Gelişmiş Arama

Basit öğe kaydını göster

dc.contributor.authorAli, Zeeshan
dc.contributor.authorHussain, Sajid
dc.contributor.authorRehman, Rana Haseeb Ur
dc.contributor.authorMunshi, Asmaa
dc.contributor.authorLiaqat, Misbah
dc.contributor.authorKumar, Neeraj
dc.contributor.authorChaudhry, Shehzad Ashraf
dc.date.accessioned2023-08-17T12:27:59Z
dc.date.available2023-08-17T12:27:59Z
dc.date.issued2020en_US
dc.identifier.issn2169-3536
dc.identifier.urihttps://hdl.handle.net/11363/5366
dc.description.abstractA variety of three-factor smart-card based schemes, specifically designed for telecare medicine information systems (TMIS) are available for remote user authentication. Most of the existing schemes for TMIS are customarily proposed for the single server-based environments and in a single-server environment. Therefore, there is a need for patients to distinctly register and login with each server to employ distinct services, so it escalates the overhead of keeping the cards and memorizing the passwords for the users. Whereas, in a multi-server environment, users only need to register once to resort various services for exploiting the benefits of a multi-server environment. Recently, Barman et al. proposed an authentication scheme for ehealthcare by employing a fuzzy commitment and asserted that the scheme can endure many known attacks. Nevertheless, after careful analysis, this paper presents the shortcoming related to its design. Furthermore, it proves that the scheme of Barman et al. is prone to many attacks including: server impersonation, session-key leakage, user impersonation, secret temporary parameter leakage attacks as well as its lacks user anonymity. Moreover, their scheme has the scalability issue. In order to mitigate the aforementioned issues, this work proposes an amended three-factor symmetric-key based secure authentication and key agreement scheme for multi-server environments (ITSSAKA-MS). The security of ITSSAKA-MS is proved formally under automated tool AVISPA along with a security feature discussion. Although, the proposed scheme requisites additional communication and computation costs. In contrast, the informal and automated formal security analysis indicate that only proposed scheme withstands several known attacks as compared to recent benchmark schemes.en_US
dc.language.isoengen_US
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141en_US
dc.relation.isversionof10.1109/ACCESS.2020.3000716en_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.subjectAuthentication and key-agreement (AKA)en_US
dc.subjectAVISPA toolen_US
dc.subjecte-healthcareen_US
dc.subjectfuzzy commitment schemeen_US
dc.subjectmulti-server authenticationen_US
dc.subjecttelecare medicine information system (TMIS)en_US
dc.titleITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environmentsen_US
dc.typearticleen_US
dc.relation.ispartofIEEE Accessen_US
dc.departmentMühendislik ve Mimarlık Fakültesien_US
dc.authoridhttps://orcid.org/0000-0001-7567-3101en_US
dc.authoridhttps://orcid.org/0000-0003-1540-4940en_US
dc.authoridhttps://orcid.org/0000-0002-3020-3947en_US
dc.authoridhttps://orcid.org/0000-0002-9321-6956en_US
dc.identifier.volume8en_US
dc.identifier.startpage107993en_US
dc.identifier.endpage108003en_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.contributor.institutionauthorChaudhry, Shehzad Ashraf


Bu öğenin dosyaları:

Thumbnail

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster

info:eu-repo/semantics/openAccess
Aksi belirtilmediği sürece bu öğenin lisansı: info:eu-repo/semantics/openAccess