Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, 500 032, India,
J Med Syst. 2015 Sep;39(9):92. doi: 10.1007/s10916-015-0276-5. Epub 2015 Aug 6.
The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to other related schemes. As a result, our scheme is very appropriate for practical applications in TMIS.
远程医疗信息系统 (TMIS) 帮助患者在家中获得健康监测设施,并通过互联网和移动网络访问医疗服务。最近,Amin 和 Biswas 提出了一种基于智能卡的用户认证和密钥协商安全协议,可用于 TMIS 系统,该协议使用了密码单向哈希函数和生物哈希函数,并声称他们的方案可以抵御所有可能的攻击。尽管他们的方案由于使用了单向哈希函数而具有高效性,但我们表明他们的方案存在几个安全漏洞和设计缺陷,例如:
它无法防止特权内部攻击;
它无法防止强重放攻击;
它无法防止强中间人攻击;
它在用户注册阶段存在设计缺陷;
它在登录阶段存在设计缺陷;
它在密码更改阶段存在设计缺陷;
它缺乏生物特征更新阶段的支持;
它在形式安全分析方面存在缺陷。
为了克服这些安全漏洞和设计缺陷,我们旨在使用密码单向哈希函数和模糊提取器为分层多服务器环境提出一种安全且强大的用户认证密钥协商方案,适用于 TMIS。通过包括使用广泛接受的 Burrows-Abadi-Needham (BAN) 逻辑进行正式安全分析、随机 oracle 模型下的正式安全分析和非正式安全分析在内的严格安全分析,我们表明我们的方案可以抵御可能的已知攻击。此外,我们使用最广泛接受和使用的自动化验证互联网安全协议和应用程序 (AVISPA) 工具对我们的方案进行了模拟。模拟结果表明我们的方案也是安全的。与 Amin-Biswas 的方案和其他相关方案相比,我们的方案在计算和通信方面更有效。此外,与其他相关方案相比,我们的方案支持更多的功能特性。因此,我们的方案非常适合 TMIS 的实际应用。