Das Ashok Kumar, Goswami Adrijit
Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, 500 032, India,
J Med Syst. 2013 Jun;37(3):9948. doi: 10.1007/s10916-013-9948-1. Epub 2013 May 10.
Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication.
互联医疗保健有多种应用,包括远程护理医学信息系统、个人控制的健康记录系统和患者监测。在这类应用中,用户认证可确保患者的合法性。在此类应用的用户认证中,只有合法用户/患者本人被允许访问远程服务器,且无人能根据传输的数据追踪到他/她。Chang等人提出了一种用于互联医疗保健的保持唯一性和匿名性的远程用户认证方案(Chang等人,《医学系统杂志》37:9902,2013年)。他们的方案借助智能卡使用用户的个人生物特征以及密码。使用生物哈希技术验证用户的生物特征。由于使用了单向哈希函数和异或(XOR)操作,他们的方案效率很高。在本文中,我们表明尽管他们的方案非常高效,但存在若干安全弱点,例如:(1)在登录和认证阶段存在设计缺陷;(2)在密码更改阶段存在设计缺陷;(3)未能防范特权内部人员攻击;(4)未能防范中间人攻击;(5)未能提供适当的认证。为了弥补Chang等人方案中的这些安全弱点,我们在保留其方案原有优点的同时对其进行改进。我们表明,与Chang等人的方案相比,我们的方案效率更高。通过安全分析,我们表明我们的方案能抵御可能的攻击。此外,我们使用广泛认可的AVISPA(互联网安全协议和应用自动验证)工具对我们的方案进行形式化安全验证模拟,以确保我们的方案能抵御被动和主动攻击。另外,在用户和服务器之间成功认证后,他们建立一个共享的秘密会话密钥,用于未来的安全通信。