A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems †
Abstract
:1. Introduction
- We demonstrate that Sharma and Kalra’s scheme [6] has a serious design error: mutual authentication between a practitioner and a sensor cannot be ensured in their original protocol.
- We confirm that Adavoudi-Jolfaei et al.’s scheme [11] and Sharma and Kalra’s scheme have a severe vulnerability. We find that Adavoudi-Jolfaei et al.’s scheme [11] is vulnerable to user impersonation attack and session key attack. We also find that Sharma and Kalra’s scheme [6] is vulnerable to password guessing attack, stealing the session key and sensor impersonation attack.
- We propose a scheme for smart healthcare systems. Our new scheme resists privileged insider attack, outsider attack, offline ID guessing attack, online id guessing attack, session key disclosure attack, practitioner impersonation attack, and sensor impersonation attack. We provide security proofs.
- We formally verify the security of the new protocol using ProVerif, an automatic cryptographic protocol verifier.
2. Related Work
3. Preliminaries
3.1. Hash Function
- Preimage-resistance It is computationally impossible to use the output of any hash value to find the input that results in this value, i.e., to find any preimage such that when given any b for which a corresponding input is not known.
- 2nd-preimage-resistance For any input, when there is an output for the hash function, it is computationally impossible to find another input value with this output, i.e., to find a 2nd-preimage such that .
- Collision resistance It is computationally infeasible to find two different inputs with the same hashing result, i.e., any two distinct inputs a, , which hash to the same output, such that .
3.2. Fuzzy Extractor
3.3. Threat Model
- An attacker can steal a smart device with the user’s identity.
- An attacker can eavesdrop on a public channel. An attacker can steal the message between the user and the gateway node or between the gateway node and the sensor node.
- An attacker can extract the information stored in the smart device as a side-channel attack.
4. Review of Target Protocols
4.1. Review of Adavoudi-Jolfaei et al.’s Protocol
4.1.1. Registration Phase
- User U chooses his/her identity and sends the registration request and personal credential to the gateway node in the secure channel.
- The gateway node generates a random number , a unique random number used to identify a particular access group , a random number user access privilege mask and random sequence number . Then, the created variables are grouped as , , , , , . After obtaining the registration request from user U, calculates as follows:()(), ,(), ,, ,()()()()()() using its secret key w.The data are saved (, ), , , , , in . sends , (, ), , , h to user U in .
- After user U takes from the , chooses his/her , password , imprints the biometric and then computes as follows:,((h ( ( ())(h )(h ), (h )Moreover, save the data , , (, ), , , , (, (, h ( in .
4.1.2. Login Phase
- U inserts the smart card and enters , and . The smart card computes (, , and checks the condition . If it holds, the smart card ensures that the user successfully passes the verification process. Otherwise, this phase terminates immediately.
- After successful verification, user U generates random number and the system computes as follows:(h ( ( ((If there is a loss of synchronization, user U selects one of the unused pair of (, ) from (, ) and surrenders his/her , , and computes , , and .
- U sends the login request messages , , , , , to .
4.1.3. Authentication Phase
- After receiving the login request messages from user U, first checks the validity of the transaction sequence number . computes as follows:(() that and are in .Then, calculates , and checks if and are valid. If the verification of is successful, then calculation continues. Otherwise, terminates the session. generates a session key and time stamp T and calculates as follows:, andFinally, sends the messages , , , T, to the sensor node .
- Upon receiving the message , assess the validity of T. If it is not valid, disconnects the session. If it is valid, also verifies . If this condition is not satisfied, disconnects the session. If it is satisfied, computes as follows:and generates a new time stamp .,andFinally, transmits , , to .
- The gateway node checks that the time stamp and . If not, it terminates the connection. generates a random number and calculates as follows:)updates and . If cannot find in , generates a random number and calculates . Then, updates and then sends the messages , , , to the user U.
- When user U obtains the message , the protocol checks its validity. If there is no abnormality, the system proceeds to the next step or ends the session. Furthermore, U computes , , and then updates and .
- U and have successfully shared . responds to user U’s query according to stored for user U using session key . Finally, at the end of this phase, removes from storage for security reasons.
4.1.4. Password and Biometrics Change Phase
- U puts his/her smart card into the terminal and inserts , previous password and previous biometric . U then inputs the new password and new biometric .
- The smart card computes , and retrieves , , , G and . The smart card continues to compute as follows:
- The smart card computes , , , , and , as shown below.,
- Finally, the smart card replaces with , with , with , with , with and with .
4.2. Review of Sharma and Kalra’s scheme
- Setup Phase: The registration center sets up the parameters.
- Registration Phase: The practitioner registers with his/her identity and password.
- Login Phase: The practitioner logs in with his/her identity, password and smart device.
- Authentication Phase: The practitioner and sensor node mutually authenticate.
- Password Change Phase: The practitioner inputs identity, password and smart device, and changes his/her old password to the new password.
4.2.1. Setup Phase
4.2.2. Registration Phase
- Practitioner P chooses his/her and and generates random number R, computes the masked password . Finally, he/she sends the registration message , to the gateway node .
- After the gateway node receives the message from the practitioner, it computes variables , , and . After calculation, sends the smart device , c, to P.
- P stores , c, d, in .
4.2.3. Login Phase
- P inputs his/her identity and password in his/her smart device.
- computes , and compares a to . If the two are not the same, P fails to login.
4.2.4. Authentication Phase
- If P successfully logs in, computes , , . selects a random nonce N, and calculates , . Finally, posts the message , , , , to .
- checks that the timestamp . means maximum transmission delay. If it is in range, chooses a random nonce M and computes:Finally, sends the message , , , , , , , to the sensor node .
- checks the validity of . If it is valid, continues as follows:,,,Finally, posts the message , , , , to .
- checks the timestamp , and if it is valid, computes as follows:At the end of the computation, sends the message , , , , to P.
- P checks the timestamp . If it is in range, P computes . It also computes , and .
4.2.5. Password Change Phase
- P inputs his/her and to .
- computes , . verifies that : if so, it computes , . Finally, sends the message to P.
- P inputs his/her new password to .
- computes , , , . Finally, replaces , c, with , , .
5. Analysis of Target Schemes
5.1. Analysis of Adavoudi-Jolfaei et al.’s Scheme
5.1.1. Loss of Smart Card Information
Insider Attack
Loss of Synchronization
- An attacker steals U’s smart card , which contains sensitive information , , (, ), , , , (, (, h (.
- In the loss of synchronization case, can thus see the user’s login message , , , , , . computes as follows:
5.1.2. User Impersonation Attack
- generates random numbers and computes:, , and from and obtained from the stolen smart card attack.
- transmits the login request , , , , , to the gateway node .
- After obtains the login request from , first, it verifies and calculates:(()checks if and is valid. does not detect the presence of the attacker. Unfortunately, still believes it is in communication with U.
5.1.3. Session Key Attack
- Assume that attacker can access the database (, ), , , , , . He/she will use the data .
- Attacker extracts the message , , , T, and calculates:Thus, attacker has successfully seized the session key .
5.2. Analysis of Sharma and Kalra’s Scheme
5.2.1. Design Error in Sharma and Kalra’s Scheme
- If P logs in successfully, computes , , . selects a random nonce N and calculates , . Finally, posts the message , , , , to .
- checks the timestamp . If it is in range, computes and chooses a random nonce M. continues to calculate and . Finally, sends the message , , , , , , , to the sensor node .
- checks the validity of . If it is valid, continues the operation and checks that . keep calculating as follows:Finally, sends the message , , , , to .
- checks the timestamp and if it is valid, computes as follows:At the end of the computation, sends the message , , , , to P.
- P checks the timestamp . If it is in range, it computes . It also computes , and .
5.2.2. Password Guessing Attack
- Attacker extracts a and R from P’s smart device .
- compares a and , so that he/she can guess the password in a brute force attack.
5.2.3. Stealing the Session Key
- computes , .
- steals the message and extracts , . Then, he/she calculates .
- also steals and in and computes .
- Finally, he/she finds the session key .
5.2.4. Sensor Impersonation Attack
6. Proposed Scheme
Algorithm 1 Proposed Scheme (Overall Algorithm Flow) |
|
6.1. Setup and Registration Phase
6.1.1. Setup Phase
6.1.2. Registration Phase
- Practitioner P chooses his/her identity , password and imprints over a device for biometrics collection, and calculates a biometric information of the practitioner P like (, . He/she generates random number R and computes the masked password . Finally, he/she sends the registration message , to the gateway node .
- After the gateway node obtains the message from the practitioner, it computes as follows:,After calculation, sends the smart device , c, to the practitioner P.
- P stores , c, d, R, , , , in the smart device .
Algorithm 2 Proposed Scheme (Registration Phase) |
|
6.2. Login and Authentication Phase
6.2.1. Login Phase
- P inputs his/her identity , password and biometric information in his/her smart device.
- The smart device executes the biometric information = (, ). computes masked password and the value a as follows:If a and are not the same, P fails to login.
Algorithm 3 Proposed Scheme (Login Phase) |
|
6.2.2. Authentication Phase
- If P logs in successfully, selects a random nonce N and computes as follows:Finally, sends the message , , , , to .
- checks the timestamp . If it is in range, computes as follows:also checks . If it is valid, chooses a random nonce M and computes as follows:Finally, sends the message , , , , , , , to the sensor node .
- checks the validity of . If it is valid, continues the operation and checks . computes as follows:It also checks the validity of . If it is valid, computes:,,Finally, sends the message , , , to .
- checks the timestamp and if it is valid, computes:and checks . If it is also valid, computes:At the end of the computation, sends the message , , , , to P.
- P checks the timestamp . If it is in range, P computes and checks . P also computes , and checks .
Algorithm 4 Proposed Scheme (P’s Authentication Phase) |
|
Algorithm 5 Proposed Scheme (GWN’s Authentication Phase) |
|
Algorithm 6 Proposed Scheme (SN’s Authentication Phase) |
|
6.3. Password Change Phase
- P inputs his/her identity , password and biometric information in his/her smart device.
- The smart device executes (, ) = . computes , . checks . If so, it computes , . Finally, sends the message to P.
- P inputs his/her new password to the smart device .
- computes , , , . Finally, replaces , c, with , , .
7. Security Analysis
7.1. Formal Security Analysis
- RESULT inj-event(EVENTA) ==> inj-event(EVENTB) is true.
- RESULT inj-event(EVENTA) ==> inj-event(EVENTB) is false.
- RESULT not attacker(QUERY) is true.
- RESULT not attacker(QUERY) is false.
7.2. Informal Security Analysis
7.2.1. Privileged Insider Attack
7.2.2. Outsider Attack
7.2.3. Offline ID Guessing Attack
7.2.4. Online ID Guessing Attack
7.2.5. Session Key Disclosure Attack
7.2.6. Practitioner Impersonation Attack
7.2.7. Sensor Impersonation Attack
8. Performance Analysis of the Proposed Scheme
9. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
Appendix A. ProVerif Code
(*—-channels—-*) |
free cha:channel [private]. |
free chb:channel. |
free chc:channel. |
(*—-constants—-*) |
free Ru:bitstring [private]. |
free IDp:bitstring [private]. |
free IDg:bitstring [private]. |
free IDs:bitstring. |
free PWu:bitstring [private]. |
(*—-secret key—-*) |
free K:bitstring [private]. |
(*—-functions—-*) |
fun concat(bitstring, bitstring): bitstring. |
fun xor(bitstring, bitstring): bitstring. |
fun h(bitstring): bitstring. |
equation forall a:bitstring, b:bitstring; xor(xor(a, b), b) = a. |
(*—-events—-*) |
event beginP(bitstring). |
event endP(bitstring). |
event beginGWN(bitstring). |
event endGWN(bitstring). |
event beginS(bitstring). |
event endS(bitstring). |
(*—-P process—-*) |
let P = |
new R:bitstring; |
let MPW = h(concat(h(concat(PWp, R)), Rp)) in |
out(cha,(IDp, MPW)); |
in(cha,(Xa:bitstring, Xc:bitstring, Xd:bitstring)); |
event beginP(IDp); |
new T1:bitstring; |
new N:bitstring; |
let ppb = xor(Xd, h(concat(MPW, Xa))) in |
let hK = xor(Xc, h(concat(MPW, ppb))) in |
let V1 = xor(IDp, h(concat(hK, T1))) in |
let V2 = xor(N, h(concat(ppb, T1))) in |
let V3 = h(concat(concat(V1, V2), concat(N, T1))) in |
out(chb, (V1, V2, V3, T1, N)); |
in(chb, (XXV6:bitstring, XXV8:bitstring, XV11:bitstring, XXT3:bitstring, XT4:bitstring)); |
let pV8 = h(concat(concat(XXV6, ppb), XXT3)) in |
let pM = xor(XXV6, h(concat(ppb, XXT3))) in |
let SKp = h(xor(N, pM)) in |
let pV11 = h(concat(concat(SKp, XXV6), concat(concat(XXV8, XXT3),XT4))) in |
event endP(IDp). |
(*—-GWN process—-*) |
let GWN = |
in(cha,(XIDp:bitstring, XMPW:bitstring)); |
let a = h(concat(XMPW, XIDp)) in |
let b = h(concat(XIDp, K)) in |
let c = xor(h(K), h(concat(XMPW, b))) in |
let d = xor(b, h(concat(XMPW, a))) in |
out(cha, (a, c, d)); |
in(chb, (XV1:bitstring, XV2:bitstring, XV3:bitstring, XT1:bitstring, XN:bitstring)); |
event beginGWN(IDg); |
new T2:bitstring; |
new M:bitstring; |
let pIDp = xor(XV1, h(concat(h(K), XT1))) in |
let pV3 = h(concat(concat(XV1, XV2), concat(XN, XT1))) in |
if pV3 = XV3 then |
let MID = xor(IDs, h(concat(h(K), T2))) in |
let X = h(concat(IDs, K)) in |
let V4 = xor(M, h(concat(concat(X, XT1), T2))) in |
let V5 = h(concat(concat(IDs, V4), concat(concat(XT1, T2), M))) in |
out(chc, (XV1, XV2, XV3, V4, V5, XT1, T2, MID)); |
in(chc, (XV6:bitstring, XV7:bitstring, XV10:bitstring, XT3:bitstring)); |
new T4:bitstring; |
new M:bitstring; |
let pV8 = h(concat(XV6, concat(b, XT3))) in |
let pV9 = h(concat(XV7, concat(X, XT3))) in |
let pV10 = h(concat(pV8, concat(pV9, XT3))) in |
if pV10 = XV10 then |
let pN = xor(XV7, h(concat(X, XT3))) in |
let SKg = h(xor(pN, M)) in |
let V11 = h(concat(SKg, concat(concat(XV6, pV8), concat(XT3, T4)))) in |
out(chb, (XV6, pV8, V11, XT3, T4)); |
event endGWN(IDg). |
(*—-S process—-*) |
let S = |
in(chc, (XXV1:bitstring, XXV2:bitstring, XXV3:bitstring, XV4:bitstring, XV5:bitstring, |
XXT1:bitstring, XT2:bitstring, XMID:bitstring)); |
event beginS(IDs); |
new T3:bitstring; |
let XX = h(concat(IDs, K)) in |
let pM = xor(XV4, h(concat(concat(XX, XXT1), XT2))) in |
let pV5 = h(concat(concat(IDs, XV4), concat(concat(XXT1, XT2), pM))) in |
if pV5 = XV5 then |
let pb = h(concat(IDp, K)) in |
let ppN = xor(XXV2, h(concat(pb, XXT1))) in |
let V6 = xor(pM, h(concat(pb, T3))) in |
let V7 = xor(ppN, h(concat(XX, T3))) in |
let V8 = h(concat(concat(V6, pb), T3)) in |
let V9 = h(concat(concat(V7, XX), T3)) in |
let V10 = h(concat(concat(V8, V9), T3)) in |
out(chc, (V6, V7, V10, T3)); |
event endS(IDs). |
References
- Gregg, M. Trends in Remote Patient Monitoring 2019. Spyglass Consulting Group. Available online: http://www.spyglass-consulting.com/wp_RPM_2019.html (accessed on 12 December 2020).
- Hu, Y.H.; Tompkins, W.J.; Urrusti, J.L.; Afonso, V.X. Applications of artificial neural networks for ECG signal detection and classification. J. Electrocardiol. 1993, 26, 66–73. [Google Scholar] [PubMed]
- Yeh, Y.C.; Wang, W.J. QRS complexes detection for ECG signal: The Difference Operation Method. Comput. Methods Programs Biomed. 2008, 91, 245–254. [Google Scholar] [CrossRef] [PubMed]
- Van Ess, D.W. ECG Signal Detection Device. US Patent 7,092,750, 15 August 2006. [Google Scholar]
- Chung, W.Y.; Lee, Y.D.; Jung, S.J. A wireless sensor network compatible wearable u-healthcare monitoring system using integrated ECG, accelerometer and SpO2. In Proceedings of the 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Vancouver, BC, Canada, 20–25 August 2008; pp. 1529–1532. [Google Scholar]
- Sharma, G.; Kalra, S. A Lightweight User Authentication Scheme for Cloud-IoT Based Healthcare Services. Iran. J. Sci. Technol. Trans. Electr. Eng. 2019, 43, 619–636. [Google Scholar] [CrossRef]
- Ryu, J.; Lee, H.; Kim, H.; Won, D. Secure and efficient three-factor protocol for wireless sensor networks. Sensors 2018, 18, 4481. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Rathore, H.; Al-Ali, A.; Mohamed, A.; Du, X.; Guizani, M. DTW based authentication for wireless medical device security. In Proceedings of the 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), Limassol, Cyprus, 25–29 June 2018; pp. 476–481. [Google Scholar]
- Ali, R.; Pal, A.K.; Kumari, S.; Sangaiah, A.K.; Li, X.; Wu, F. An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring. J. Ambient. Intell. Humaniz. Comput. 2018, 1–22. [Google Scholar] [CrossRef]
- Choi, Y.; Lee, D.; Kim, J.; Jung, J.; Nam, J.; Won, D. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 2014, 14, 10081–10106. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Adavoudi-Jolfaei, A.; Maede, A.T.; Aghili, S.F. Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer-to-Peer Netw. Appl. 2019, 12, 43–59. [Google Scholar] [CrossRef]
- Chen, Y.; Ge, Y.; Wang, Y.; Zeng, Z. An improved three-factor user authentication and key agreement scheme for wireless medical sensor networks. IEEE Access 2019, 7, 85440–85451. [Google Scholar] [CrossRef]
- Renuka, K.; Kumar, S.; Kumari, S.; Chen, C.M. Cryptanalysis and improvement of a privacy-preserving three-factor authentication protocol for wireless sensor networks. Sensors 2019, 19, 4625. [Google Scholar] [CrossRef] [Green Version]
- Li, X.; Niu, J.; Bhuiyan, M.Z.A.; Wu, F.; Karuppiah, M.; Kumari, S. A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Trans. Ind. Inform. 2017, 14, 3599–3609. [Google Scholar] [CrossRef]
- Hu, F.; Jiang, M.; Wagner, M.; Dong, D.C. Privacy-preserving telecardiology sensor networks: Toward a low-cost portable wireless hardware/software codesign. IEEE Trans. Inf. Technol. Biomed. 2007, 11, 619–627. [Google Scholar] [CrossRef] [PubMed]
- Malasri, K.; Wang, L. Design and implementation of a securewireless mote-based medical sensor network. Sensors 2009, 9, 6273–6297. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Kumar, P.; Lee, S.G.; Lee, H.J. E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 2012, 12, 1625–1647. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Khan, M.K.; Kumari, S. An improved user authentication protocol for healthcare services via wireless medical sensor networks. Int. J. Distrib. Sens. Netw. 2014, 10, 347169. [Google Scholar] [CrossRef]
- Li, X.; Niu, J.; Kumari, S.; Liao, J.; Liang, W.; Khan, M.K. A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur. Commun. Netw. 2016, 9, 2643–2655. [Google Scholar] [CrossRef]
- Wu, F.; Xu, L.; Kumari, S.; Li, X. An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multimed. Syst. 2017, 23, 195–205. [Google Scholar] [CrossRef]
- Hossain, M.S.; Muhammad, G. Cloud-assisted speech and face recognition framework for health monitoring. Mob. Netw. Appl. 2015, 20, 391–399. [Google Scholar] [CrossRef]
- Wazid, M.; Das, A.K.; Shetty, S.; Rodrigues, J.J.P.C.; Park, Y. LDAKM-EIoT: Lightweight device authentication and key management mechanism for edge-based IoT deployment. Sensors 2019, 19, 5539. [Google Scholar] [CrossRef] [Green Version]
- Tanveer, M.; Zahid, A.H.; Ahmad, M.; Baz, A.; Alhakami, H. LAKE-IoD: Lightweight Authenticated Key Exchange Protocol for the Internet of Drone Environment. IEEE Access 2020, 8, 155645–155659. [Google Scholar] [CrossRef]
- Gope, P.; Tzonelih, H. A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans. Ind. Electron. 2016, 63, 7124–7132. [Google Scholar] [CrossRef]
- Katz, J.; Menezes, A.J.; Van Oorschot, P.C.; Vanstone, S.A. Handbook of Applied Cryptography; CRC Press: Boca Raton, FL, USA, 1996. [Google Scholar]
- Dodis, Y.; Katz, J.; Reyzin, L.; Smith, A. Robust fuzzy extractors and authenticated key agreement from close secrets. In Annual International Cryptology Conference; Springer: Berlin/Heidelberg, Germany, 2006; pp. 232–250. [Google Scholar]
- Dodis, Y.; Reyzin, L.; Smith, A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 2004; pp. 523–540. [Google Scholar]
- Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
- Moon, J.; Lee, D.; Lee, Y.; Won, D. Improving biometric-based authentication schemes with smart card revocation/reissue for wireless sensor networks. Sensors 2017, 17, 940. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Lee, H.; Lee, D.; Moon, J.; Jung, J.; Kang, D.; Kim, H.; Won, D. An improved anonymous authentication scheme for roaming in ubiquitous networks. PLoS ONE 2018, 13, e0193366. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Wu, F.; Li, X.; Sangaiah, A.K.; Xu, L.; Kumari, S.; Wu, L.; Shen, J. A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Gener. Comput. Syst. 2018, 82, 727–737. [Google Scholar] [CrossRef]
- Blanchet, B.; Smyth, B.; Cheval, V.; Sylvestre, M. ProVerif 2.00: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial. 2018, pp. 5–16. Available online: https://prosecco.gforge.inria.fr/personal/bblanche/proverif/manual.pdf (accessed on 12 December 2020).
- Das, A.K. A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Netw. Appl. 2016, 9, 223–244. [Google Scholar] [CrossRef]
- Xu, L.; Wu, F. Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J. Med. Syst. 2015, 39, 10. [Google Scholar] [CrossRef]
Notations | Description |
---|---|
U | The user |
P | The practitioner who is a medical professional |
Gateway node | |
Sensor node | |
U’s identity | |
U’s password | |
U’s biometric information | |
U’s disposable identity | |
U’s shadow identity | |
Set of access rights mask for U | |
G | Group identity set of U |
Biometric information of the practitioner P | |
Identity of the practitioner P | |
Password of the practitioner P | |
Masked password of the user P | |
’s identity | |
w | ’s private key |
The secret emergency key between U and | |
The secret key between U and | |
’s identity | |
The secret key between and | |
The session key between U and | |
Smart card or smart device | |
Database | |
Timestamp sequence | |
Masked password of the user P | |
K | Secret key of |
One-way hash function | |
The timestamp | |
Current timestamp | |
A probabilistic generation function | |
A deterministic reproduction function | |
Maximum transmission delay | |
⊕ | XOR operation |
‖ | Concatenation operation |
(*—-queries—-*) |
query attacker(IDp). |
query id:bitstring; inj-event(endP(id)) ==> inj-event(beginP(id)). |
query id:bitstring; inj-event(endGWN(id)) ==> inj-event(beginGWN(id)). |
query id:bitstring; inj-event(endS(id)) ==> inj-event(beginS(id)). |
process |
((!P)|(!GWN)|(!S)) |
RESULT inj-event(endS(id)) ==> inj-event(beginS(id)) is true. |
RESULT inj-event(endGWN(id_21256)) ==> inj-event(beginGWN(id_21256)) is true. |
RESULT inj-event(endP(id_41657)) ==> inj-event(beginP(id_41657)) is true. |
RESULT not attacker(IDp[]) is true. |
Symbol | Meaning | Time (ms) |
---|---|---|
time of | 7.3529 [33] | |
time of hash operation | 0.0004 [34] | |
time of multiplication in ECC | 7.3529 [34] | |
time of symmetric encryption or decryption | 0.1303 [34] |
Chen et al. [12] | Renuka et al. [13] | Li et al. [14] | Ours | |
---|---|---|---|---|
User(Practitioner) P | 9 + 1 + 1 | 5 + 1 + 2 | 8 + 1 + 2 | 13 + 1 |
3 + 2 | 2+ 2 | 7 + 1 | 14 | |
Sensor node | 4 + | 3 + 2 | 4 + 2 | 12 |
Total time cost | 16+ 4+ 1 | 10+ 6 + 1 | 19 + 5 + 1 | 39 + 1 |
(ms) | =7.8805 | =8.1387 | =44.125 | =7.3685 |
Specification | |
---|---|
CPU | Intel (R) Core(TM) 2T6570 2.1GHz |
Memory | 4G |
OS | Win7 32-bit |
Software | Visual C++ 2008 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ryu, J.; Kang, D.; Lee, H.; Kim, H.; Won, D. A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems. Sensors 2020, 20, 7136. https://doi.org/10.3390/s20247136
Ryu J, Kang D, Lee H, Kim H, Won D. A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems. Sensors. 2020; 20(24):7136. https://doi.org/10.3390/s20247136
Chicago/Turabian StyleRyu, Jihyeon, Dongwoo Kang, Hakjun Lee, Hyoungshick Kim, and Dongho Won. 2020. "A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems" Sensors 20, no. 24: 7136. https://doi.org/10.3390/s20247136
APA StyleRyu, J., Kang, D., Lee, H., Kim, H., & Won, D. (2020). A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems. Sensors, 20(24), 7136. https://doi.org/10.3390/s20247136