Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks
Abstract
:1. Introduction
1.1. Main Contributions
- Three-factor authentication in the proposed protocol combines biometrics, password, and smart card for providing a high-security and privacy-preserving communication environment.
- Time-bound authentication helps in controlling user access, protecting sensitive information, and can be applied to many scenarios in healthcare such as access control to the users in WBANs, medical channel subscription, medical examination appointment, etc.
- Our work designs fast authentication to speed up the communication process.
- Our scheme is designed with multi-server architecture, which allows users to use a single password to obtain services from multiple servers. This advantage can simplify network workload and save a significant database cost.
1.2. Structure of the Paper
2. Related Works
3. Review of Zhang et al.’s Scheme
3.1. Registration Phase
- The user first enters his/her identity , password , and biometric template , and then generates a random number string . Next, the user computes and . The user then transmits (, ) as a registration request to the server via a secure channel.
- After receiving (, ), the server S uses private key and to compute . Then, the server generates a random number string , chooses , and calculates , and . The server then stores {, , } in database, and writes (, , (.), , ) into smart card. After that, the server S sends the smart card to the user via a secure channel.
- After receiving smart card from the server, the user computes . Finally, the user stores in the smart card.
3.2. Login and Authentication Phase
- The user uses , , , and smart card to login to the server S, and then generates a random number string . After that, the user calculates , , , , , , and . Then, the user transmits (, , ) to the server .
- The server computes . After that, the server searches in the dynamic verification table and obtains . Otherwise, the medical server continues to search the column “dynamic string ()” to see if a value is equal to . If there is a match, the server extracts the corresponding value and replaces with the value of . Otherwise, the medical server rejects the login request. Next, the server generates random number string and calculates , , and . Then, the server S checks if and are within a bearable threshold [40], then computes and . Next, the server transmits (, ) to the user .
- After receiving (, ), the user computes . Next, the user checks if is equal to . If there is a match, the user compute , , and session key . Thereafter, the user transmits to server .
- After receiving , the server compares with . If there is a match, the server accepts as the session key. Next, the server S computes . Then, the server replaces (, ) by (, ) and calculates . Then, the server transmits to user .
- After receiving , the user compares with . If there is a match, the user accepts as the session key. Finally, the user replaces by in the smart card for the next login.
3.3. The Weaknesses
- Suffers from denial of service (DoS) attack: DoS attack is carried out by flooding the targeted host or network with traffic until the target cannot respond or simply crashes, preventing access for legitimate users [41]. In this case, timestamp solution is employed to verify the validity of the message. Without the timestamp included in login request message (, , ), Zhang et al.’s scheme is vulnerable to DOS attack.
- Suffers from a burden of biometric storage: The authentication based on biometric template requires a storage for storing biometric data. This additional storage does not make Zhang et al.’s scheme unsafe against insider attack since it does not consist of any information about passwords and the real biometric information in the database. However, it results in a significant cost that needs addressing.
- Lacks time-bound based access control: Time-based authentication is a good solution to prove an individual’s identity and authenticity on appearance simply by detecting its presence at a scheduled time of day. Lacking this feature in the work, Zhang et al.’s scheme is not well suited for e-health since time bound is useful in many cases, e.g., medical examination appointment.
- Lacks multi-server environment: Multi-server architecture allows user to obtain services from multiple servers using a single password, which greatly saves database cost. Without introducing multi-server architecture, communication in Zhang et al.’s scheme is not prominently efficient.
4. System and Security Model
4.1. System Model
4.2. Security Model
- Mutual authentication: Only the user with valid registered information can be successfully authenticated and is able to compute an exact session key to obtain service provided by the server. On the other hand, the server must be also authenticated as a legitimate party to provide true information for the user.
- Session key establishment: The purpose of this work is to allow the user and the server to securely negotiate a session key for the communication between them.
- User anonymity: We expect privacy of the user can be preserved during communication process.
- Biometric template anonymity: Three-factor mechanism includes biometric template in registration and authentication process. Our purpose is to not allow user’s biometric template to be revealed to the public.
- Forward secrecy: Our work aims to prevent the attacker from using information from the past communication session to derive the key.
5. The Proposed Scheme
5.1. Initialization Phase
- Server: The server chooses two arbitrary big numbers (, ), then compute · , which satisfies , where and are private keys, and is public key of the server . The server then randomly selects a string as the symmetric encryption key of the server . The server then secretly stores (, , ).
- Smart card: The user has the smart card choose and store a random string .
5.2. Registration Phase
- The user first enters identity , password and biometric template , then computes and . Next, the user transmits , and to the sever .
- After receiving message (, , ), the server uses symmetric encryption key to compute . Thereafter, the server transmits (, , ) to the user .
5.3. Login and Initial Authentication Phase
- The user first inserts the smart card and enter and . Next, the user chooses a random string , determines the number of authentications , and computes , , , , , and . Then, the user transmits to the server .
- After receiving , the server uses private keys , to decrypt k then confirms the validity of the timestamp . Next, it uses symmetric key to decrypt obtained from . The server then verifies , and . Thereafter, the server computes . The server then compares with . If there is a match, the server calculates and new identity . The server then determines the time bound (t1, t2), and choose two random strings and . Next, the server computes , , session key and . Then, the server transmits (, t1, t2) to the user .
- After receiving (, t1, t2), the user computes . Next, the user uses session key to decrypt and confirms the validity of the timestamp . Thereafter, the user computes and confirms . If there is a match the user accepts session key . Finally, the user stores (, , ) and (t1, t2) in the smart card and flash drive, respectively.
5.4. Fast Authentication Phase
- The user enters , and . The smart card confirms , , and . Next, the user computes . Then, the user transmits to the server .
- After receiving , the server calculates , and . Next, the server compares with . If there is no match, the server will revoke the session key ; otherwise, it computes . The server then transmits to the user .
- After receiving , the user computes , and then compares it with . If there is a match, the user accepts . Following this, the user can still use the session key to obtain the healthcare service in this communication session.
6. Logical Analysis Using GNY Logic
6.1. Logical Rules Used in Our Proof
- (I1) : Suppose that for princial P all of the following conditions hold: (1) P receives a formula consisting of a X encrypted with key K and marked with a not-originated-here mark; (2) P possesses K; (3) P believes K is a suitable secret for himself and Q; (4) P believes formula X is recognizable; and (5) P believes that K is fresh or that X is fresh. Then, P is entitled to believe that: (1) Q once conveyed X; (2) Q once conveyed the formula X encrypted with K; and (3) Q possesses K.
- (I2) : Suppose that for principal P all of the following conditions hold: (1) P receives a formula consisting of X concatenated with S, encrypted with a public key, and marked with a not-originated-here mark; (2) P possesses S and the corresponding private key; (3) P believes the public key is his own; (4) P believes S is a suitable secret for himself and Q; (5) P believes that X concatenated with S is recognizable; and (6) P believes that at least one of S, X, or +K is fresh. Then, P is entitled to believes that: (1) Q once conveyed the formula X concatenated with S; (2) Q once conveyed the formula X concatenated with S and encrypted with the public key; and (3) Q possesses the public key.
- (I7) : P believes Q once conveyed a formula consisting of X, and then P is entitled to believe Q once conveyed X.
- (J1) : P believes that Q is an authority on some statement C and that Q believes in C, and then P should believe in C as well.
- (F1) : P believes message X is fresh, which means P can believe that any (X, Y) including message X is fresh, and then P believes F(X), which is computed from message X, is also fresh.
- (T1) : When P obtains a non-original value *X, it means P may obtain the original X.
- (T3) : P uses secret key K to encrypt, decrypt to obtain message X.
- (T4) : P uses private key −K to decrypt, uses public key +K to encrypt, and obtains the message X.
- (P1) : P can see the message X, indicating that P really possesses the message X.
- (P4) : If P possesses X, then it possesses H(X).
- (R1) : P believes message X is recognizable, indicating that P can believe that any (X, Y) including message X is recognizable, and P believes that any F(X) computed from message X is also recognizable).
- (R2) : P believes message X is recognizable and P possesses the shared secret key K, and then P believes anything computed using the shared secret key is recognizable.
- (R4) : P believes the message X is recognizable and P possesses private key −K, then P believes any message computed using private key is recognizable.
6.2. Assumptions of the Proposed Protocol
- (A1) ϶ , : The server possesses private keys and .
- (A2) ϶ : The server possesses secret key .
- (A3) ϶ N: The server possesses message N.
- (A4) |≡ (H()): The server believes that H() is recognizable.
- (A5) |≡ (α): The server believes that α is recognizable.
- (A6) |≡ #(T): The user Ui believes that timestamp T is fresh.
- (A7) |≡ ( ): The server believes that N is a suitable secret for the user and the server .
- (A8) ϶ N: The user possesses N.
- (A9) ϶ : The user possesses the key .
- (A10) |≡ (v): The user believes that v is recognizable.
- (A11) |≡ | ( ): The server believes that the user Ui has jurisdiction over N, which is a suitable secret for the user and the server .
- (A12) |≡ #(T): The server believes that timestamp T is fresh.
6.3. Goals
- Message content authentication: It proves the authenticity of transmitted message.
- Message origin authentication: It proves that the received message is transmitted by the legitimate parties.
- Key agreement and confirmation: They prove that the session key is secret and shared only by the legitimate parties.
7. Security Analysis Using AVISPA Tool
7.1. Overview of AVISPA
7.2. The Verification
- secrecy_of g1: E’ is kept secret to the user U.
- secrecy_of g2: IDi is kept secret to the user U and the server S.
- secrecy_of g3: PWi is kept secret to the user U.
- secrecy_of g4: Bi is kept secret to the user U.
- secrecy_of g5: Xj is kept secret to the server S.
- secrecy_of g6: As’ is kept secret to the server S.
- secrecy_of g7: Bs’ is kept secret to the server S.
- authentication_on u_s_v: The server S authenticates the user U based on V received from the message of the user U.
- authentication_on u_s_tu: The server S authenticates the user U based on Tu received from the message of the user U.
- authentication_on s_u_ts: The user U authenticates the server S based on Ts received from the message of the server S.
8. Semantic Security Analysis
9. Performance Analysis
10. Implementation of the Proposed Scheme
- Scenario 1: The user can use the smart card, password, and sensor device to login to Home Care Server (S1) of Service Provider 1 to query his/her healthcare status. In addition, the user can login to healthcare data center to upload personal health information. Furthermore, the user can also login to Service Provider 2 (S2) and compute a session key to obtain remote healthcare services with caregivers.
- Scenario 2: With the help of continuous care across the domains, the user can login to Healthcare Service Provider 3 (S3) to upload health sensing data produced by the wearable sensors. Besides, when the user gets in community care domain, he/she can login to its healthcare server to compute session keys for using IoMT-devices through a 5G wireless network.
11. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Ahad, A.; Tahir, M.; Yau, K.A. 5G-Based Smart Healthcare Network: Architecture, Taxonomy, Challenges and Future Research Directions. IEEE Access 2019, 7, 100747–100762. [Google Scholar] [CrossRef]
- Panwar, N.; Sharma, S.; Singh, A.K. A survey on 5G: The next generation of mobile communication. Phys. Commun. 2016, 18, 64–84. [Google Scholar] [CrossRef] [Green Version]
- Saha, C.; Dhillon, H. Millimeter Wave Integrated Access and Backhaul in 5G: Performance Analysis and Design Insights. IEEE J. Sel. Areas Commun. 2019, 37, 1. [Google Scholar] [CrossRef]
- Cao, J.; Yu, P.; Ma, M.; Gao, W. Fast Authentication and Data Transfer Scheme for Massive NB-IoT Devices in 3GPP 5G Network. IEEE Intern. Things J. 2019, 6, 1561–1575. [Google Scholar] [CrossRef]
- Renuka, K.; Kumar, S.; Kumari, S.; Chen, C.M. Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks. Sensors 2019, 19, 4625. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Porambage, P.; Schmitt, C.; Kumar, P.; Gurtov, A.; Ylianttila, M. Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In Proceedings of the 2014 IEEE Wireless Communications and Networking Conference (WCNC), Istanbul, Turkey, 6–9 April 2014. [Google Scholar]
- Manatarinat, W.; Poomrittigul, S.; Tantatsanawong, P. Narrowband-Internet of Things (NB-IoT) System for Elderly Healthcare Services. In Proceedings of the 2019 5th International Conference on Engineering, Applied Sciences and Technology (ICEAST), Luang Prabang, Laos, 2–5 July 2019. [Google Scholar]
- Zhu, Y.; Jia, G.; Han, G.; Zhou, Z.; Guizani, M. An NB-IoT-based smart trash can system for improved health in smart cities. In Proceedings of the 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco, 24–28 June 2019. [Google Scholar]
- Shi, Y.; Zhao, Y.; Xie, R.; Han, G. Designing a Structural Health Monitoring System for the Large-scale Crane with Narrow Band IoT. In Proceedings of the 2019 IEEE 23rd International Conference on Computer Supported Cooperative Work in Design (CSCWD), Porto, Portugal, 6–8 May 2019. [Google Scholar]
- Li, W.; Zhang, Q.; Zhang, Q.; Guo, F.; Qiao, S.; Liu, S.; Luo, Y.; Niu, Y.; Heng, X. Development of a distributed hybrid seismic–electrical data acquisition system based on the Narrowband Internet of Things (NB-IoT) technology. Geosci. Instrum. Methods Data Syst. 2019, 8, 177–186. [Google Scholar] [CrossRef] [Green Version]
- Raj, D.A.; Kayalvizhi, S. Nb-iot based water meter. Int. J. Recent Technol. Eng. 2019, 7, 635–637. [Google Scholar]
- Zhang, R.; Cui, S.; Zhao, C. Design of a Data Acquisition and Transmission System for Smart Factory Based on NB-IoT; Springer: Singapore, 2020; pp. 875–880. [Google Scholar]
- Sun, C.; Cao, Y. Design of Mushroom Humidity Monitoring System Based on NB-IoT; Springer: Cham, Switzerland, 2020; pp. 281–289. [Google Scholar]
- Guo, X.; Liu, B.; Wang, L. Design and Implementation of Intelligent Manhole Cover Monitoring System Based on NB-IoT. In Proceedings of the 2019 International Conference on Robots & Intelligent System (ICRIS), Haikou, China, 15–16 June 2019. [Google Scholar]
- Liu, Z.; Dai, Z.; Yu, P.; Jin, Q.; Du, H.; Chu, Z.; Wu, D. Intelligent station area recognition technology based on NB-IoT and SVM. In Proceedings of the 2019 IEEE 28th International Symposium on Industrial Electronics (ISIE), Vancouver, BC, Canada, 12–14 June 2019. [Google Scholar]
- Praveen, M.; Harini, V. NB-IOT based smart car parking system. In Proceedings of the 2019 International Conference on Smart Structures and Systems (ICSSS), Chennai, India, 14–15 March 2019. [Google Scholar]
- Chávez-Ángeles, M.G. The ecological semantics of the IoMT: Modelling cyborgs networks for health policy. Inform. Med. Unlocked 2018, 12, 138–142. [Google Scholar] [CrossRef]
- Haoyu, L.; Jianxing, L.; Arunkumar, N.; Hussein, A.F.; Jaber, M.M. An IoMT cloud-based real time sleep apnea detection scheme by using the SpO2 estimation supported by heart rate variability. Future Gener. Comput. Syst. 2019, 98, 69–77. [Google Scholar] [CrossRef]
- Sodhro, A.H.; Pirbhulal, S.; Sangaiah, A.K. Convergence of IoT and product lifecycle management in medical health care. Future Gener. Comput. Syst. 2018, 86, 380–391. [Google Scholar] [CrossRef]
- Movassaghi, S.; Abolhasan, M.; Lipman, J.; Smith, D.; Jamalipour, A. Wireless Body Area Networks: A Survey. IEEE Commun. Surv. Tutor. 2014, 16, 1658–1686. [Google Scholar] [CrossRef]
- Huang, X.; Gao, X.; Yan, Z. Security protocols in body sensor networks using visible light communications. Int. J. Commun. Syst. 2016, 29, 2349–2363. [Google Scholar] [CrossRef]
- Callegati, F.; Cerroni, W.; Ramilli, M. Man-in-the-Middle Attack to the HTTPS Protocol. IEEE Secur. Priv. 2009, 7, 78–81. [Google Scholar] [CrossRef]
- Malladi, S.; Alves-Foss, J.; Heckendorn, R. On Preventing Replay Attacks on Security Protocols. In Proceeding International Conference on Security and Management; University of Idaho: Moscow, ID, USA, 2002. [Google Scholar]
- Adams, C. Impersonation Attack, in Encyclopedia of Cryptography and Security; van Tilborg, H.C.A., Ed.; Springer: Boston, MA, USA, 2005; p. 286. [Google Scholar]
- Kumar, A.; Om, H. An improved and secure multiserver authentication scheme based on biometrics and smartcard. Digit. Commun. Netw. 2018, 4, 27–38. [Google Scholar] [CrossRef]
- Zhang, L.; Zhang, Y.; Tang, S.; Luo, H. Privacy Protection for E-Health Systems by Means of Dynamic Authentication and Three-Factor Key Agreement. IEEE Trans. Ind. Electron. 2018, 65, 2795–2805. [Google Scholar] [CrossRef] [Green Version]
- Islam, S.R.; Kwak, D.; Kabir, M.H.; Hossain, M.; Kwak, K.S. The internet of things for health care: A comprehensive survey. IEEE Access 2015, 3, 678–708. [Google Scholar] [CrossRef]
- Baker, S.B.; Xiang, W.; Atkinson, I. Internet of Things for Smart Healthcare: Technologies, Challenges, and Opportunities. IEEE Access 2017, 5, 26521–26544. [Google Scholar] [CrossRef]
- Zhang, G.; Poon, C.; Zhang, Y.-T. A Review on Body Area Networks Security for Healthcare. ISRN Commun. Netw. 2011, 2011. [Google Scholar] [CrossRef] [Green Version]
- Aftab, M.U.; Ashraf, O.; Irfan, M.; Majid, M.; Nisar, A.; Habib, M.A. A Review Study of Wireless Sensor Networks and Its Security. Commun. Netw. 2015, 7, 8. [Google Scholar] [CrossRef] [Green Version]
- Al-Janabi, S.; Al-Shourbaji, I.; Shojafar, M.; Shamshirband, S. Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egypt. Inform. J. 2017, 18, 113–122. [Google Scholar] [CrossRef] [Green Version]
- Gope, P. Security and Privacy in Wearable Body Sensor Networks, in Wearable Sensors; IOP Publishing: Bristol, UK, 2017; pp. 7-1–7-13. [Google Scholar]
- Khan, R.A.; Pathan, A.-S.K. The state-of-the-art wireless body area sensor networks: A survey. Int. J. Distrib. Sensor Netw. 2018, 14, 1550147718768994. [Google Scholar] [CrossRef]
- Chaudhary, S.; Singh, A.; Chatterjee, K. Wireless Body Sensor Network (WBSN) Security and Privacy Issues: A Survey. Int. J. Comput. Intell. IoT 2019, 2. [Google Scholar]
- Sahoo, S.S.; Mohanty, S. A Lightweight Biometric-based Authentication Scheme for Telecare Medicine Information Systems Using ECC. In Proceedings of the 2018 9th International Conference on Computing, Communication and Networking Technologies, ICCCNT, Bangalore, India, 10–12 July 2018. [Google Scholar]
- Hirtan, L.; Krawiec, P.; Dobre, C.; Batalla, J.M. Blockchain-based approach for e-health data access management with privacy protection. In Proceedings of the IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD, Limassol, Cyprus, 11–13 September 2019. [Google Scholar]
- Aghili, S.F.; Mala, H.; Shojafar, M.; Peris-Lopez, P. LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT. Future Gener. Comput. Syst. 2019, 96, 410–424. [Google Scholar] [CrossRef]
- Fan, C.; Lin, Y. Provably Secure Remote Truly Three-Factor Authentication Scheme with Privacy Protection on Biometrics. IEEE Trans. Inform. Forensics Secur. 2009, 4, 933–945. [Google Scholar] [CrossRef]
- Jiang, Q.; Khan, M.K.; Lu, X.; Ma, J.; He, D. A privacy preserving three-factor authentication protocol for e-Health clouds. J. Supercomput. 2016, 72, 3826–3849. [Google Scholar] [CrossRef]
- Zhang, L.; Zhu, S.; Tang, S. Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme. IEEE J. Biomed. Health Inform. 2016, 21, 465–475. [Google Scholar] [CrossRef]
- US-CERT. Understanding Denial-of-Service Attacks; Department of Homeland Security: Washington, DC, USA, 2019.
- Negra, R.; Jemili, I.; Belghith, A. Wireless Body Area Networks: Applications and Technologies. Procedia Comput. Sci. 2016, 83, 1274–1281. [Google Scholar] [CrossRef] [Green Version]
- Li, H.; Tan, J. Heartbeat-Driven Medium-Access Control for Body Sensor Networks. IEEE Trans. Inform. Technol. Biomed. 2010, 14, 44–51. [Google Scholar]
- Vandana, T.S.; Venkateshwarlu, S.; Teja, C.V.R. Exploration of an Intelligent and Secure Wireless Body Area Networks for Health Monitoring. Int. J. Recent Technol. Eng. 2019, 8. [Google Scholar] [CrossRef]
- Elhayatmy, G.; Dey, N.; Ashour, A.S. Internet of Things Based Wireless Body Area Network in Healthcare. In Internet of Things and Big Data Analytics toward Next-Generation Intelligence; Dey, N., Hassanien, A., Bhatt, C., Ashour, A., Satapathy, S., Eds.; Springer: Cham, Switzerland, 2018. [Google Scholar]
- Ghamari, M.; Janko, B.; Sherratt, R.S.; Harwin, W.; Piechockic, R.; Soltanpur, C. A Survey on Wireless Body Area Networks for eHealthcare Systems in Residential Environments. Sensors 2016, 16, 831. [Google Scholar] [CrossRef] [Green Version]
- Shah, A.M.; Abdelmaboud, A.; Mahmood, K.; ul Hassan, M.; Saeed, M.K. eHealth WBAN: Energy-Efficient and Priority-Based Enhanced IEEE802.15.6 CSMA/CA MAC Protocol. Int. J. Adv. Comput. Sci. Appl. 2018, 9, 82–87. [Google Scholar] [CrossRef] [Green Version]
- Rehman, O.; Javaid, N.; Bibi, A.; Khan, Z.A. Performance Study of Localization Techniques in Wireless Body Area Sensor Networks. In Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, 25 June 2012. [Google Scholar]
- Smith, H.; Dinev, T.; Xu, H. Information Privacy Research: An Interdisciplinary Review. MIS Quart. 2011, 35, 989–1015. [Google Scholar] [CrossRef] [Green Version]
- Buchanan, T.; Paine, C.; Joinson, A.N.; Reips, U.D. Development of measures of online privacy concern and protection for use on the Internet. J. Am. Soc. Inform. Sci. Technol. 2007, 58, 157–165. [Google Scholar] [CrossRef] [Green Version]
- Rabin, M.O. Digitalized Signatures and Public-Key Functions as Intractable as Factorizations; Massachusetts Institute of Technology: Cambridge, MA, USA, 1979. [Google Scholar]
- Gong, L.; Needham, R.; Yahalom, R. Reasoning about belief in cryptographic protocols. In Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, 7–9 May 1990. [Google Scholar]
- The AVISPA Team. Automated Validation of Internet Security Protocols and Applications (AVISPA 1.1). 2006. Available online: http://www.avispa-project.org (accessed on 29 April 2020).
- Von Oheimb, D. The high-level protocol specification language HLPSL developed in the EU project AVISPA. In Proceedings of the APPSEM 2005 Workshop, Munich, Germany, 12–15 September 2005. [Google Scholar]
- Banerjee, S.; Odelu, V.; Das, A.K.; Chattopadhyay, S.; Kumar, N.; Park, Y.; Tanwar, S. Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks. IEEE Access 2018, 6, 20673–20693. [Google Scholar] [CrossRef]
- Nongbri, I.; Hadem, P.; Chettri, S. A Survey on Single Sign-On. Procedia Technol. 2018, 6, 134–139. [Google Scholar]
Symbols | Description |
---|---|
Server | |
User | |
Identity of server | |
Identity of user | |
Password of user | |
Biometric template of user | |
Randomly selected string, the symmetric encryption key of the server | |
, | Arbitrary big numbers, which are private keys of the server |
· , the public key of the server | |
, | Randomly generated strings |
Randomly generated value | |
T1, T2 | Timestamp |
t1, t2 | Time bound |
Session key established by the user and the server | |
h(.) | One-way hash function |
⊕ | Exclusive OR function |
, | Symmetric encryption, decryption |
Asymmetric decryption | |
Store information into smartcard | |
Store information into USB |
Fan and Lin [38] | Jiang et al. [39] | Zhang et al. [26] | Ours | |
---|---|---|---|---|
Resistance to online password guessing attack | X | O | O | O |
Resistance to offline password guessing attack | O | O | O | O |
Resistance to impersonation attack | X | O | O | O |
Resistance to replay attack | O | X | O | O |
Resistance to DoS attack | X | X | X | O |
Resistance to modification attack | X | O | O | O |
Resistance to insider attack | O | O | O | O |
Resistance to MITM attack | X | O | O | O |
Resistance to stolen mart card attack | X | X | O | O |
Resistance to desynchronization attack | X | X | O | O |
No storage burden of biometric data | X | O | X | O |
Provision of biometric data anonymity | O | O | O | O |
Provision of forward secrecy | O | O | O | O |
Provision of fast authentication | X | X | X | O |
Provision of time-bound authentication | X | X | X | O |
Provision of user anonymity | O | O | O | O |
Provision of user untraceability | X | O | O | O |
Fan and Lin [38] | Jiang et al. [39] | Zhang et al. [26] | Ours | |
---|---|---|---|---|
Registration phase | 2 + + | 4 + 3 | 7 + 5 | + 5 + 3 |
Login and authentication phase | 5 + 2 + 2 + | 4 + 4 + 10 + | 23 + 22 | 2 + 9 + 2 |
Password update phase | ---- | 12 + 4 | ---- | ---- |
Total time complexities | 7 + 2 + 3 + 2 | 4 + 4 + 26 + 8 | 30 + 27 | 3 + 14 + 5 |
Total rough estimation () | 1106.41n | 300.14n | 15.135n | 33.125n |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wong, A.M.-K.; Hsu, C.-L.; Le, T.-V.; Hsieh, M.-C.; Lin, T.-W. Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks. Sensors 2020, 20, 2511. https://doi.org/10.3390/s20092511
Wong AM-K, Hsu C-L, Le T-V, Hsieh M-C, Lin T-W. Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks. Sensors. 2020; 20(9):2511. https://doi.org/10.3390/s20092511
Chicago/Turabian StyleWong, Alice May-Kuen, Chien-Lung Hsu, Tuan-Vinh Le, Mei-Chen Hsieh, and Tzu-Wei Lin. 2020. "Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks" Sensors 20, no. 9: 2511. https://doi.org/10.3390/s20092511