Visible to the public A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity

TitleA secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity
Publication TypeConference Paper
Year of Publication2020
AuthorsSammoud, A., Chalouf, M. A., Hamdi, O., Montavont, N., Bouallegue, A.
Conference Name2020 International Wireless Communications and Mobile Computing (IWCMC)
Date PublishedJune 2020
PublisherIEEE
ISBN Number978-1-7281-3129-0
Keywordsanonymity, authentication, authorisation, AVISPA, biometrics, biometrics (access control), biometrics based key agreement, composability, diseases, e-health, e-health systems, ECG, file servers, formal security verification tool AVISPA, formal verification, Health Care, health systems, healthcare services, Human Behavior, medical information systems, medical servers, Medical services, message authentication, Metrics, password, pubcrawl, remote monitoring, resilience, Resiliency, Servers, Smart card, smart cards, telecare medical information systems, telemedicine, three factor user authentication, Three-factor authentication, TMIS, user anonymity, user/server communication security
Abstract

E- Health systems, specifically, Telecare Medical Information Systems (TMIS), are deployed in order to provide patients with specific diseases with healthcare services that are usually based on remote monitoring. Therefore, making an efficient, convenient and secure connection between users and medical servers over insecure channels within medical services is a rather major issue. In this context, because of the biometrics' characteristics, many biometrics-based three factor user authentication schemes have been proposed in the literature to secure user/server communication within medical services. In this paper, we make a brief study of the most interesting proposals. Then, we propose a new three-factor authentication and key agreement scheme for TMIS. Our scheme tends not only to fix the security drawbacks of some studied related work, but also, offers additional significant features while minimizing resource consumption. In addition, we perform a formal verification using the widely accepted formal security verification tool AVISPA to demonstrate that our proposed scheme is secure. Also, our comparative performance analysis reveals that our proposed scheme provides a lower resource consumption compared to other related work's proposals.

URLhttps://ieeexplore.ieee.org/document/9148503
DOI10.1109/IWCMC48107.2020.9148503
Citation Keysammoud_secure_2020