Next Article in Journal
Impact of Electrical Stimulation on Mental Stress, Depression, and Anxiety: A Systematic Review
Previous Article in Journal
Research on a Small Oil Detection Instrument Combining Micro-Distillation Range Analyzer and Raman Spectroscopy Technology
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Identity Management Scheme Based on Multi-Factor Authentication and Dynamic Trust Evaluation for Telemedicine

1
School of Cyberspace Security (School of Cryptology), Hainan University, Haikou 570228, China
2
Laboratory for Advanced Computing and Intelligence Engineering, Wuxi 214100, China
3
Jiangsu Variable Supercomputer Technology Co., Ltd., Wuxi 214100, China
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(7), 2118; https://doi.org/10.3390/s25072118
Submission received: 11 February 2025 / Revised: 16 March 2025 / Accepted: 24 March 2025 / Published: 27 March 2025
(This article belongs to the Section Electronic Sensors)

Abstract

:
Telemedicine diagnosis has become a more flexible and convenient way to receive diagnoses, which is of great significance in enhancing diagnosis, cutting costs, and serving remote users. However, telemedicine faces many security problems, such as the complexity of user authentication, the balance of the existing biometric factor authentication scheme, the unpredictability of user behavior, and the difficulty of unified authentication due to the differences in the security standards and authentication mechanisms of different trust domains, which affect the sustainable development of telemedicine. To address the above issues, this paper presents an identity management scheme based on multi-factor authentication and dynamic trust evaluation for telemedicine. Its authentication combines iris recognition for secure biometric verification, smart cards for encrypted credential storage, and static passwords for supplementary verification, addressing scenarios like facial coverage in medical settings. The scheme dynamically adjusts authentication based on attack rates, login anomalies, and service durations. By integrating ShangMi cryptographic algorithms and blockchain, it optimizes performance, achieving 35% lower communication overhead than previous protocols. A security analysis shows it resists impersonation, man-in-the-middle, and password modification attacks while preserving user anonymity. System evaluation meets authoritative standards, validating its practicality. This scheme balances security and efficiency, providing a strong basis for telemedicine’s long-term viability.

1. Introduction

Telemedicine is a medical service model that realizes remote diagnosis, treatment, and health monitoring between medical institutions and patients through the use of electronic communication technology and computer technology. At present, with the progress of the e-medical industry, telemedicine has gradually evolved from early telephone consultations to the stage of high-definition video consultations, remote surgery, and other high-end applications. Telemedicine enhances the quality and efficiency of medical services and also has significant potential to cut medical costs and fulfill the medical requirements of remote patients. However, the development of telemedicine does not rely on a single technical tool and requires a comprehensive, integrated, and efficient technical platform to support its complex application scenarios.
In telemedicine, patients can communicate with their doctors over the Internet to receive medical services [1]. Patients can obtain health data through wearable sensors and, with the help of mobile devices, send these data to the cloud database for doctors to access later. Meanwhile, doctors can conduct real-time consultations for patients in other places through remote cameras, smart audio, and other devices, and can even conduct remote surgery for patients through sophisticated smart operating tables.
However, while telemedicine brings great convenience to people’s lives, it also faces many security problems [2]. First, telemedicine accommodates diverse user groups (e.g., doctors, patients, and managers) with varying access privileges, necessitating granular authentication methods that balance security and usability. For instance, doctors require high-level access to medical records while patients need restricted view-only permissions. This diverse user authentication is more complicated [3]. Second, existing biometric schemes (e.g., fingerprint and face recognition) struggle to reconcile accuracy with convenience. In medical settings, facial coverage (e.g., masks) or device unfamiliarity among elderly patients often hinders verification, requiring supplementary factors like smart cards or passwords to ensure usability without compromising security. Meanwhile, user behavior patterns are inherently dynamic and influenced by external factors. Real-time trust assessments must analyze metrics like malicious attack rates and login anomalies, but this introduces computational complexity due to the need for continuous behavioral data collection and analysis. In addition, telemedicine involves the interoperation of multiple healthcare trust domains, such as the hospital domain and the patient domain, and the security standards and authentication mechanisms may differ between different trust domains, increasing the difficulty of unified authentication.
To address these issues, we propose an identity management scheme based on multi-factor authentication and dynamic trust evaluation for telemedicine. Specifically, we design and optimize the authentication scheme using a multi-technology fusion of authentication methods (including high-accuracy iris recognition [4], the secure storage of smart cards, and static password-assisted authentication [5]) to construct a three-factor system. Meanwhile, we established a dynamic trust evaluation system based on behavioral analysis by introducing a dynamic selection mechanism. This scheme not only improves data access control but also improves the security and convenience of authentication to facilitate the solution to the authentication needs of different types of users to prevent data leakage due to various factors, to enhance user trust and application scope, and to enhance the overall security of telemedicine.
The main contributions of this study are listed as follows:
  • A three-factor authentication scheme using an iris, smart card, and static password is designed. The iris recognition has high uniqueness and accuracy, the smart card can securely store user information, and the static password also plays a supplementary role as a traditional authentication method. This combination can greatly improve the security of authentication and is more suitable for hospital personnel authentication when the face may be covered by protective equipment and when some patients are less familiar with the operation of smart devices.
  • We introduce a dynamic selection mechanism for authentication factors and a dynamic trust evaluation mechanism based on user behavior analysis [6,7]. The system can automatically select appropriate combinations of authentication factors based on different user scenarios and equipment environments, making the authentication process more flexible and efficient and realizing a dynamic balance between authentication convenience and security. At the same time, the trust level is determined by a real-time evaluation of user behavior through the collection of a variety of data, which further enhances the security of telemedicine user authentication and ensures the secure and reliable operation of telemedicine.
  • A scheme analysis reveals that the proposed scheme can effectively fend off common security threats including impersonation attacks, man-in-the-middle attacks, and static password modification attacks. Meanwhile, it ensures user anonymity and comprehensively protects user privacy and data security. Moreover, in the actual operation of telemedicine, it can meet the dual needs of the system for security and efficiency, providing solid support for the sustainable development of telemedicine services.
The rest of this paper is organized as follows. In Section 2, we reviewed some related works and analyzed the limitations of existing solutions. In Section 3, we explained the overall architecture and core modules of the system scheme. In Section 4, we first analyzed the correctness and security of the proposed scheme. Subsequently, we discussed the advantages of it in terms of authentication accuracy and communication. Finally, we discussed the function and computational costs of the scheme through a theorem-proving performance analysis. In Section 5, we conducted a system evaluation of the proposed solution. In Section 6, we concluded this paper and offered a perspective on upcoming research.

2. Related Work

In recent years, with the rapid development of telemedicine technology, new devices, technologies, and ways of sharing information ensure a more convenient and better life, which provides an efficient and convenient mode of communication between remote users and healthcare professionals. To guarantee the security of these communications, user authentication plays a vital role. Consequently, numerous researchers have put forward relevant user authentication schemes. In 2011, Das et al. [8] put forward an efficient biometric-based remote user authentication scheme. This scheme ingeniously utilized smart cards to achieve strong authentication and mutual authentication, laying the foundation for subsequent research. In 2012, An et al. [9] deeply analyzed the scheme proposed by Das et al. and discovered security vulnerabilities. They promptly proposed an enhanced scheme, effectively overcoming the security weaknesses of the original scheme and further enhancing the security of mutual authentication between users and servers. In the same year, Wu et al. [10] proposed an authentication scheme for mobile devices in a telecare medical information system, introducing a two-factor authentication using smart cards and passwords for telemedicine. They added the concept of pre-computation in the communication process to optimize computational efficiency. However, He et al. [11] found that Wu et al.’s scheme was vulnerable to risks such as insider attacks, impersonation attacks, and stolen smart card attacks, and proposed an improved version. Nevertheless, the improved scheme still had deficiencies in resisting brute-force password attacks. In 2014, after conducting in-depth analyses of the schemes proposed by Sood et al. [12] and Song et al. [13], Chen et al. [14] discovered problems in aspects such as mutual authentication and key security. Therefore, Chen et al. proposed an improved smart-card-based password authentication and key agreement scheme. This scheme achieved the functions of mutual authentication and protection against stolen smart card attacks, but was lacking in password updates and the prevention of insider attacks. In 2015, Das et al. [15] once again proposed a new smart-card-based robust and secure anonymous biometric remote user authentication scheme. This scheme used fuzzy extractors, encryption techniques, and anonymization processing. While ensuring the accuracy of identity and the security of authentication, it supported local password changes and protection against replay attacks. However, this scheme still had issues such as not supporting user anonymity and being vulnerable to various attacks. In 2018, Wu et al. [16] further developed this idea and proposed a two-factor authentication scheme suitable for resource-constrained medical sensor devices, providing additional security for these devices. This scheme used wireless healthcare sensor networks to prevent tracking and verified its security through the Proverif tool. However, it did not provide forward secrecy and had a high communication cost. In the same year, Challa et al. [17] proposed a provably secure three-factor user authentication and key agreement protocol for wireless medical sensor networks. This scheme improved security by using Elliptic Curve Cryptography (ECC) and supported the addition of dynamic sensor nodes, the update of passwords and biometrics, and the revocation of smart cards. It also conducted a security analysis through the ROR model and BAN logic, proving the effectiveness of the protocol in resisting various attacks and further enhancing the security protection level of the telemedicine system. However, this scheme was not secure against impersonation attacks and also had high computational and communication costs. In 2019, Barman et al. [18] proposed a three-factor authentication scheme for e-healthcare in a multi-server environment using fuzzy commitments. In 2020, Ali et al. [19] pointed out that it had various security risks. Ali et al. then proposed a new scheme. Although some problems were solved, there was still a risk of masquerade attacks and a lack of mutual authentication. In 2023, Gupta et al. [20] proposed a machine learning and smart-card-based two-factor authentication scheme for TMIS. This scheme integrates ML, nonce checks, and smart card blocking to prevent unauthorized access. While ensuring anonymity and AVISPA-validated attack resistance, it incurs ML overhead and smart card dependency, posing latency risks in real-time telecare. In 2024, Rao et al. [21] proposed L2FA-ADA-secure U-WSNs in eHealth with lightweight two-factor auth and anonymous data access, ensuring privacy and efficiency. Validated via security analysis and experiments, it resists attacks and outperforms peers. However, looking at these research results as a whole, most of them adopted single-factor or partial-factor authentication methods. For the complex medical environment and diverse user groups, it is difficult to strike a balance between authentication security and convenience.
More crucially, in the context of telemedicine, there is a severe scarcity of research integrating identity authentication with dynamic trust evaluation. The telemedicine environment is complex and ever-changing, and user behavior is uncertain. A single form of identity authentication cannot promptly address potential risks. However, organically combining identity authentication with dynamic trust evaluation can more accurately judge the authenticity and security of user identities and adjust authentication strategies and access rights in real time. Currently, though, relevant research is only in its infancy. Most studies merely focus on identity authentication technology itself or simply mention the concept of trust evaluation, lacking continuous dynamic monitoring and an in-depth analysis of user behavior.
In contrast, the scheme proposed in this paper has significant advantages. First, the scheme adopts a three-factor authentication method combining iris recognition, smart cards, and static passwords, fully utilizing the high precision of iris recognition, the secure storage of smart cards, and the auxiliary verification function of static passwords, which greatly improves the security of authentication and better adapts to situations where the face of hospital personnel may be covered by protective equipment during authentication and situations involving some patients who are not familiar with the operation of smart devices. Second, the introduction of the re-authentication mechanism and the dynamic trust evaluation mechanism based on user behavior analysis enables the system to acutely capture changes in user behavior, promptly adjust authentication strategies, and access rights. This effectively defends against various attacks and comprehensively safeguards user privacy and data security. Finally, it also shows advantages in terms of performance, which can further reduce time and communication overhead, improve system operation efficiency, and provide better authentication services for telemedicine.

3. System Solution

3.1. Overall Architecture

The overall architecture of this solution is shown in Figure 1. In this system, a Fabric consortium blockchain is adopted to implement the blockchain-based data-sharing platform. The uploading, querying, and updating of authentication information are achieved through the deployment of smart contracts. The medical service centers, medical sensors, etc., serve as participants to form a collaborative consortium of the blockchain network, leveraging the distributed ledger technology of blockchain to break the medical information silos. Entities interact with each other via secure communication protocols to jointly complete the identity authentication and management of telemedicine users, ensuring the security and integrity of information transmission. The proposed system model mainly includes the following types of entities:
Medical service center: Medical service centers offer remote medical services through various facilities, focusing on improving healthcare, reducing costs, and meeting users’ needs. It manages user registration and authentication and uses smart cards for three-factor authentication. During user interactions, in registration, it processes patient data under smart contract supervision. In authentication, it checks requests and smart contracts determine further steps. For visitors, smart contracts review and authorize. With medical blockchain, the service center sends encrypted data on registration and obtains a key. In daily operations, it uploads user data, and smart contracts support trust and permission management and provide data as needed.
User entity: Includes all objects that receive telemedicine services and have access to the medical data system. Four major groups are included in this program: doctors, managers, patients, and other telemedicine visitors.
  • Doctor: As medical service providers, they interact with the medical service center in real time when accessing patient data and performing operations. The center obtains requests, smart contracts verify rights, and if passed, the center fetches data. Doctors’ behavior data are uploaded, and smart contracts analyze it, adjusting trust levels and access rights if there is abnormal behavior.
  • Manager: Managers manage the system, including user and data management, and interact with the medical service center in real time. When allocating user permissions, their instructions go to the center. Smart contracts verify identities and authorities, and the center updates permission settings in real time and reports back results.
  • Telemedicine patient: Patients interact with the medical service center in real time during registration, record viewing, and communication with doctors. At registration, their info goes to the center, and smart contracts verify it for proper storage. When viewing records, the center obtains requests, smart contracts check access rights, and the center fetches and returns data. For doctor communication, the center relays info while smart contracts safeguard its security and privacy.
  • Telemedicine visitor: This includes third-party service orgs and patients’ family members. When applying for specific data, their authorization apps to the medical service center are received in real time. Smart contracts review apps per security and permission rules. After approval, during smart card and static password authentication, the info is sent to the center for verification. Smart contracts check its accuracy. If verified, visitors obtain access rights immediately.
Medical blockchain [22]: This consists of the medical information database used by the medical service center and the trusted server. The database is for user entities to upload and download data. The trusted server offers access control for dynamic three-factor authentication and dynamic trust evaluation when users download remote medical data. The medical service center uploads user registration, authentication, and behavioral data to the medical blockchain in real time. Blockchain smart contracts verify and store these data per preset rules for authenticity and integrity. When the medical service center needs to verify user permissions or obtain trust evaluation results, smart contracts quickly retrieve relevant data and give real-time feedback. When users download remote medical data, the trusted server conducts real-time dynamic three-factor authentication and trust evaluation. The smart contract determines the user’s trust level based on historical behavior and current operations. If the user meets the access requirements, the corresponding access rights are automatically granted. If the trust level is low or there are risks, the user is required to perform additional authentication steps or have their access rights restricted.
This paper proposes an identity management scheme based on multi-factor authentication and dynamic trust evaluation for telemedicine, whose workflow mainly includes two phases of registration and authentication. The flowchart of the patient authentication phase is shown in Figure 2. The specific description of re-authentication is located in Section 3.2.2.
The entire process, from the initial settings in the registration phase to the multiple verifications in the daily authentication, to the risk assessment and response based on user behaviors, and the secure handling of medical sensor data, ensures the security, privacy protection, and efficient operation of telemedicine.

3.2. Core Modules

The meaning of the symbols is shown in Table 1.

3.2.1. Three-Factor Authentication

Our scheme adopts a three-factor authentication method combining iris recognition, smart cards, and static passwords and incorporates the state secret algorithm to enhance security, in which SM2 is used for asymmetric encryption and SM3 is used for hashing, and adopts a dynamic and flexible authentication factor scheme to adapt to different situations to balance the authentication convenience and security.
Registration stage: The registration stage consists of three components, including medical service center registration, the registration of user entities, and medical sensor registration.
  • Medical service center registration: The medical service center M S C generates the registration random number R M S C and calls S M 3 for hashing to generate the current timestamp T 1 and uses the S M 2 algorithm to generate the public key P U M S C of the medical blockchain to send the relevant information M S C i d , R M S C 1 , T 1 encrypted as C 1 by S M 2 to the medical blockchain. The medical blockchain receives the request and uses S M 2 to decrypt P R M C S , after which it generates the current timestamp T 1 and verifies whether | T 1 T 1 | Δ T is established; if it passes, it checks whether | T 1 T 1 | Δ T is registered, and if it is not registered, it selects K M S C M C L and encrypts C 2 using the S M 2 encryption algorithm and the key K M S C = h ( M S C i d R M S C 1 T 1 ) to obtain C 2 and sends C 2 to the medical service center. The medical service center calculates K M S C , decrypts C 2 , generates the current timestamp T 2 , verifies whether | T 2 T 2 | Δ T is established, and if established, saves it as the data encryption key.
  • Registration of user entities: User U i uses the user terminal in the secure environment of the medical service center to enter account number U i d i , login key U p w i , and iris characteristics B I O i . The user terminal generates the registration random number R U R 1 , uses the g e n ( ) function to generate the data required for iris detection to compute ( σ i , τ i ) = G e n ( B I O i ) , and then uses the S M 3 hash algorithm to compute U R U R 1 = R U R 1 h ( U i d i U p w i ) , M i = h ( U i d i U p w i σ i R U R 1 M S C i d ) , and N i = h ( U i d i U p w i τ i R U R 1 M S C i d ) to generate the current timestamp T 3 and provides { U i d i , M i , N i , U R U R 1 , T 3 } to the medical service center. The medical service center receives the enrollment request, generates the current timestamp T 3 , verifies whether | T 3 T 3 | Δ T is valid, generates the enrollment random number R U R 2 , selects the smart card numbered Cid, and calls the SM3 hash algorithm to calculate A i = h ( U i d i M i M S C i d C i d R U R 2 ) , B i = h ( U i d i N i M S C i d C i d R U R 2 ) , U A i = A i M i , U B i = B i N i , I U = h ( U R U R 1 M S C i d ) , H A i = A i I U , and H B i = B i I U . The { I U , H A i , H B i , T 3 , L i } is stored in the database and the { U A i , U B i } is encrypted by the S M 2 algorithm stored in the smart card and issued to the user. After the user receives the information, { U R U R 1 } is stored in the smart card, and the smart card saves τ i , U A i , U B i , U R U R 1 .
  • Medical sensor registration: The medical sensor generates the registration random number R S R 1 , calls the S M 3 hash algorithm to calculate S S i d j = h ( R S R 1 S i d j M S C i d ) and S R S R 1 = R S R 1 h ( S i d j M S C i d ) , obtains and generates the current timestamp T 4 , and sends { S i d j , S R S R 1 , S S i d j , T 4 } to the gateway through a secure channel. The gateway sends the information to the medical service center. The medical service center receives the message, generates the current timestamp T 4 , verifies whether | T 4 T 4 | Δ T is valid, verifies the freshness of the message, and if the judgment is successful, generates the registered random number R S R 2 and uses the S M 3 algorithm to calculate C j = h ( S R S R 1 S S i d j R S R 2 M S C i d ) , H C j = C j h ( M S C i d S S i d j ) , and S C j = C j h ( M S C i d S R S R 1 ) ; generates the current timestamp T 5 ; stores { S i d j , H C j , S S i d j } in the database; and sends { T 5 , H C j } to the medical sensor. The medical sensor receives the message, generates the current timestamp T 5 , verifies whether | T 5 T 5 | Δ T is valid, and if the judgment is successful, then invokes the S M 3 hash algorithm to calculate S C j = C j h ( M S C i d R S R 1 ) , and { S R S R 1 , S C j , S S i d j } will be stored locally.
Authentication phase: In this phase, the user inserts the smart card into the terminal device, the terminal device acquires { C i d , U A i , U B i , U R U R 1 , τ i } , and the user name U i d i and key U p w i entered by the user generates the current timestamp T 6 using the S M 3 algorithm and sends { T 6 , U R U R 1 } to the medical service center. The medical service center receives the information, generates the current timestamp T 6 , verifies whether | T 6 T 6 | Δ T is valid, if the judgment is successful, calls the S M 3 hash algorithm to calculate I U = h ( U R U R 1 M S C i d ) , searches for table entries in the database with I U as the index to obtain the corresponding { T 3 , L i } , checks whether T 6 T 3 is outdated, and verifies whether the value of L i is “3” if the verification is passed; if it is “3”, reject the user request, and if the verification passes, then temporarily store { U R U L , U A i , U B i , H R U R 2 } and generate the current timestamp T 7 and send { T 7 , L i } to the user. The user terminal receives the information and generates the current timestamp T 7 , verifies whether | T 7 T 7 | Δ T is valid, and if the judgment is successful, calls the S M 3 hash algorithm to calculate R U R 1 = U R U R 1 h ( U i d i U p w i ) ; the terminal generates a random number R U L 1 and calls the S M 3 algorithms to generate the current timestamp T 8 . The user inputs the target device number S i d j , calls the S M 3 hash algorithm to calculate U S i d j = S i d j h ( U i d i R U L 1 ) and U R U L 1 = R U L 1 h ( C i d M S C i d ) , and requests the user to provide the authentication factor according to L i , and when it is “1”, calculate M i = h ( U i d i U p w i R U R 1 ) and A i = M A i M i , V 0 i = h ( A i R U L 1 ) ; when it is “2”, the terminal enters the user’s iris feature specimen B I O i and calls the hash algorithm to calculate σ i = R e p ( B I O i , τ i ) , N i = h ( U i d i U p w i σ i R U R 1 ) , B i = M B i N i , and V 0 i = h ( B i R U L 1 ) . { T 8 , U R U L 1 , U R U R 1 , V 0 i , U S i d j } is sent to the medical service center for the temporary storage of R U L 1 . The medical service center receives the information and generates the current timestamp to verify whether | T 8 T 8 | Δ T is valid, and if successful, it calls the S M 3 hash algorithm to calculate A i = H A i h ( M S C i d U R U R 1 ) , B i = H B i h ( M S C i d U R U R 1 ) , and R U L 1 = U R U L 1 h ( C i d M S C i d ) and calculates V 0 i = h ( A i R U L 1 ) or V 0 i = h ( B i R U L 1 ) based on L i and verifies whether V 0 i is equal to V 0 i . If the verification is successful, it completes the verification of the user. The medical service center calculates S i d j = U S i d j h ( U i d i R U L 1 ) based on the U S i d j provided by the user and, using the S M 3 hash algorithm, looks up and obtains { H C j , S S i d j } in the medical service equipment table based on S i d j , calculates C j = H C j h ( M S C i d S S i d j ) and V 1 j = h ( M S C i d S S i d j C j ) , generates a random number R U L 2 , generates a current timestamp T 9 , and sends { T 9 , V 1 j } to the medical sensor for temporary storage of { T 9 , V 1 j R U L 1 , R U L 2 } . The medical sensor receives the information and first generates the current timestamp T 9 , verifies that | T 9 T 9 | Δ T is valid, and, if the judgment is successful, invokes the S M 3 hash algorithm to calculate R S R 1 = S R S R 1 h ( S i d j M S C i d ) , C j = S C j h ( M S C i d R S R 1 ) , and V 1 j = h ( M S C i d S S i d j C j ) and verify whether V 1 j and V 1 j are equal; if they are equal, the verification passes, the medical sensor generates R U L 3 , calculates V 2 j = h ( C j H M S i d S S i d j ) and S R U L 3 = R U L 3 h ( C j V 1 j ) by the S M 3 hash algorithm, generates the current timestamp T 10 , and sends { T 10 , V 2 j , S R U L 3 } to the medical service center. The medical service center receives the message and generates the current timestamp T 10 , verifies whether | T 10 T 10 | Δ T is valid, and if the judgment is successful, it calls the S M 3 hash algorithm to calculate C j = H C j h ( M S C i d S S i d j ) and V 2 j = h ( C j M S C i d S S i d j ) and verifies whether V 2 j and V 2 j are equal. If the verification is successful, it passes the verification of the medical sensor and generates the current timestamp T 11 by using the S M 3 hash algorithm to calculate R U L 3 = S R U L 3 h ( C j V 1 j ) and K = h ( T 11 h ( R U L 1 · R U L 2 · R U L 3 ) ) and calculates V 3 i = h ( M R U R 1 V 0 i ) , U K = R U L 2 · R U L 3 , V 4 j = h ( S R U L 3 | V 2 j ) , and S K = R U L 1 · R U L 2 , sends { T 11 , V 3 i , U K } to the user, and sends { T 11 , V 4 j , K } to the medical sensor. The user receives the message, generates the current timestamp T 11 , and verifies that | T 11 T 11 | Δ T is valid. If the judgment is successful, it calculates V 3 i = h ( M R U L 1 V 0 i ) using the S M 3 hash algorithm, verifies that V 3 i is equal to V 3 i , and if equal, the verification passes and calculates K = h ( T 11 h ( R U L 1 · U K ) ) . The medical sensor receives the message and also generates the current timestamp T 11 and verifies it using the S M 3 hash algorithm. If the judgment is successful, it calculates V 4 j = h ( S R U L 3 V 2 j ) , verifies that V 4 j is equal to V 4 j , and if equal, the verification passes and calculates K = h ( T 11 h ( R U L 3 · U K ) ) .

3.2.2. Dynamic Trust Evaluation

On the basis of three-factor authentication to determine the user’s identity, in order to enhance the security of telemedicine user authentication, we introduced dynamic trust evaluation based on user behavior analysis, which relies on some of the data collected during three-factor authentication, and is able to analyze the user’s behavior in depth further, assess the user’s risk level in real time, and ensure that telemedicine can be operated securely and reliably.
After considering multiple factors, we chose six key indicators for telemedicine security: malicious attack rate, attempted override rate, login system anomaly rate, access service duration, user operation habit stability, and sensitive data utilization rate. The malicious attack rate weighs threats by harm degree to warn users. The attempted override rate spots internal risks from unauthorized actions. The login system anomaly rate blocks illegal logins. The user operation habit stability flags abnormal behavior. The sensitive data utilization rate safeguards data confidentiality. Access service duration ensures proper user operation. These six indicators build a comprehensive trust model, ensuring reliable user trust evaluation and overall telemedicine security. The description of these indicators is listed as follows:
  • Malicious attack rate [23]: The malicious attack rate refers to the frequency of malicious attacks (such as user impersonation attacks, man-in-the-middle attacks, static password guessing attacks, and other types of attacks that intentionally damage system security, steal information, or interfere with normal services) launched against the system within a specific period. It reflects the frequency of malicious attacks on the system. Let i denote the number of times the first malicious attack behavior is detected, and n i denotes the total number of accesses in the same period. The attempted transgression rate is calculated as follows:
    T 1 = i = 1 k ω i × n i N t 1
    where k is the number of types of malicious attacks, considering the different degrees of harm of different types of malicious attacks, where each type of malicious attack sets the corresponding weight factor ω i .
  • Attempted override rate: Attempts to overstep the authority rate refer to the frequency of users attempting to access resources beyond their authorized scope or perform unauthorized operations within a certain period, including patients attempting to access the medical records of other patients, non-medical personnel attempting to perform medical operation-related commands, and ordinary users attempting to obtain system management privileges and other behaviors. It reflects the degree of users’ compliance with system privilege rules and the degree of potential security risk. Setting the number of times a user attempts to access unauthorized resources in a certain period for the jth operation category as n j , the corresponding weight as ω i , and the total number of access attempts in the same period as N t 2 , the malicious attack rate is calculated as follows:
    T 2 = j = 1 m ω i × n j N t 2
    where m is the number of operation categories involved in the user’s attempts to transgress authorization.
  • Login system anomaly rate [24]: The login system anomaly rate is the frequency of authentication failures or errors due to various reasons within a certain period. This includes but is not limited to multiple login attempts with incorrect usernames or static passwords, frequent logins within a short period, logins from unusual geographic locations or I P addresses, login attempts with known malware or tools, and so on. Setting the number of anomalies detected by the login system in a given period as N l and the total number of login attempts in the same period as N t 3 , the login system anomaly rate is calculated as follows:
    T 3 = N l N t 3
  • Access service duration [25]: The access service duration is the average length of time from when a user successfully logs into the system to when they log out of the system or when the session times out. This period can reflect the user’s activity level and usage habits in the system, as well as the response time and performance issues of the service. Let the duration of the ith service access be t i , the length of time from the beginning to the end of the request, and the total number of service accesses in a certain period is N; then, the access service duration is calculated as follows:
    T 4 = 1 N i = 1 N t i
  • Stability of user operation habits [26]: The stability of user operation habits refers to the degree of deviation between a user’s operation behaviors within a system and their past habits within a certain period of time. Suppose that within the investigation period, the number of deviations in the user’s operation behaviors from their past habits is N k (where k represents the type of operation, such as deviation in login time, deviation in login device, deviation in operation frequency, etc.), the weight of each operation type is ω i , and the total number of access attempts within the same time period is N t 3 . Then, the calculation formula for the stability of user operation habits is
    T 5 = k = 1 m ω i × n k N t 5
    where m is the number of operation categories.
  • Sensitive data utilization rate: The sensitive data utilization rate is used to measure the frequency at which users access and use sensitive data in the system, encompassing operations such as users accessing, downloading, and sharing sensitive data. Assume that the number of operations a user conducts on sensitive data within a certain period of time is N r , and the total number of data operations within the same time period is N t 6 . Then, the calculation of the utilization rate of sensitive data is as follows:
    T 6 = N r N t 6
For users logging into the system for the first time, due to the lack of sufficient behavioral data for a comprehensive assessment, we give a relatively high initial user trust value Q (Q = 1) to enhance the ease of authentication and ensure that users can use basic healthcare services without any problems. As the user’s activities in the system increase and the behavioral data accumulate, we will pay close attention to those behavioral signs that may lead to an increased risk level, and the trust value will drop rapidly in the case of frequent abnormal behaviors (e.g., multiple abnormal samples in a short period). The formula for calculating the comprehensive trust value is as follows:
T = φ 1 ( 1 T 1 ) + φ 2 ( 1 T 2 ) + φ 3 ( 1 T 3 ) + φ 4 ( 1 T 4 ) + φ 5 ( 1 T 5 ) + φ 6 ( 1 T 6 )
where T 1 , T 2 , T 3 , T 4 , T 5 , and T 6 denote the malicious attack rate, attempted transgression rate, login system anomaly rate, access service duration, stability of user operation habits, and sensitive data utilization rate, respectively, and the weights of each indicator are set to be φ 1 , φ 2 , φ 3 , φ 4 , φ 5 , and φ 6 , respectively, and φ 1 + φ 2 + φ 3 + φ 4 + φ 5 + φ 6 = 1 .
In real-world scenarios, the six key indicators for telemedicine security we chose are based on extensive research and analysis on actual medical data. For example, the malicious attack rate is calculated based on the historical data of known malicious attacks in similar telemedicine systems. This data-driven approach ensures that our dynamic trust evaluation mechanism can accurately assess the risk level of users. When a malicious attack is detected, the system not only blocks the attacker’s access but also alerts the system administrators. They can then take further actions, such as investigating the source of the attack and strengthening the security of the system. In terms of handling other security threats like attempted override of authority, the system logs every access attempt and cross-checks it with the user’s authorized privileges. If an unauthorized access attempt is detected, the system immediately locks the user’s account and initiates an investigation. These measures have been proven effective in simulations and pilot studies, and we are confident they will be effective in real-world applications.
By analyzing and modeling user and entity behaviors, a triple baseline is constructed. Based on the behavioral baseline of different risks, the trust level is divided into four categories, namely untrustworthy, basic trustworthy, general trustworthy, and high trustworthy. Based on the behavioral scores of users and entities falling into different trust value intervals, users can be defined into four classes, which are low-risk users, normal users, medium-risk users, and high-risk users. According to the results of the dynamic trust evaluation, the telemedicine visitor is graded in terms of authority, and the trust level is divided, as shown in Table 2.
Authentication policy and factor updates: Depending on the risk level of the user, we will take appropriate measures to securiguard the security of the system. For normal and low-risk users, as they are assessed as having a low risk, the subsequent authentication process can be simplified, and they will continue to operate as normal, with no additional steps required to complete authentication by simply providing a smart card. For medium-risk users, the medical service center will immediately initiate the re-authentication process and lock the uploading of data access requests for this level of users as well as the data of the medical sensors employed by the users at the same time. For high-risk users, more stringent measures will be taken to directly block them from further accessing the system until a higher level of authentication is completed and the authentication factor is updated.
The process of updating the identification factor is as follows. The banned user U i inputs the identification factor update request to the user terminal, inserts the smart card into the terminal device, acquires { C i d , M A i , M B i , U R U R 1 } , inputs the user name U i d i and key U p w i , generates the current timestamp T 12 with the key update random number R U U 1 , and the terminal enters the user’s iris feature specimen B I O i , U U R 1 = U R U R 1 h ( U i d i U p w i ) ; calculates σ i = R e p ( B I O i , τ i ) , N i = h ( U i d i U p w i σ i R U R 1 ) , B i = M B i N i , and V 5 i = h ( B i R U U 1 ) ; sends { T 12 , U R U U 1 , V 5 i } to the medical service center; and stores it temporarily as R U U 1 . The medical service center generates the current timestamp T 12 and verifies whether | T 12 T 12 | Δ T is valid; if the judgment is successful, then it calculates B i = H B i h ( M S C i d U R U R 1 ) , R U U 1 = U R U R 1 h ( C i d M S C i d ) , and V 5 i = h ( B i R U U 1 ) , and verifies whether V 5 i is equal to V 5 i . If the verification is successful, then it completes the verification of the user, generates the key update random number R U U 2 , generates the current timestamp T 13 , calculates V 6 i = h ( R U U 1 M S C i d C i d ) and H R U U 2 = R U U 2 h ( T 13 R U U 1 M S C i d ) , and sends { T 13 , V 6 i , H R U U 2 } to the user terminal and temporary storage R U U 2 . The user terminal receives the information, verifies that the current timestamp T 13 is generated, verifies whether | T 13 T 13 | Δ T is valid, calculates V 6 i = h ( R U U 1 M S C i d C i d ) if the judgment is successful, verifies whether V 6 i is equal to V 6 i , and verifies that it is successful. If so, it calculates R U U 2 = H R U U 2 h ( T 13 R U U 1 M S C i d ) , and the user enters a new factor, the login key U p w i n e w , and enters the iris characteristics B I O i n e w . The user terminal generates the key update random number R U R 1 n e w and calculates ( σ i n e w , τ i n e w ) = G e n ( B I O i n e w ) , U R U U 2 = R U U 2 h ( T 13 R U U 1 M S C i d ) , U R U U 1 n e w = R U R 1 n e w h ( U i d i U p w i n e w ) , M i n e w = h ( U i d i U p w i n e w R U R 1 n e w M S C i d ) , and N i n e w = h ( U i d i U p w i n e w R U R 1 n e w M S C i d ) ; generates the current timestamp T 13 ; and provides { M i n e w , N i n e w , U R U R 1 n e w , T 13 , U R U U 2 } to the medical service center. The medical service center receives the registration request; generates the current timestamp T 13 ; verifies whether | T 13 T 13 | Δ T is valid; generates the key update random number R U R 2 n e w ; calculates A i n e w = h ( U i d i M i n e w M S C i d C i d R U R 2 n e w ) , B i n e w = h ( U i d i N i n e w M S C i d C i d R U R 2 n e w ) , U A i n e w = A i n e w M i n e w , U B i n e w = B i n e w N i n e w , H A i n e w = A i n e w h ( M S C i d U R U R 1 n e w ) , H B i n e w = B i n e w h ( M S C i d U R U R 1 n e w ) , and I U n e w = h ( U R U R 1 n e w M S C i d ) ; stores { I U n e w , H A i n e w , H B i n e w , T 13 , L i } in the database; and L i is the user identification factor policy that is periodically updated from the medical blockchain. The calculation R U U 2 = U R U U 2 h ( T 13 R U U 1 M S C i d ) verifies that R U U 2 and R U U 2 are equal, and { U A i n e w , U B i n e w } is sent to the user if the verification is successful. The smart card provided by the medical service center has a limitation of time; when the smart card expires, the user needs to re-visit the medical service center for re-registration. The user receives the information and re-deposits { U A i n e w , U B i n e w , τ i n e w , U R U R 1 n e w } to the smart card.

3.2.3. Re-Authentication

When the dynamic trust evaluation finds that the user level reaches medium risk, the medical service center will immediately start the re-authentication process with the following steps:
Step 1: The medical service center receives the updated L i from the medical blockchain and then re-authenticates the online user with increased risk and immediately locks the upload of the data access request of the risky user as well as the upload of the data of the medical sensors adopted by the user, encrypts the re-authentication message M S G 1 by the key K generated in the key negotiation stage, and then generates the current timestamp T 14 by using the S M 3 algorithm, and sends the { M S G 1 , T 14 , M S C i d } k to the user terminal.
Step 2: The user terminal receives the message and uses the S M 3 algorithm to generate the current timestamp T 14 , verifies whether | T 14 T 14 | Δ T is valid, decrypts the message, and requires the user to perform strong identity authentication. The user inserts the smart card into the terminal device, acquires { C i d , U A i , U B i , U R U R 1 , τ i } , enters the user name U i d i and the key U p w i , enters the iris feature specimen B I O i , and the terminal calculates R U R 1 = U R U R 1 h ( U i d i U p w i ) to generate the random number R U R L 1 . The terminal generates the current timestamp T 15 by calculating U S i d j = S i d j h ( U i d i R U R L 1 ) , U R U R L 1 = R U R L 1 h ( C i d M S C i d ) , σ i = R e p ( B I O i , τ i ) , N i = h ( U i d i U p w i σ i R U R 1 ) , B i = M B i N i , and V 7 i = h ( B i R U R L 1 ) through the S M 3 algorithm and sends { T 15 , U R U R L 1 , U R U R 1 , V 7 i } to the medical service center, which temporarily stores { R U R L 1 } .
Step 3: After the medical service center terminal receives the information, it uses the S M 3 algorithm to verify the generation of the current timestamp T 15 , verifies whether | T 15 T 15 | Δ T is valid, and verifies whether | T 15 T 14 | exceeds the time limit for re-authentication. If the verification is successful, it calculates B i = H B i h ( M S C i d U R U R 1 ) , R U L 1 = U R U L 1 h ( C i d M S C i d ) , and V 7 i = h ( B i R U R L 1 ) by the S M 3 algorithms and verifies whether V 7 i is equal to V 7 i . If the verification is successful, it completes the re-authentication of the user.
Step 4: The medical service center lifts the data access lock and the lock of relevant medical sensor data upload for the user who has passed the re-authentication and readjusts the risk level of the user.
The flowchart of the patient re-authentication is shown in Figure 3.
Re-authentication is a complementary measure for user risk changes based on three-factor authentication and dynamic trust evaluation. When the dynamic trust evaluation detects an increase in the user’s risk, the medical service center determines the users who need to be re-authenticated based on the updated data provided by the medical blockchain and sends a notification to their terminals. The user is required to authenticate again through the three-factor authentication process. If the user passes the re-authentication, the restrictions on data access and sensor data upload will be lifted, and the user’s risk level will be readjusted; if not, stricter access restrictions and other security measures will be taken. This mechanism can effectively ensure that in the event of a change in the user’s risk, especially if the risk increases, the system can re-verify the user in a timely manner to protect the security and stability of the system.

4. Scheme Analysis

4.1. Correctness Analysis

The correctness of this subsection lies mainly in two aspects: the analysis of correctness in the registration phase and that in the user authentication phase.

4.1.1. Correctness Analysis of the Registration Phase

Medical service center registration: The medical service center M S C generates the registration random number R M S C 1 and timestamp T 1 and uses P U M C S to encrypt the relevant information to send to the medical blockchain. The medical blockchain decrypts and performs time verification and registration status checks and then selects the key K M C S = h ( M S C i d R M C S 1 T 1 ) and sends it to the medical service center. The medical service center decrypts and saves the data encryption key. The whole process ensures the secure transmission and correct processing of information and ensures that the registration information of the medical service center is accurately and correctly registered in the medical blockchain.
User entity registration stage: User U i enters the account number, U i d i login key U p w i , and enters iris features B I O i in the secure environment of the medical service center. The user terminal generates relevant data and provides them to the medical service center. The medical service center receives the registration request and carries out operations such as time verification, random number generation, and smart card selection, and stores the relevant information in the database and smart card. The user receives the information and deposits part of the data into the smart card, which ensures complete and accurate storage of user registration information and provides a reliable basis for subsequent authentication.
Medical sensor registration: The medical sensor generates the registration random number R S R 1 , calculates the relevant identification, and sends the information to the gateway through a secure channel, after which the gateway sends the information to the medical service center. The medical service center carries out time verification, message freshness verification, and other operations; stores the relevant information in the database; and sends it to the medical sensor. The medical sensor receives the message and then verifies and stores the data, which ensures that the registration information of the medical sensor is correctly configured in the medical service center and the sensor locally.

4.1.2. Correctness Analysis of the User Authentication Phase

Authentication and key negotiation: The user inserts the smart card into the terminal equipment; enters the user name U i d i , key U p w i , and other information; and sends it to the medical service center. The medical service center carries out operations such as time verification, information finding, and verification, and then the user terminal carries out further operations and sends information to the medical service center according to the feedback from the medical service center. The medical service center carries out verification again and then interacts with the medical sensor to finally complete the verification of the user and key negotiation. The information interaction and validation steps between the entities in this process ensure that the user’s identity can be accurately authenticated and the key negotiation can be completed securely.
User dynamic trust evaluation: Data generated by patients using medical sensors is uploaded to the medical cloud database through the medical service center and encrypted using a specific key K M S C M C S . The user requests access from the medical service center and the key negotiation is securely completed. Then, the medical service center verifies the user’s key and requests access to the medical cloud database. The medical cloud database records user access behavior and dynamically adjusts the user authentication factor policy, according to which the medical service center re-authenticates medium-risk users and blocks high-risk users. This process ensures that user threats can be detected in a timely manner and appropriate response measures can be taken to ensure security.
User authentication factor update phase: User U i inputs the authentication factor update request to the user terminal while the terminal carries out relevant operations and sends information to the medical service center. The medical service center carries out time verification, information verification, and other operations and sends feedback to the user terminal. After the user terminal carries out the verification and update operations, it provides the new information to the medical service center. The medical service center performs verification and storage operations again and finally sends the updated information to the user. This ensures that the user authentication factor can be updated timely and accurately, guaranteeing the validity and security of user authentication.
User re-authentication phase: After receiving the updated A from the medical blockchain, the medical service center re-authenticates the online users with increased risk and locks the relevant data for uploading. After receiving the re-authentication message, the user terminal requests the user to carry out strong identity authentication, and the user carries out relevant operations and sends information to the medical service center. The medical service center carries out time verification and information verification to complete the re-authentication of the user. If the user passes the re-authentication, the medical service center releases the data access lock and sensor data upload lock and readjusts the user’s reputation. This phase ensures timely re-authentication in the event of increased risk to the user, guaranteeing the security and stability of the system.

4.2. Proof of Security

In this part, we will prove the proposed scheme can resist impersonation attacks, man-in-the-middle attacks, static password modification attacks, etc., by proving Theorems 1 and 2.
Theorem 1. 
Under particular security assumptions, the scheme proposed in this paper can withstand impersonation attacks, man-in-the-middle attacks, and static password modification attacks.
Theorem 2. 
Under the stochastic prediction model, the scheme proposed in this paper can protect the anonymity of users and prevent the leakage of their private information.

4.2.1. Proof of Theorem 1

Assume that there exists a PPT attacker α who tries to perform an impersonation attack, man-in-the-middle attack, or password modification attack in the scheme of this paper. Choose the appropriate security model and assumptions, e.g., assume that attacker α cannot obtain the critical information of the user’s iris, smart card, and static passphrase.
Initialization: attacker α announces the goal of his attack, e.g., to impersonate a legitimate user for authentication or to tamper with messages during the authentication process.
Setup: The system is initialized according to the security parameters, and relevant keys and parameters are generated and distributed to legitimate users and entities. In this process, it is ensured that the generation and distribution of keys are secure and an adversary cannot obtain or tamper with these keys. The keys are generated using a secure key generation algorithm and distributed to the relevant entities over a secure channel. The system also stores and manages the keys properly to ensure their security.
Challenge: Attacker α launches an attack to try to impersonate a user, tamper with messages, or perform other malicious behavior. For example, attacker α attempts to intercept a communication message between a user and a healthcare service center and modify the authentication information in it to impersonate a legitimate user for authentication. Alternatively, an attempt is made to insert false messages or tamper with data in the smart card during the authentication process to interfere with the normal conduct of authentication. Suppose that in the authentication and key negotiation phase, the user inserts the smart card into the terminal device, obtains C i d , M A i , M B i , U R U R 1 , enters the username U i d i and key U p w i , generates the current timestamp T 6 , and sends T 6 , U R U R 1 to the healthcare service center. The attacker tries to intercept and modify this message to send it to the medical service center by tampering with it to become T 6 , U R U R 1 . The medical service center generates the current timestamp T 6 , verifies whether T 6 T 6 T is valid, calculates I U = h U R U R 1 M S C i d if the judgment is successful, searches for table entries in the database to obtain the corresponding T 3 , L i with I U as the index, checks whether T 6 T 3 is expired or not, verifies whether T 6 T 3 is expired or not, and verifies if the value of L i is “3” after passing. If it is “3”, it rejects the user request, and if the verification passes, then it temporarily stores U R U L , U A i , U B i , H R U R 2 and generates the current timestamp T 7 and sends T 7 , L i to the user. At this point, due to tampering by the attacker, the information obtained by the healthcare service center is incorrect, resulting in authentication failure or the incorrect authentication of the attacker.
Response: The system responds to and authenticates the behavior of attacker α according to the designed security protocol. During the authentication process, the system verifies the authentication factors using pre-stored user information and keys to ensure that the identification factors match the user’s identity. If an anomaly is detected, the system will reject the authentication request and take appropriate security measures, such as recording the attack behavior and issuing an alert.
If attacker α can successfully break through the security defense of the system, i.e., win the security challenge of the attack with a non-negligible advantage, then it means that there is a security vulnerability in the system. However, according to the scheme design, by combining the three-factor authentication with iris recognition, smart cards, and static passwords, as well as the re-authentication mechanism, it can effectively prevent impersonation attacks, man-in-the-middle attacks, password modification attacks, etc.
The uniqueness and difficulty in counterfeiting iris factors make it difficult for attackers to impersonate the iris characteristics of legitimate users. Iris recognition technology usually has high accuracy and security and can effectively distinguish the iris features of different users. The secure storage and encryption features of smart cards ensure that the data in the smart card cannot be easily stolen or tampered with. Smart cards can store important data such as users’ authentication information and keys and protect these data through encryption algorithms, which can only be decrypted and accessed by having the correct key. The encrypted transmission and verification of the static passphrase increases the difficulty for the adversary to obtain the static passphrase. The static passphrase is encrypted during transmission and is verified by comparing it with the hash value stored in the system to ensure the accuracy of the passphrase. In addition, the re-authentication mechanism further enhances the security of the system, guaranteeing that only legitimate users can pass the authentication. The re-authentication mechanism further ensures the legitimacy of the user’s identity by enforcing the re-authentication of untrustworthy users in the case of abnormal user dynamic trust evaluation.
Therefore, if attacker α can win the security challenge of the attack with a non-negligible advantage, then this contradicts the scheme design and security mechanism, thus proving that the scheme put forward in this paper can resist impersonation attacks, man-in-the-middle attacks, and password modification attacks.

4.2.2. Proof of Theorem 2

Assume that there exists an attacker β who tries to break the anonymity of the user. We will play a security game with attacker β . The prerequisite for winning the security game is that attacker β can successfully identify the real identity of the user.
Initialization: attacker β selects a target user and tries to obtain information related to that user.
Query: attacker β submits a query request to the system and tries to obtain the user’s identification information or other relevant data.
Challenge: The system responds to attacker β ’s query according to the security policy, providing only the necessary anonymized information to ensure that the user’s anonymity is protected. Assume that the system encrypts the user’s sensitive information using a cryptographic function E · , e.g., the user’s identifier I D is encrypted as E I D . At the same time, the system uses the anonymized identifier A I D instead of the user’s real identity information.
Guessing: Assume that the information obtained by attacker β includes the encrypted user’s sensitive information E I D and the anonymous identifier A I D . Attacker β tries to guess the user’s real identity I D based on this information.
If attacker β wins the game in the guessing phase with a non-negligible advantage and succeeds in identifying the user’s real identity, i.e., I D = I D , it implies that there is a vulnerability in the anonymity protection mechanism of the system. However, according to the design of our scheme, by using encryption and anonymization, the user’s identity information is effectively protected during the authentication process, and attacker β cannot accurately identify the user’s true identity even with the information they’ve obtained. Therefore, under the random prediction model, no attacker β can break the user anonymity of this paper’s scheme with a non-negligible advantage.

4.3. Security and Privacy Protection

In this section, we analyze the advantages of the proposed scheme from four different aspects (i.e., privacy protection, data availability and trustworthiness, confidentiality, and resilience).
Data availability and trustworthiness: In our proposed protocol, user authentication factors have dynamic attributes. First-time logged-in users need only a smart card and static password for convenience. For security, we use iris biometric authentication for secondary confirmation for high-risk users. Users with elevated risk may be accessing infrequently accessed resources, logging in and out too many times, have unstable data interactions with medical sensors, exhibit abnormal behavior or dangerous access, etc., resulting in a rapid decline in the user’s trust value, which can result in the downgrading of access privileges and the requirement of the re-authentication of the user’s identity. To link the dynamic trust evaluation to real-world applications and validate it, we integrate real-world data. Analyzing historical data from similar medical systems helps set trust thresholds. For example, we define “infrequent access” based on real-world resource access frequencies. All the stored data in this scheme are ciphertext data encrypted by the S M 3 hash function, and according to the unidirectional character of the S M 3 hash function, all the information can not be obtained by backpropagation. The final tripartite key K = h T 11 R U L 1 · R U L 2 · R U L 3 · P can only be calculated by the user, medical service center, and medical sensor. The blinded user and sensor IDs at the medical service center prevent attackers from correlating obtained information, balancing authentication usability and security. At the same time, when the user is identified as a high-risk user, the medical service center cancels the account and locks it. The user can re-register but not access previous info. Lost or stolen smart cards can be invalidated by re-registration. To address the single smart card security risk for authentication and data storage, we introduce a backup mechanism. In the case of a lost or compromised smart card, users can use a temporary code sent to their trusted mobile devices to access essential medical data. This scheme offers good usability and ensures secure access to information resources in emergencies.
Confidentiality: In the registration and authentication phase, the communication between the medical service center and the medical blockchain and between the user and the medical service center is securely encrypted. During the key generation process, the relevant information is subjected to hashing using the S M 3 algorithm to generate a high-strength encryption key. This ensures that the two communicating parties can share the key securely. When encrypting messages, by combining the hashing operation of S M 3 with other encryption algorithms, the encrypted messages become extremely difficult to crack during transmission, thus guaranteeing the confidentiality of the communication. In addition, user data and medical sensor data in the medical cloud database are encrypted and stored so that only users with the appropriate key can access and read the data, ensuring the confidentiality of data storage.
Resilience: Blockchain network resilience is vital for continuous telemedicine services. Any disruption to the blockchain network could potentially lead to serious consequences for patient care. The Fabric consortium blockchain employed in our system has several key features to safeguard against attacks and failures. First, our Fabric consortium blockchain offers key protections. Distributed ledger tech, with each block’s hash linked to the previous one, thwarts data manipulation. In telemedicine, any attempt to alter patient records will be revealed by hash changes, maintaining data integrity. Second, smart contracts enforce access control, detecting abnormal access patterns (e.g., signs of a DDoS attack) and blocking attackers while allowing legitimate use. Moreover, the network has multiple nodes. If a node fails (due to an attack or other reasons), others keep running as data are replicated, preventing a single point of failure. Requests are rerouted to healthy nodes for continuous service. For disasters, the medical service center regularly backs up blockchain data off-site. In the case of major security issues, the network can be restored from the backup. A hot standby mechanism for nodes reduces downtime when a node fails. These measures ensure network resilience, safeguarding against threats and enabling stable telemedicine, protecting patient data and system longevity.
Privacy protection: In this scheme, during key negotiation, the user, medical service center, and medical sensor generate random numbers. The final session key K is derived using the S M 3 hash function. A new session key is negotiated for each communication connection. Due to the unidirectional nature of S M 3 and its avalanche effect (slight input changes cause large hash value changes) and its resistance to hash collision attacks, attackers cannot backtrack to obtain information even if they obtain the current session key. In terms of attack resistance, so far, no serious collision attack vulnerabilities have been found in the S M 3 hash function. It can effectively resist common hash collision attacks, ensuring the security of tokens and credentials generated based on it, and further guaranteeing the reliability of user identity authentication and data privacy protection. To balance privacy and dynamic trust evaluation, we use a multi-tiered approach. We anonymize user data in trust evaluation, limit access to necessary information when a user’s risk level rises, and conduct iris-based re-authentication in a privacy-compliant manner. Second, the three-factor authentication scheme using iris recognition, smart cards, and static passwords increases the security of authentication and reduces the risk of user identity impersonation. To further protect user data during registration and authentication, we added additional security measures. Before registration, we use multi-step verification for identity authenticity. During authentication, we check user-provided info and data transmission channels in real time. Biometric info (like iris features) is encrypted during collection and transmission and used sparingly. Strict iris-based authentication for managers and untrustworthy users protects biometric privacy.

4.4. Functional Analysis

In this section, we will conduct performance test experiments on our proposed authentication scheme, and Table 3 shows the system environment in which we conduct the tests.
We analyze the security aspects of the scheme in this paper in comparison with those of An et al. [9], Chen et al. [14], Das et al. [15], Wu et al. [16], Challa et al. [17], Ali et al. [20], and Gupta et al. [21]. The comparison outcomes are shown in Table 4.
There is a difference between this paper’s scheme and An et al.’s scheme in terms of mutual authentication; An et al. and Challa et al.’s scheme cannot maintain mutual authentication, while this paper’s scheme has been improved and optimized in this aspect. In terms of password change, the schemes of An et al., Chen et al., and Ali et al. cannot maintain the security of password change, while the scheme in this paper solves this problem effectively. For user anonymity, the schemes of An et al., Das et al., Wu et al., and Challa et al. cannot maintain user anonymity, whereas the scheme in this paper ensures the protection of user anonymity by using encryption and anonymization. In terms of impersonation attacks, man-in-the-middle attacks, and password modification attacks, the schemes of An et al., Chen et al., Das et al., and Wu et al. have security concerns, whereas this paper’s scheme effectively defends against these attacks by combining three-factor authentication with iris recognition, smart cards, and static passphrases, as well as a re-authentication mechanism. In terms of parallel session attacks, the schemes of Chen et al., Challa et al., and Ali et al. are insecure, while this paper’s scheme enhances and prevents them. The schemes of Chen et al., Das et al., Wu et al., and Gupta et al. need to be revised in smart card/smart device theft attacks, whereas this paper’s scheme mitigates this risk through various security measures. In conclusion, compared to other schemes, this paper provides several functional features and is effective in preventing possible known attacks.

4.5. Performance Analysis

This part makes a comparison of the performance of the scheme put forward in this paper and that of other related schemes, such as those of An et al. [9], Chen et al. [14], Das et al. [15], Wu et al. [16], Challa et al. [17], Ali et al. [20], and Gupta et al. [21] based on the security and functional characteristics and computational and communication costs of message transmission in the login and authentication phases. This assessment enables us to have a clearer understanding of the superiority of the scheme in this paper compared to other schemes.

4.5.1. Comparison of Communication Costs

Table 5 presents a comparison of the communication overhead between our scheme and several related ones. For the purpose of comparing communication costs, the following assumptions are made: the bit lengths needed for identity, random numbers, timestamps, authentication (signatures via the Elliptic Curve Digital Signature Algorithm (ECDSA)), hash results (assuming SHA-1 as h · ), and Message Authentication Codes (MACs) are 64, 64, 64, 320, 160, and 160 bits, respectively. Additionally, to ensure adequate security, 1024 bit modes are employed for both the modulo power-taking and inversion operations in this comparative analysis.
Under these considerations, the An et al.’s scheme has a message count of three and a communication overhead of 864 bits; the Chen et al.’s scheme has a message count of two and a communication overhead of 736 bits; the Das et al.’s scheme has a message count of three and a communication overhead of 1280 bits; the Wu et al.’s scheme has a message count of six and a communication overhead of 1152 bits; the Challa et al.’s scheme has a message count of three and a communication overhead of 1984 bits; the Ali et al.’s scheme has a message count of three and a communication overhead of 1400 bits; the Gupta et al.’s scheme has a message count of seven and a communication overhead of 2144 bits; and the scheme of this paper has a message count of three and a communication overhead of 712 bits. Comparing all these overheads, the communication overhead of this paper’s scheme turns out to be the most favorable. Our scheme is able to efficiently withstand a variety of attacks, guarantee the security of user information, and supply more comprehensive functions to satisfy the demands of telemedicine.

4.5.2. Comparison of Calculation Costs

In our computational cost analysis, performance metrics are taken into account, as presented in Table 6.
Table 7 further conducts a comparative analysis of the computational cost during the login and authentication phases, verifying the superiority of our scheme over others. Based on the experimental findings in Table 7, the computational time demanded by our scheme, along with those of An et al., Chen et al., Das et al., Wu et al., Challa et al., Ali et al., and Gupta et al. are 0.0048 s, 0.00584 s, 0.09542 s, 0.01024 s, 0.07448 s, 0.01902 s, and 0.01870 s, respectively. It is evident from Table 7 that while our scheme incurs slightly more computational cost compared to An et al.’s, the latter offers relatively rudimentary security functions. For example, it is weak in resisting certain specific attacks (such as impersonation attacks, man-in-the-middle attacks, etc.) or ensuring user anonymity and password change security. In contrast, our proposed scheme is reasonable since it provides additional functional features and better security than the other schemes (see Table 4).

5. System Evaluation

5.1. Test Environment

In this section, based on authoritative standards including international and national standards, this paper conducts experimental tests on the proposed solution. It performs a performance test on the blockchain system employed in the solution to determine whether the system performance meets the requirements. The testing software used is Hyperledger Caliper 0.5.0, and the test environment is presented in Table 8.

5.2. Test Basis

In this section, referring to relevant blockchain benchmark documents, the performance test indicators of the blockchain are sorted out, as shown in Table 9. The benchmark documents referred to are as follows:
  • Hyperledger Blockchain Performance Metrics [27].
  • Information security technology–security framework for blockchain technology [28].

5.3. Results and Analysis

Hyperledger Caliper serves as a benchmark framework for blockchain performance. It produces test reports in the format of HTML documents and currently has the capacity to evaluate performance metrics like the success rate and resource consumption. In a high-concurrency and high-load environment, we utilize Caliper to assess the performance of our blockchain system. The specific functions under test are the chaincode function “invoke” for uploading data to the ledger and the chaincode function “query” for querying the ledger. During the testing process, we monitor in real time the number of transactions received per second and the number of transactions processed per second by the blockchain system. We then regulate the sending pressure to ensure that these two values are approximately the same, thereby pushing the pressure to reach the system’s bottleneck. Subsequently, by increasing the frequency of transaction requests, the number of transactions received per second by the system becomes significantly higher than the system’s transaction throughput. This causes the system to operate under extreme conditions, which is precisely the objective of the spike test.
The test statistics are shown in Table 10.
For the invoke smart contract, three tests were conducted in this section, with 1000 transactions sent in each test. Regarding the query smart contract, two tests were carried out, and 5000 transactions were sent in each test. As a result, the total number of transactions sent was 13,000, with 3000 for function calls (from the invoke contract tests) and 10,000 for queries (from the query contract tests). As can be seen from Table 10, the number of successful transactions for queries is equal to the total number of transactions they sent. Therefore, the count of failed transactions is 0. The test results show that all performance indicators meet the requirements and the baseline.

6. Conclusions

In the field of telemedicine, with the continuous evolution of the service model, the convenience of obtaining medical services remotely also causes problems such as complex user access authentication, easy leakage of user privacy, and a lack of comprehensive consideration of access control. In this regard, this paper proposes an identity management scheme based on multi-factor authentication and dynamic trust evaluation for telemedicine. The scheme adopts a three-factor authentication method combining iris recognition, smart cards, and static passwords, and incorporates a dynamic trust evaluation mechanism based on behavioral analysis to achieve accurate authentication and dynamic trust evaluation of user identity. The security analysis ensures the solution can effectively defend against some common security threats. In addition, it protects users’ anonymity and private information from leakage through encryption technology and anonymization. The experimental findings indicate that our scheme holds performance superiority compared to the existing authentication protocols. System evaluation based on authoritative standards was conducted, and the results demonstrated that all performance indicators of the proposed scheme met the requirements and baseline, further validating the feasibility and reliability of this scheme in practical applications. The dynamic trust evaluation mechanism employs decision trees or neural network algorithms to accurately classify and dynamically adjust user trust levels based on key indicators such as the malicious attack rate, attempted privilege escalation rate, abnormal login system rate, and duration of service access. In the identity authentication process, iris recognition devices, smart cards, and static passwords work in close coordination under the efficient management of the software system, ensuring the accuracy and efficiency of the authentication process. At present, due to the lack of sufficient actual data to test, this paper lacks sufficiently fine-grained access control for the actual accesses carried out by users, and further research is still needed to optimize and improve this scheme in the future. The next steps are as follows:
  • Upgrade with advanced biometric algorithms or smart card encryption technologies to optimize the authentication process, shorten the authentication time, reduce user operation steps, enhance the efficiency of telemedicine identity authentication, and improve the user experience;
  • Expand dynamic trust evaluation indicators, analyze user behavior in depth, and enhance the adaptability of the dynamic trust evaluation model to achieve a more accurate and comprehensive risk assessment.

Author Contributions

Conceptualization, Y.W.; methodology, Y.W.; software, M.P. and Q.Y.; validation, W.O.; formal analysis, J.M. and W.H.; investigation, Y.W.; resources, J.M.; data curation, J.M.; writing—original draft preparation, Y.W. and M.P.; writing—review and editing, W.O. and Q.Y.; visualization, M.P.; supervision, Y.W.; project administration, Y.W.; funding acquisition, J.M. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Joint Funds of National Natural Science Foundation of China (grant no. U23A20304), the Fund of Laboratory for Advanced Computing and Intelligence Engineering (no. 2023-LYJJ-01-033), the Special Funds of Jiangsu Province Science and Technology Plan (Key R&D Program Industry Outlook and Core Technologies) (no. BE2023005-4), and the Science Project of Hainan University (KYQD(ZR)-21075).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data related to this study are available and can be obtained by contact ing the corresponding author.

Conflicts of Interest

Author Wei Ou is employed by the company Jiangsu Variable Supercomputer Technology Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Shreya, S.; Chatterjee, K.; Singh, A. A Smart Secure Healthcare Monitoring System with Internet of Medical Things. Comput. Electr. Eng. 2022, 101, 107969. [Google Scholar] [CrossRef]
  2. Azeez, N.A.; Van der Vyver, C. Security and Privacy Issues in e—Health Cloud—Based System: A Comprehensive Content Analysis. Egypt Inform. J. 2019, 20, 97–108. [Google Scholar] [CrossRef]
  3. Soni, P.; Pal, A.K.; Islam, S.K.H. An Improved Three—Factor Authentication Scheme for Patient Monitoring Using WSN in Remote Health—Care System. Comput. Methods Programs Biomed. 2019, 182, 105054. [Google Scholar] [CrossRef] [PubMed]
  4. Minaee, S.; Abdolrashidiy, A.; Wang, Y. An Experimental Study of Deep Convolutional Features for Iris Recognition. In Proceedings of the 2016 IEEE Signal Processing in Medicine and Biology Symposium (SPMB), Philadelphia, PA, USA, 3 December 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–6. [Google Scholar]
  5. Li, X.; Niu, J.; Khan, M.K.; Liao, J. An Enhanced Smart Card Based Remote User Password Authentication Scheme. J. Netw. Comput. Appl. 2013, 36, 1365–1371. [Google Scholar] [CrossRef]
  6. Tian, L.-Q.; Lin, C.; Ni, Y. Evaluation of User Behavior Trust in Cloud Computing. In Proceedings of the 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), Taiyuan, China, 22–24 October 2010; IEEE: Piscataway, NJ, USA, 2010; Volume 7, pp. V7-567–V7-572. [Google Scholar]
  7. Tu, Z.; Zhou, H.; Li, K.; Song, H.; Yang, Y. A Blockchain—Based Trust and Reputation Model with Dynamic Evaluation Mechanism for IoT. Comput. Netw. 2022, 218, 109404. [Google Scholar] [CrossRef]
  8. Das, A.K. Analysis and Improvement on an Efficient Biometric—Based Remote User Authentication Scheme Using Smart Cards. IET Inf. Secur. 2011, 5, 145–151. [Google Scholar] [CrossRef]
  9. An, Y. Security Analysis and Enhancements of an Effective Biometric—Based Remote User Authentication Scheme Using Smart Cards. BioMed Res. Int. 2012, 2012, 519723. [Google Scholar] [CrossRef]
  10. Wu, Z.-Y.; Lee, Y.-C.; Lai, F.; Lee, H.-C.; Chung, Y. A Secure Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 2012, 36, 1529–1535. [Google Scholar] [CrossRef]
  11. He, D.; Chen, J.; Zhang, R. A More Secure Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 2012, 36, 1989–1995. [Google Scholar]
  12. Sood, S.K.; Sarje, A.K.; Singh, K. A Secure Dynamic Identity Based Authentication Protocol for Multi—Server Architecture. J. Netw. Comput. Appl. 2011, 34, 609–618. [Google Scholar] [CrossRef]
  13. Song, R. Advanced Smart Card Based Password Authentication Protocol. Comput. Stand. Interfaces 2010, 32, 321–325. [Google Scholar]
  14. Chen, B.-L.; Kuo, W.-C.; Wuu, L.-C. Robust Smart—Card—Based Remote User Password Authentication Scheme. Int. J. Commun. Syst. 2014, 27, 377–389. [Google Scholar]
  15. Das, A.K.; Goswami, A. A Robust Anonymous Biometric—Based Remote User Authentication Scheme Using Smart Cards. J. King Saud Univ.-Comput. Inf. Sci. 2015, 27, 193–210. [Google Scholar]
  16. Wu, F.; Li, X.; Sangaiah, A.K.; Xu, L.; Kumari, S.; Wu, L.; Shen, J. A Lightweight and Robust Two—Factor Authentication Scheme for Personalized Healthcare Systems Using Wireless Medical Sensor Networks. Future Gener. Comput. Syst. 2018, 82, 727–737. [Google Scholar]
  17. Challa, S.; Das, A.K.; Odelu, V.; Kumar, N.; Kumari, S.; Khan, M.K.; Vasilakos, A.V. An Efficient ECC—Based Provably Secure Three—Factor User Authentication and Key Agreement Protocol for Wireless Healthcare Sensor Networks. Comput. Electr. Eng. 2018, 69, 534–554. [Google Scholar]
  18. Barman, S.; Shum, H.P.H.; Chattopadhyay, S.; Samanta, D. A Secure Authentication Protocol for Multi—Server—Based e—Healthcare Using a Fuzzy Commitment Scheme. IEEE Access 2019, 7, 12557–12574. [Google Scholar]
  19. Ali, Z.; Hussain, S.; Rehman, R.H.U.; Munshi, A.; Liaqat, M.; Kumar, N.; Chaudhry, S.A. ITSSAKA—MS: An Improved Three—Factor Symmetric—Key Based Secure AKA Scheme for Multi—Server Environments. IEEE Access 2020, 8, 107993–108003. [Google Scholar]
  20. Gupta, B.B.; Prajapati, V.; Nedjah, N.; Vijayakumar, P.; El-Latif, A.A.A.; Chang, X. Machine learning and smart card based two-factor authentication scheme for preserving anonymity in telecare medical information system (TMIS). Neural Comput. Appl. 2023, 35, 5055–5080. [Google Scholar]
  21. Rao, P.M.; Deebak, B.D. Lightweight two-factor authentication framework with privacy preserving for smart eHealth. Peer- Netw. Appl. 2024, 17, 373–396. [Google Scholar]
  22. Qu, J. Blockchain in inform informatics. J. Ind. Integr. Integr. 2022, 25, 100258. [Google Scholar]
  23. Kandhro, I.A.; Alanazi, S.M.; Ali, F.; Kehar, A.; Fatima, K.; Uddin, M.; Karuppayah, S. Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures. IEEE Access 2023, 11, 9136–9148. [Google Scholar]
  24. Hu, Q.; Tang, B.; Lin, D. Anomalous User Activity Detection in Enterprise Multi—Source Logs. In Proceedings of the 2017 IEEE International Conference on Data Mining Workshops (ICDMW), New Orleans, LA, USA, 18–21 November 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 797–803. [Google Scholar]
  25. Papadopouli, M.; Shen, H.; Spanakis, M. Characterizing the Duration and Association Patterns of Wireless Access in a Campus. In Proceedings of the 11th European Wireless Conference 2005—Next Generation wireless and Mobile Communications and Services, Nicosia, Cyprus, 10–13 April 2005; VDE: Berlin, Germany, 2005; pp. 1–7. [Google Scholar]
  26. Shen, C.; Zhang, Y.; Guan, X.; Maxion, R.A. Performance analysis of touch-interaction behavior for active smartphone authentication. IEEE Trans. Inf. Forensics Secur. 2015, 11, 498–513. [Google Scholar]
  27. Hyperledger Performance and Scale Working Group. Hyperledger Blockchain Performance Metrics [White Paper]. 2018. Available online: https://www.lfdecentralizedtrust.org/learn/publications/blockchain-performance-metrics (accessed on 1 February 2025).
  28. GB/T 42570; 2023 Information Security Technology—Security Framework for Blockchain Technology. Standardization Administration of China: Beijing, China, 2023.
Figure 1. Overall architecture.
Figure 1. Overall architecture.
Sensors 25 02118 g001
Figure 2. The flowchart of the patient authentication phase.
Figure 2. The flowchart of the patient authentication phase.
Sensors 25 02118 g002
Figure 3. The flowchart of the patient re-authentication.
Figure 3. The flowchart of the patient re-authentication.
Sensors 25 02118 g003
Table 1. Notations and cryptographic functions.
Table 1. Notations and cryptographic functions.
SymbolsDescription
U i User i
U i d i U i ’s account
U p w i Login key for i
U p w i Iris characteristics of i
h · Hash function
⊕, ∥Bitwise XOR and concatenation operations, respectively
G e n ( · ) Probabilistic generation in fuzzy extractor
R e p ( · ) Deterministic reproduction procedures in fuzzy extractor
σ i τ i Biometric secret key and public reproduction parameter, respectively
T Maximum transmission delay
L i User authentication factor policies regularly updated from healthcare cloud servers
S K Common session key
Table 2. Classification of trust levels.
Table 2. Classification of trust levels.
Trust LevelTrust IntervalCharacter SetAuthentication Methods
Untrustworthy[0,30]High-risk userDenial of login
Basic trustworthy[30,60]Medium-risk usersRe-authenticate
General trustworthy[60,80]Regular userSmart card authentication method
High trustworthy[80,100]Low-risk userAny authentication method
Table 3. System environment.
Table 3. System environment.
ItemParameter
Operating systemWindows 10 64 bit
Processing unit15 vCPU Intel(R) Xeon(R) Platinum
8338C CPU @ 2.60 GHz
Random access memory (RAM)80 GB
GPURTX 3090(24 GB)
Hard disk capacity75 GB
Experimental platformsPycharm 2024.1.1
Table 4. Security function analysis.
Table 4. Security function analysis.
Security AttributeAn et al. [9]Chen et al. [14]Das et al. [15]Wu et al. [16]Challa et al. [17]Ali et al. [20]Gupta et al. [21]Ours
Mutual authentication××
Key agreement××
Password change×××
User anonymity××××
Attack by impersonation×××
Man-in-the-middle attack××
Password change attack××××
Parallel session attack××××
Smart card/smart device theft attacks××××
Table 5. Communication overhead during the login and authentication phase.
Table 5. Communication overhead during the login and authentication phase.
SchemeNumber of MessagesCommunication Overhead (bit)
An3864
Chen2736
Das31280
Wu61152
Challa31984
Ali31400
Gupta72144
ours3712
Table 6. Approximate time required for various operations.
Table 6. Approximate time required for various operations.
Operational Time Costs
T m u l : time for modulo multiplication0.00088 s
T e : execution time of Elliptic Curve dot product operations0.0171 s
T h : execution time of the hash function0.00032 s
T f e : function execution time of the fuzzy extractor0.0171 s
Table 7. Comparison of calculated costs.
Table 7. Comparison of calculated costs.
SchemeCostTime (s)
An15 T h 0.00480
Chen10 T h + 3 T m u l 0.00584
Das31 T h + 4 T e + T f e 0.09542
Wu32 T h 0.01024
Challa19 T h + 3 T e + T f e 0.07448
Ali6 T h + T e + T f e 0.01902
Gupta7 T h + T e 0.01870
Ours9 T h + 3 T m u l 0.00552
Table 8. Test environment.
Table 8. Test environment.
ItemServer-Side EnvironmentClient-Side Environment
Hard disk1TB SSD drive512G SSD hard drive
Bandwidth200 Mbps200 Mbps
Operation systemUbuntu 20.04 LTSWindows 10 64 bit
Blockchain systemHyperledger Fabric 2.4.9N/A
Table 9. Blockchain performance metrics.
Table 9. Blockchain performance metrics.
Rule ItemRequirement
Transaction latencyTPS a and TRS b should be approximately equal.
Transaction throughputThe system should operate under high load without crashing.
Performance indicatorThe average response time should be less than 0.5 s, with a transaction success rate higher than 95% and TPS higher than 200.
Spike testingTRS should be significantly higher than TPS, with a transaction success rate higher than 80%.
a “Transactions processed per second” is the abbreviation for TPS. b “Transactions received per second” is the abbreviation for TRS.
Table 10. Test statistics.
Table 10. Test statistics.
Performance IndicatorInvoke FunctionQuery Function
Transaction success number (pens)300010,000
Transaction sending rate341359
Transaction throughput203347
Maximum transaction latency (s)5.034.21
Minimum transaction Latency (s)1.260.01
Average transaction Latency (s)2.981.03
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wu, Y.; Pang, M.; Ma, J.; Ou, W.; Yue, Q.; Han, W. An Identity Management Scheme Based on Multi-Factor Authentication and Dynamic Trust Evaluation for Telemedicine. Sensors 2025, 25, 2118. https://doi.org/10.3390/s25072118

AMA Style

Wu Y, Pang M, Ma J, Ou W, Yue Q, Han W. An Identity Management Scheme Based on Multi-Factor Authentication and Dynamic Trust Evaluation for Telemedicine. Sensors. 2025; 25(7):2118. https://doi.org/10.3390/s25072118

Chicago/Turabian Style

Wu, Yishan, Mengxue Pang, Jianqiang Ma, Wei Ou, Qiuling Yue, and Wenbao Han. 2025. "An Identity Management Scheme Based on Multi-Factor Authentication and Dynamic Trust Evaluation for Telemedicine" Sensors 25, no. 7: 2118. https://doi.org/10.3390/s25072118

APA Style

Wu, Y., Pang, M., Ma, J., Ou, W., Yue, Q., & Han, W. (2025). An Identity Management Scheme Based on Multi-Factor Authentication and Dynamic Trust Evaluation for Telemedicine. Sensors, 25(7), 2118. https://doi.org/10.3390/s25072118

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop