Madhusudhan, R., and Nayak, C. S., A robust authentication scheme for telecare medical information systems. Multimed. Tools Appl. 78(11):15, 255–15, 273, 2019.
Mishra, D., On the security flaws in id-based password authentication schemes for telecare medical information systems. J. Med. Syst. 39(1):154, 2015.
Mishra, D., Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems. J. Med. Syst. 39(3):19, 2015. https://doi.org/10.1007/s10916-015-0193-7.
Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M. K., and Chaturvedi, A., Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 38 (5):41, 2014.
Odelu, V., Das, A. K., Wazid, M., and Conti, M., Provably secure authenticated key agreement scheme for smart grid. IEEE T. Smart Grid 9(3):1900–1910, 2016.
Radhakrishnan, N., and Karuppiah, M.: An efficient and secure remote user mutual authentication scheme using smart cards for telecare medical information systems. Informatics in Medicine Unlocked, 2018
Renuka, K., Kumari, S., and Li, X., Design of a secure three-factor authentication scheme for smart healthcare. J. Med. Syst. 43(5):133, 2019.
Rivest, R. L., Shamir, A., and Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2):120–126, 1978.
Srinivas, J., Das, A. K., Wazid, M., and Kumar, N.: Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things. IEEE Transactions on Dependable and Secure Computing, 2018
Srinivas, J., Mishra, D., and Mukhopadhyay, S., A mutual authentication framework for wireless medical sensor networks. J. Med. Syst. 41(5):80, 2017.
Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.
Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.
Xie, Q., Zhang, J., and Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):9911, 2013.
Zhang, L., Zhu, S., and Tang, S., Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE J. Biomed. Health 21(2):465–475, 2017.
Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6): 3833–3838, 2012.