Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2017 Jun 23;17(7):1482. doi: 10.3390/s17071482

An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System

Chun-Ta Li 1, Tsu-Yang Wu 2,3,*, Chin-Ling Chen 4,5,*, Cheng-Chi Lee 6,7, Chien-Ming Chen 8
PMCID: PMC5551096  PMID: 28644381

Abstract

In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients’ physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu–Chung’s scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.

Keywords: elliptic curve cryptography (ECC), Internet of Things (IoTs), medical care system, smart cards, user authentication, wireless sensor networks (WSNs)

1. Introduction

As more network technologies and smart devices have been developed, many IoT (Internet of Things) applications have been proposed, such as transportation and logistics services, healthcare services and a variety of smart environment (home, office, plant) domains. IoT is going to create a world where physical things can be seamlessly integrated into communication networks in order to provide autonomous and intelligent services for improving human beings’ life. In general, the IoT system involves three components: a sensing unit contains a large number of sensors, actuators and mobile terminals to sense physical environments; a network layer includes all network techniques with heterogeneous network configurations for data transmission; intelligent computing offers expected services or applications to IoT end users by mining and analyzing data processors.

IoT-based wireless sensor networks have been getting considerable attention from a variety of domains, such as environmental monitoring, intelligent appliances in daily living, medical care services, etc. Due to the ranking of the most common diseases in advanced countries having changed to chronic and cardiovascular diseases, the demands for medical care of such patients have increased substantially in hospitals and healthcare institutions. For the development of medical care services in hospitals and healthcare institutions, IoT-based WSNs technology is used to supplement physiological collection and measurement, enabling doctors, caregivers and families to examine the physiological conditions of patients remotely at anytime and anyplace through the Internet [1,2,3,4,5,6]. On the basis of IoT employed for medical care service in hospitals or healthcare institutions, WSNs enable sensing and collecting the physiological parameters of patients periodically, transmitting the acquired data to the authorized medical personnel, enabling professional doctors and medical personnel to monitor patients’ health conditions in real time and providing patients with appropriate medical care and medical treatment.

To apply IoT-based WSNs to medical care services successfully, ensuring the personal privacy of patients and preventing malicious network intrusion are paramount. Undoubtedly, the foundation of security is to authenticate the legitimacy of remote users and ensure the integrity of data transmissions [7,8,9,10,11,12]. In the last decade, a diversity of user authentication schemes in WSNs have been presented. In 2006, Wong et al. [13] introduced an efficient user authentication scheme for WSNs using lightweight hashing functions and XOR operations. In 2007, Tseng et al. [14] pointed out the vulnerability of Wong et al.’s scheme to replay, forgery and password guessing attacks. Furthermore, in 2008, Lee [15] showed that the computational overheads of Wong et al.’s scheme are not suitable for resource-constrained sensor nodes. In 2009, Das [16] suggested a two-factor (namely the password and smart card) authentication mechanism for WSNs, which not only prevents a series of security threats, but also achieves efficiency in terms of computational overheads. However, Huang et al. [17] and Li et al. [18] pointed out the vulnerability of Das’s scheme to off-line password guessing, user impersonation, node impersonation and unknown user attacks and that it does not provide the property of user anonymity. In 2012, Yoo et al. [19] pointed out the vulnerability of Huang et al.’s scheme to insider and parallel session attacks and that it does not provide mutual authentication between system participants. In 2013, Xue et al. [20] presented a temporal-credential-based authentication scheme for resource-constrained WSNs, and the authors claimed that their scheme provides relatively more security criteria without increasing system overheads too much in terms of communication, computation and storage. Parallel to Xue et al.’s work, in the same year, Li et al. [3] cryptanalyzed that Xue et al.’s scheme cannot withstand off-line password guessing, stolen-verifier, privileged insider, many logged-in users’ and stolen smart card attacks, and the above security threats make Xue et al.’s scheme inapplicable to practical WSN applications.

In order to design a secure and two-factor user authentication scheme for wireless healthcare sensor networks, Liu and Chung [21] in 2016 proposed a bilinear pairing-based [22] authentication scheme, and Figure 1 illustrates the comprehensive structure of the IoT-based medical care system, which could be applied in hospitals or healthcare institutions. When patients live in hospitals or healthcare institutions, they wear smart clothes in which body sensors are embedded in the piece of clothing and collect their physiological parameters (such as blood pressure, heartbeat, body pulse, electrocardiography and body temperature). Therefore, the users (such as doctors, caregivers, families and friends) in the medical care system can remotely inquire and monitor physiological information on patients with the help of trust authority. Before accessing the system, users must register with the trusted authority in person. After successful registration, the trusted authority issues a smart card to the user, and he/she can then use his/her smart card and mobile devices (such as smart phone, PDA, laptop and tablet computer) to log into the medical care system. After successful authentication, the user can access the sensed data of patients measured from sensor nodes within a limited time. Nevertheless, in this paper, we present a cryptanalysis of Liu–Chung’s authentication scheme and indicate that their scheme is susceptible to the password disclosure, replay, sensed data disclosure, sensed data forgery, off-line password guessing and stolen smart card attacks. To solve the above-mentioned security problems, we present an improved version of Liu–Chung’s authentication scheme using ECC, and we prove that the proposed scheme is secure under the elliptic curve discrete logarithm problem (ECDLP) and the elliptic curve Diffie–Hellman problem (ECDHP). In addition, by designing the mechanism of dynamic identity in the authentication process, we can build an extended scheme with user anonymity. User anonymity [23,24,25] means that a remote user’s real identity will be masked during the login session, and he/she cannot be linked or traced by any outsiders. Furthermore, the correctness of mutual authentication between participants has been proven in the random oracle model under ECDHP. Finally, the proposed scheme requires lower computational overheads compared with other ECC-based schemes, and this advantage makes our scheme more suitable and practical for IoT-based medical care systems.

Figure 1.

Figure 1

The IoT-based medical care system [21].

The rest of the paper is organized as follows. In Section 2, a brief review of Liu–Chung’s authentication scheme is provided. In Section 3, security weaknesses developed to attack Liu–Chung’s scheme are presented. In Section 4, the improved scheme is proposed. Security and performance analyses of our proposed scheme are presented in Section 5 and Section 6, respectively. Section 7 concludes this paper.

2. Review of Liu–Chung’s Authentication Scheme

This section briefly reviews Liu–Chung’s authentication scheme [21], and their scheme consists of five phases, including: setup phase, registration phase, login phase, verification phase and access control and encryption phase. For convenience of description, the terminology and notations used in the paper are summarized as follows:

  • Ui: The user.

  • TA: The trusted authority.

  • S: The sensor nodes deployed in hospitals and healthcare institutions.

  • IDi: The identity of Ui.

  • PWi: The password of Ui.

  • h(·): A one-way hash function.

  • e^(a,b): The bilinear pairing function using parameter a and parameter b.

  • a: A private parameter generated by TA.

  • TL: The login time of Ui.

  • Tnow: The current time.

  • Tu: The time limit on the legal access to S by the user Ui.

  • ΔT: The transmission delay.

  • m: The sensed data collected from S.

  • ||: The message concatenation.

  • ⊕: The XOR operation.

2.1. Setup Phase

In this phase, the trusted authority TA selects a bilinear map e^:G1×G1G2 and P0G1 and generates two one-way hash functions H1:{0,1}*G2 and H2:G2{0,1}*, where G1 is an additive cyclic group of points on an elliptic curve E over Fp, G2 is a multiplicative cyclic group of a finite field Fp* and p is a large prime, such that q|p-1 for some great prime q. Then, TA selects the secret key S0Zq* and publishes the parameter Ppub=S0×P0.

2.2. Registration Phase

In this phase, the user registers with the trusted authority TA through a secure channel to be a legal user. The details of registration phase are as follows:

  • Step 1:

    Ui registers an authenticated identity IDi with TA and sets password PWi.

  • Step 2:

    Ui sends <IDi,PWi> to TA.

  • Step 3:

    TA computes Qpriv=S0×Upub, where Upub=Upriv×P0 and UprivZq* are Ui’s public parameter and secret key, respectively.

  • Step 4:

    TA stores the parameters <h(·),Qpriv,IDi,PWi,a> in Ui’s smart card, where a represents a private parameter generated by TA and all of the sensor nodes of TA include a.

  • Step 5:

    TA issued the smart card to Ui.

2.3. Login Phase

In this phase, the user inserts his/her smart card into the device and inputs IDi and PWi. Then, the smart card performs the following steps:

  • Step 1:

    The smart card checks the IDi and PWi entered by Ui matches those stored in the smart card. If yes, the smart card executes Step 2. Otherwise, the smart card terminates this phase.

  • Step 2:

    The smart card computes r=h(IDi||PWi||a) and Sig=r×Qpriv.

  • Step 3:

    The smart card sends <Sig,r,TL,IDi> to TA through a public channel, where TL represents Ui’s login time to the TA.

2.4. Verification Phase

When TA receives the login request <Sig,r,TL,IDi> from Ui, TA authenticates Ui through the following steps:

  • Step 1:

    TA checks the validity of IDi and verifies if e^(P0,Sig)=e^(Ppub,r×Upub). If yes, TA approves the request of Ui and executes Step 2. If no, TA rejects the request of Ui.

  • Step 2:

    TA checks if Tnow-TL<ΔT. If yes, TA executes Step 3. Otherwise, it means that the login time exceeds the transmission delay, and the login request is rejected by TA.

  • Step 3:

    TA generates a random number b and computes E=h(bUpub). Then, TA sends E to Ui through a public channel.

  • Step 4:

    TA sends <Tu,b,IDi> to all of the sensor nodes S through a secure channel and notifies S that Ui is legal. Note that Tu represents the time limit on the legal access to sensor node data by Ui.

2.5. Access Control and Encryption Phase

When the user Ui is authenticated as legal, Ui can legally access sensed data m in S within a limited time, and Ui and S perform the following steps:

  • Step 1:

    Ui inserts his/her smart card into the device and inputs IDi and PWi. Then, the smart card verifies whether IDi and PWi inputted matches the data stored in the card. If yes, the smart card executes Step 2.

  • Step 2:

    The smart card computes C=h(a||IDi)E.

  • Step 3:

    The smart card sends <C,IDi,T> to S through a public channel, where T represents a timestamp.

  • Step 4:

    Upon receiving <C,IDi,T> from Ui, S verifies if Tnow-T<ΔT and Tnow=Tu. If yes, S executes Step 4.

  • Step 5:

    S computes C=h(a||IDi)h(bUpub) and checks whether C=C. If yes, the sensed data m will be transmitted, and S executes Step 5. If no, S terminates this session.

  • Step 6:

    S computes M=mH2(e^(Upub,Ppub)).

  • Step 7:

    S sends M to Ui through a public channel.

  • Step 8:
    Ui uses the secret parameter Qpriv and the public parameter P0 to perform the following calculation to obtain m:
    m=MH2(e^(Qpriv,P0))=mH2(e^(Upub,Ppub))H2(e^(Qpriv,P0))=mH2(e^(Upub,Ppub))H2(e^(S0×Upub,P0))=mH2(e^(Upub,Ppub))H2(e^(Upub,P0)S0)=mH2(e^(Upub,Ppub))H2(e^(Upub,S0×P0))=mH2(e^(Upub,Ppub))H2(e^(Upub,Ppub))=m

Figure 2 shows the schematic of Liu–Chung’s authentication scheme for the IoT-based medical care system.

Figure 2.

Figure 2

The schematic of Liu–Chung’s authentication scheme for IoT-based medical care system.

3. Weaknesses of Liu–Chung’s Authentication Scheme

In this section, we present the security weaknesses of Liu–Chung’s scheme. We show that their scheme has some security problems and that an attacker Ua can mount different types of attacks on Liu–Chung’s scheme.

3.1. Password Disclosure Attacks

In real environments, the user may register with a number of remote services by using a common password PW and the identity ID for his/her convenience. Thus, the privileged-insider of TA may try to use the knowledge of user’s PW and ID to access another remote services. In the registration phase of Liu–Chung’s scheme, Ui registers to TA by sending (IDi,PWi). Therefore, Ui’s sensitive password PWi will be revealed by the privileged-insider of TA.

3.2. Replay Attacks

In the login phase of Liu–Chung’s scheme, although the transmitted login message <Sig,r,TL,IDi> includes timestamp TL, however, the other login parameters <Sig,r,IDi> of Ui are unchanged. Thus, an attacker Ua could replay the eavesdropped messages, such as Ui’s login request <Sig,r,TL,IDi> with Ua’s current login time TL. Finally, Ua can bypass the timestamp checking and replay attacks cannot prevented in Liu–Chung’s scheme.

3.3. Sense Data Disclosure Attacks

In the access control and encryption phase of Liu–Chung’s scheme, the sensor node S sends the encrypted sensed data M to Ui through an insecure channel. Due to the public Upub of Ui and the public Ppub of TA, once an attacker Ua eavesdrops the encrypted sensed data M from the public channel, Ua can perform the following calculation to obtain m without knowing Qpriv:

m=MH2(e^(Upub,Ppub))=mH2(e^(Upub,Ppub))H2(e^(Upub,Ppub))=m

Finally, Liu–Chung’s scheme cannot prevent sensed data disclosure attacks.

3.4. Sense Data Forgery Attacks

In the access control and encryption phase, we found that Liu–Chung’s scheme allows the attacker Ua to forge a fake sensed data m for the user Ui, and Ui wrongly believes he/she has received the physiological conditions of the patients. The sensed data forgery attacks on Liu–Chung’s scheme are as follows:

  • (1)

    When the sensor node S sends M=mH2(e^(Upub,Ppub)) to the user Ui, Ua intercepts the message M.

  • (2)

    Ua maliciously forges a fake sensed data m and computes M=mH2(e^(Upub,Ppub)), where Upub and Ppub are public parameters of Ui and TA, respectively. Then, Ua sends M to the user Ui.

  • (3)

    Upon receiving the message M, Ui uses the secret parameter Qpriv and the public parameter P0 to obtain m=MH2(e^(Qpriv,P0)).

Therefore, the attacker Ua can control the sensed data that occur between the user Ui and the sensor nodes S.

3.5. Stolen Smart Card Attacks

Usually, the smart card of the user Ui is equipped with tamper-resistant hardware. However, if Ui’s smart card is lost or stolen, the attacker Ua may obtain all of the sensitive parameters stored in its memory by monitoring the power consumption of the smart card [26]. Assume that Ua obtains the smart card of Ui and extracts the parameters <h(·),Qpriv,IDi,PWi,a> stored inside it. Ua then can make a valid login request with ease. For example, Ua uses h(·), IDi, PWi, a and Qpriv and computes r=h(IDi||PWi||a) and Sig=r×Qpriv. Finally, Ua can make a valid login request to impersonate Ui by sending <Sig,r,TL,IDi> to the trusted authority TA, where TL is the current login time of Ua.

3.6. Off-Line Password Guessing Attacks

Since Liu–Chung’s authentication scheme is executed in the open network environment, then we assumed that an attacker Ua can eavesdrop the communication channels between Ui and TA in the login phase. Moreover, we assumed that Ua was a legitimate user in the medical care system, and he/she can extract the parameter a by launching power analysis attack [26]. Thus, Ua could guess Ui’s password through the following steps.

  • (1)

    Ua eavesdrops the message <Sig,r,TL,IDi> sent by a legal user Ui, where r=h(IDi||PWi||a).

  • (2)

    Ua guesses a password PWa and computes ra=h(IDi||PWa||a) in an off-line manner.

  • (3)

    Ua checks whether ra is equal to r or not. If it is equal, Ui’s sensitive password is successfully guessed. Otherwise, Ua repeats Steps (1) and (2) until the correct password is found.

From the above descriptions, we conclude that Ua could derive Ui’s password through an off-line manner, and Liu–Chung’s authentication scheme could not succeed against the off-line password guessing attacks.

4. The Proposed Scheme

This section proposes the new and improved lightweight user authentication scheme for medical care tailored for the Internet of Things environment. The proposed scheme is based on Liu–Chung’s scheme; thus, it tackles and eliminates all of the previously-mentioned security problems and vulnerabilities of their scheme. As Liu–Chung’s scheme, the proposed scheme also consists of five phases: setup, registration, login, verification and access control and encryption. Figure 3 shows the schematic of our proposed scheme for the IoT-based medical care system.

Figure 3.

Figure 3

The schematic of our proposed scheme for IoT-based medical care system.

4.1. Setup Phase

In this phase, the trusted authority TA selects an elliptic curve E over Fp and a base point P0 over the E and chooses a secure one-way hashing function h(·):{0,1}*{0,1}l, where p is a large prime such that q|p-1 for some great prime q and l means the length of the output. In addition, TA chooses the secret key S0Zq* and computes its public key Ppub=S0×P0. Finally, TA keeps S0 securely and publishes <E,q,P0,Ppub,h(·)> as system parameters.

4.2. Registration Phase

In this phase, the user registers with the trusted authority TA through a secure channel to be a legal user, and the details of registration phase are as follows:

  • Step 1:

    Ui registers an authenticated identity IDi and password PWi with TA and chooses a random number r for computing Ri=h(IDi||PWi||r).

  • Step 2:

    Ui sends the registration request <IDi,Ri> to TS through a secure channel.

  • Step 3:

    TA checks whether IDi has been registered or not. If IDi has not been registered, TA computes Vi=h(IDi||S0||a) and Wi=ViRi. Then, TA stores the parameters <Wi,a,E,q,P0,Ppub,h(·)> in Ui’s smart card and issued the smart card to Ui, where a represents a private parameter generated by TA and all the sensor nodes of TA include a.

  • Step 4:

    Ui computes Vi=Wih(IDi||PWi||r), Xi=rh(IDi||PWi) and Yi=h(Vi||r||h(IDi||PWi)) and stores <Xi,Yi> into the smart card. Finally, Ui’s smart card contains the parameters <Yi,Xi,Wi,a,E,q,P0,Ppub,h(·)>.

4.3. Login Phase

In this phase, the user inserts his/her smart card into the device and inputs IDi and PWi. Then, the smart card executes the following steps:

  • Step 1:

    The smart card checks the IDi and PWi entered by Ui matches those stored in the smart card. First, the smart card computes r=Xih(IDi||PWi), Vi=Wih(IDi||PWi||r) and Yi=h(Vi||r||h(IDi||PWi)) and verifies whether Yi=Yi. If it holds, the smart card executes Step 2. Otherwise, the smart card terminates this phase.

  • Step 2:

    The smart card generates a random number α and computes Mi=α×P0, Ni=α×Ppub, Oi=h(IDi||Vi||TL) and Qi=h(Ni)(IDi||Oi) and sends <Mi,Qi,TL> to TA through a public channel, where TL represents Ui’s login time to the TA.

4.4. Verification Phase

When TA receives the login request <Mi,Qi,TL> from Ui, TA authenticates Ui through the following steps:

  • Step 1:

    TA checks if Tnow-TL<ΔT. If yes, TA executes Step 2. Otherwise, it means that the login time exceeds the transmission delay, and the login request will be rejected by TA.

  • Step 2:

    TA computes Ni=S0×Mi and (IDi||Oi)=Qih(Ni) and checks if user’s IDi is recorded by TA. If yes, TA executes Step 3. Otherwise, the login request is denied by TA.

  • Step 3:

    TA goes on to compute Vi=h(IDi||S0||a) by using the identity IDi and checks that the decrypted Oi is the same as computed Oi=h(IDi||Vi||TL). If no, the session is aborted by TA. Otherwise, TA computes E=h(bTIDi) and RM=h(Ni)(IDi||TIDi||Tu||E) sends the response message <RM> to Ui through a public channel, where b represents a random number and TIDi represents a temporary identity for the user Ui.

  • Step 4:

    TA sends <Tu,b,TIDi> to all of the sensor nodes S via a secure channel and notifies S that the temporary identity TIDi is legal in the next access control and encryption phase.

  • Step 5:

    When Ui receives <RM> from TA, Ui authenticates TA by computing (IDi||TIDi||Tu||E)=h(Ni)RM and checks that the decrypted IDi is involved in RM or not. If yes, Ui confirms that TA is legal and the parameters TIDi, Tu and E will be used in access control and encryption phase. Otherwise, Ui ends this session. Note that TIDi and E must be kept secret by Ui and temporarily stored into Ui’s smart card until the end of the access control and encryption phase.

4.5. Access Control and Encryption Phase

When the user Ui is authenticated as legal, Ui can legally access sensed data m in S within a permitted time Tu, and Ui and S perform the following steps:

  • Step 1:

    In this step, the executed operations are the same as Step 1 of the login phase.

  • Step 2:

    The smart card calculates C=h(a||TIDi||T)h(E) and sends <C,TIDi,T> to S through a public channel, where T represents a timestamp.

  • Step 3:

    Upon receiving <C,TIDi,T> from Ui, S verifies if Tnow-T<ΔT and TnowTu. If yes, S executes Step 4.

  • Step 4:

    S computes C=h(a||TIDi||T)h(h(bTIDi)) by using the b transmitted by TA and the temporary identity TIDi of the user to examine whether C=C. If yes, the validity of Ui is authenticated by S, and the sensed data m will be transmitted by S. If no, S terminates this session.

  • Step 5:

    S computes the session key SK=h(EaTu) and encrypts the sensed data by computing M=mSK. Then, S sends <M> to Ui through a public channel. Note that the session key SK provides a secure channel for protecting data transmission between S and Ui.

  • Step 6:

    When Ui receives <M> from S, Ui uses the parameters (E,a,Tu) to calculate the session key SK=h(EaTu) and decrypts the sensed data m by computing m=MSK.

Note that SK should be frequently updated when Ui’s Tu is expired. If so, Ui returns to the login and verification phases for requesting a new Tu with TA. Finally, a new SK will be established and updated among Ui and S in the access control and encryption phase.

5. Security Analysis of the Proposed Scheme

In this section, we analyze the security of our proposed scheme, and show that it is able to prevent the above-mentioned weaknesses in Liu–Chung’s scheme. The security of the proposed scheme is based on the collision-free one-way hash function and two hard problems: the elliptic curve discrete logarithm problem (ECDLP) and the elliptic curve Diffie–Hellman problem (ECDHP), defined as follows:

  • ECDLP:

    Given a base point P over an elliptic curve E and a random variable bZq*, it is computationally infeasible to find out an integer solution a such that b=aP.

  • ECDLP:

    Given three parameters P,aP,bPZq*, it is computationally infeasible to compute abPZq*.

We analyze and summarize the main security advantages of our proposed scheme as follows.

5.1. Resistance to Password Disclosure and Password Guessing Attacks

In the registration phase, the user’s password PWi is used in the message Ri=h(IDi||PWi||r). Although the privileged-insider of TA can obtain the message Ri and the identity IDi of the user, it is unable to know the user’s sensitive password PWi due to r being randomly selected by the user, and PWi is protected by h(IDi||PWi||r). Note that deriving PWi from h(IDi||PWi||r) is equal to implementing the brute-force attack to crack the one-way hashing function. Moreover, during the login, verification and access control and encryption phases, neither the smart card nor the transmitted messages include user’s password PWi. Hence, the proposed scheme eliminates the possibility of password disclosure and password guessing attacks.

5.2. Resistance to Replay Attacks

The timestamps and random numbers are common countermeasures to prevent replay attacks in the authentication process. Since the messages <Mi,Qi,TL> and <C,TIDi,T> contain freshly generated timestamps TL and T and these timestamps are also embedded in the protected messages Qi=h(Ni)(IDi||h(IDi||Vi||TL)) and C=h(a||TIDi||T)h(E), thus each participant first checks the freshness of timestamps received and verifies whether the same timestamps are present in the transmitted messages. Hence, this design discards the possibility of replay attacks in our proposed scheme.

5.3. Resistance to Sensed Data Disclosure Attacks

In the access control and encryption phase of the proposed scheme, the sensed data m is embedded in the encrypted message M=mSK, and m is well-protected via high-entropy session key SK=h(EaTu). Here, we assume that Ua can obtain the parameter a from a legal smart card and can eavesdrop the transmitted messages <C,TIDi,T> and <M> from the public channels between the user Ui and the sensor nodes S. Ua can use the collected parameters to compute h(a||TIDi||T) and Ch(a||TIDi||T) and derive h(E). However, without having the knowledge of secrets E and Tu, an attacker Ua cannot derive SK from h(E) because of the irreversibility of the secure one-way hashing function.

On the other hand, during the login phase of the proposed scheme, we assume that the parameter Mi=α×P0 and the public key Ppub=S0×P0 of TA are disclosed. However, the secret parameter Ni=α×Ppub=αS0P0 cannot be calculated by Ua since the random number α is unknown due to the infeasibility of deriving them from Mi by solving ECDLP. Moreover, during the access control and encryption phase, a unique and fresh secret parameter Ni is computed in each new session using the random parameter α and the private key S0. Due to the difficulties of ECDHP, Ua cannot derive Ni from Mi and Ppub, and thus, the protection of fresh secret parameter h(Ni) does not allow Ua to gain E and Tu from RM. Therefore, Ua cannot successfully derive m from M by computing m=Mh(EaTu), and the confidentiality of the sensed data m is guaranteed in the proposed scheme.

5.4. Resistance to Sensed Data Forgery Attacks

In the access control and encryption phase of the proposed scheme, the sensor node S first authenticates the user Ui by verifying whether C=h(a||TIDi||T)h(h(bTIDi))=C. Due to the protection of using timestamp T and the secret parameters a and h(bTIDi), no one can forge a valid message <C,TIDi,T> to pass S’s verification. In addition, we assume that the attacker Ua intercepts the response message M and tries to generate a legitimate message M=mh(EaTu) with fake sensed data m. However, since Ua does not know the secret parameters E and Tu, it cannot generate the legitimate message <M>. Thus, the proposed scheme could withstand the sensed data forgery attacks.

5.5. Resistance to Stolen Smart Card Attacks

Suppose that the smart card of Ui is lost or stolen. The attacker Ua could get the stored parameters <Yi,Xi,Wi,a,E,q,P0,Ppub,h(·)> and try to impersonate Ui to successfully login to the trusted authority TA. Ua can first guess a candidate identity IDi* and password PWi* and compute r*=Xih(IDi*||PWi*)Vi*=Wih(IDi*||PWi*||r*) and Yi*=h(Vi*||r*||h(IDi*||PWi*)). The way for Ua to learn PWi is to find out the correct pair (IDi*,PWi*) such that Yi=Yi*. In the proposed scheme, we assume the probability of guessing IDi composed of exact l characters and PWi composed of exact m characters is approximately 126l+6m. This probability is negligible, and Ua has no feasible way to derive IDi and PWi of the user Ui in polynomial time.

5.6. Resistance to Off-Line Password Guessing Attacks

In the proposed scheme, we assume that an attacker Ua could eavesdrop all of the transmission messages <Mi,Qi,TL>, <RM>, <C,TIDi,T> and <M> between Ui, TA and S. However, neither the smart card, nor the transmission messages include Ui’s password PWi. Therefore, the proposed scheme could withstand the off-line password guessing attack.

5.7. Provision of the Efficient Login Phase

In order to illustrate the verification mechanism during the login phase, three cases are taken into consideration. Case 1 assumed Ui inputs a correct identity IDi and incorrect password PWi*. Case 2 assumed Ui inputs an incorrect identity IDi* and correct password PWi. Case 3 assumed Ui inputs incorrect identity IDi* and incorrect password PWi*.

  • Case 1:

    After the user inputs (IDi,PWi*), the smart card computes r*=Xih(IDi||PWi*), Vi*=Wih(IDi||PWi*||r*) and Yi*=h(Vi*||r*||h(IDi||PWi*)) and verifies Yi=?h(Vi*||r*||h(IDi||PWi*)). In fact, the verification cannot pass as Yih(Vi*||r*||h(IDi||PWi*)), and the smart card immediately terminates the session.

  • Case 2:

    After the user inputs (IDi*,PWi), the smart card computes r*=Xih(IDi*||PWi), Vi*=Wih(IDi*||PWi||r*) and Yi*=h(Vi*||r*||h(IDi*||PWi)) and verifies Y=?h(Vi*||r*||h(IDi*||PWi)). Furthermore, the verification cannot pass as Yh(Vi*||r*||h(IDi*||PWi)), and the smart card immediately terminates the session.

  • Case 3:

    After the user inputs (IDi*,PWi*), the smart card computes r*=Xih(IDi*||PWi*), Vi*=Wih(IDi*||PWi*||r*) and Yi*=h(Vi*||r*||h(IDi*||PWi*)) and verifies Y=?h(Vi*||r*||h(IDi*||PWi*)). Similarly, the verification cannot pass as Yh(Vi*||r*||h(IDi*||PWi*)), and the smart card immediately terminates the session.

5.8. Provision of User Anonymity

Based on the design of our proposed scheme, the excellent property of user anonymity can be guaranteed at every phase. We cleverly mask the real identity of Ui via a public channel, and no attacker can compromise Ui’s real identity by launching security attacks. First, in the login phase, Ui’s real identity is included in Qi=h(Ni)(IDi||Oi). Thus, Ua cannot reveal Qi without h(Ni). Additionally, in the verification and access control and encryption phases, the temporary identity TIDi is generated and utilized to replace Ui’s identity transmitted among the user and the sensor nodes. That is to say, all of the identities are transmitted in cipher format instead of plaintext, and these temporary identities will be randomized at each new session. As a result, our proposed scheme can provide the property of user anonymity.

5.9. Provision of Mutual Authentication

In the login phase of the proposed scheme, only the legitimate user can know the secret parameter Vi=h(IDi||S0||a) to generate a legal Oi. Therefore, in Step 3 of the verification phase, TA can authenticate Ui by checking if the decrypted Oi is equal to the computed Oi. Moreover, in Step 5 of the verification phase, only the legal TA can own the secret key S0 to compute the common secret parameter h(Ni). As a result, Ui can authenticate TA by decrypting RM and checking if the revealed IDi is involved in RM.

On the other hand, in the access control and encryption phase, only the legal user can obtain the secret parameter h(E) to generate a legal C. Thus, in Step 4 of the access control and encryption phase, S can authenticate Ui by checking if the received C is equal to the computed C. Additionally, in Step 5 of the access control and encryption phase, only the participated S can calculate the common session key SK=h(EaTu) to encrypt the sensed data by computing M=mSK. Finally, Ui can also authenticate S by establishing the common session key SK and checking if the sensed data m are involved in M by decrypting m=MSK.

5.10. Provision of Session Key Security

Since the common session key SK is only shared and established among the user Ui and the sensor nodes S, in order to establish a secure and authenticated channel for late successive transmission, the session key SK not only ensures confidentiality, but also achieves authenticity of participants and messages. Based on the design of session key SK=h(EaTu), E is used for verifying the integrity of the transmitted messages, whereas Tu is used for preventing possible replay and misuse service attacks. As a result, the session key security and data confidentiality can be provided in the proposed authentication scheme.

6. Security Proof of the Proposed Scheme

Here, we follow similar techniques to demonstrate the security of our scheme in the random oracle model [27,28,29,30] and under the elliptic curve Diffie–Hellman problem (ECDHP).

6.1. Adversarial Model

We assume an adversary A is a probabilistic polynomial time algorithm and allowed to issue the following queries to some oracles. Note that an oracle has multiple instances Uj, where U denotes participants and jN. Here, we set U{Ui,TA,S} and may use A to simulate the proposed scheme via issuing queries.

  1. Send(Uj,m) query: Upon receiving this query with message m, instance Uj follows the proposed scheme and then returns the result to A.

  2. Hash(Uj,m) query: Upon receiving this query with message m, instance Uj returns a random value to A.

  3. Corrupt(Uij,U) query: A may query user U’s password. Upon receiving this query, instance Uij returns a password PWU to A. Note that this query models the forward secrecy of session key.

  4. Reveal(E{Ui,S}j) query: A may query the previous established session keys. Upon receiving this query, instance E{Ui,S}j returns a previous session key to A, if it has accepted. Otherwise, E{Ui,S}j returns a random string to A. Note that this query models the knowing the session key attack of session key.

  5. Test(E{Ui,S}j) query: A may only issue this query once. Upon receiving this query, instance E{Ui,S}j flips an unbiased coin b. If b=1, it returns a session key. Otherwise, it returns a random string. Note that this query models the semantic security of session key.

6.2. Mutual Authentication between Ui and TA

Theorem 1.

In the random oracle model, assume that there exists an adversary A with a non-negligible advantage ϵ0 that can impersonate Ui to communicate with TA. Then, there is a challenger C, which can solve the elliptic curve Diffie–Hellman problem (ECDHP) with advantage q·ϵ0<ϵqH2k, where qS denotes the maximum number of send queries issued by A, qH denotes the maximum number of hash queries issued by A and k denotes the length of the hash value.

Proof. 

Note that we say that A successfully impersonates Ui to communicate with TA. This means that TA accepts (Mi,Qi,TL), but it has not been produced by Ui. In this case, it could be that A guessed (Mi,Qi,TL). Then, this leads to:

ϵ0<qSq×Pr[Oi=h(IDi||Vi||TL)|IDi||Oi=Qih(Ni);Vi=h(IDi||S0||a)]×1qSqSq×qH2k×1qS. (1)

Given that Mi=a·P and Ppub=b·P to A for a, bZq* are unknown, then, A can compute Ni=abP. Thus, given (P,Mi,Ppub)=(P,aP,bP), C can use A as a subroutine to compute abP. In other words, C can solve ECDLP with the advantage q·ϵ0<ϵqH2k. ☐

Theorem 2.

In the random oracle model, assume that there exists an adversary A with a non-negligible advantage ϵ1 that can impersonate TA to communicate with Ui. Then, there is a challenger C, which can solve the elliptic curve Diffie–Hellman problem (ECDHP) with advantage ϵϵ0-12k-qS2·qH2q·2k, where qS denotes the maximum number of send query issued by A, qH denotes the maximum number of hash query issued by A and k denotes the length of the hash value.

Proof. 

Without of loss generality, we assume that the event that violates Ui-to-TA authentication denoted by EventUi2TA does not occur. Similarly, we use the symbol EventTA2Ui to define the event that violates TA-to-Ui authentication. We say that A successfully impersonates TA to communicate with Ui. This means that at some point, Ui accepts RM after sending (Mi,Qi). However, RM has not been produced by TA. In this case, it could be the following three cases:

  1. A guessed RM. The probability of this case is 12k.

  2. Mi and Qi were obtained in other session. The probability of this case is qS·(qS-1)q×qH·(qH-1)2k less than qS2·qH2q·2k.

  3. A had issued the hash query for Ni.

Thus, we have:

Pr[EventTA2Ui|¬EventUi2TA]Pr[RM=h(Ni)(IDi||TIDi||Tu||E)]+12k+qS2·qH2q·2k. (2)

Given Mi=a·P and Ppub=b·P to A for a, bZq* are unknown, then, A can compute Ni=abP. Thus, given (P,Mi,Ppub)=(P,aP,bP), C can use A as a subroutine to compute abP. In other words, C can solve ECDLP with the advantage ϵϵ0-12k-qS2·qH2q·2k.

6.3. S Authenticates Ui and Key Agreement

Theorem 3.

Under the elliptic curve computational Diffie–Hellman problem (ECDHP), no adversary can impersonate user Ui to communicate with sensor node S after Ui is authenticated as a legal user by TA.

Proof. 

No one can forge C=h(a||TIDi||T)E except legal user Ui because a is a secret value stored in Ui’s smart card, and E is obtained from the procedures of Ui authenticating TA. By Theorem 2, we have proved that no one can impersonate TA to communicate with Ui under the ECDHP. Even if the Ui’s smart card is broken, the adversary is still unable to forge E. ☐

Theorem 4.

Under the elliptic curve computational Diffie–Hellman problem (ECDHP), only user Ui and sensor node S can establish a session key SK after Ui is authenticated as a legal user by TA. In other words, no adversary can compute SK except Ui and S.

Proof. 

According to the proofs of Theorems 2 and 3, no one can compute SK=h(EaTu) except Ui, an authenticated legal user. In another aspect, only S can compute SK because TA sends a and (Tu,b,TIDi) to S via a secure channel, and E is computed by h(bTIDi). ☐

7. Performance Analyses and Comparisons

In this section, we provide a performance comparisons among our scheme and two existing ECC-based authentication schemes [5,21] for wireless healthcare sensor networks in terms of computation costs in the authentication process (which includes the login, verification, and access control and encryption phases). According to the experimental results of He [31], the execution times are given in Table 1, where the hardware platform is a Pentium IV 3-GHz processor with library MIRACL [32]. As shown in Table 1, it is clear that the elliptic curve scalar point multiplication and the bilinear pairing operation are more complicated than other operations, and the running time of the addition operation of points, the map-to-point hash function and the one-way hash function could be ignored. Therefore, we only need to count the execution time of the elliptic curve scalar point multiplication and the bilinear pairing operation.

Table 1.

Execution time (in milliseconds; ms) of various cryptographic operations.

Notations Descriptions
TEM The time of executing an elliptic curve scalar point multiplication, 1TEM 1.17 ms
TBP The time of executing a bilinear pairing operation, 1TBP 3.16 ms
TEA The time of executing an addition operation of points, 1TEA<0.1 ms, which is negligible
TMH The time of executing a map-to-point hash function, 1TMH<1 ms, which is negligible
TH The time of executing a one-way hash function, 1TH<0.01 ms, which is negligible

In Table 2, we summarize the efficiency comparisons among our proposed scheme and other previous WSN-based authentication schemes in terms of computational complexity and the execution time, where the total execution times are measured using Table 1. From Table 2, we can see that the computation cost of our scheme is lower than that of Yeh et al.’s and Liu–Chung’s schemes on both the user, the trusted authority and the sensor node side. Therefore, our proposed scheme is the most efficient compared to the other two related schemes in terms of overall computation costs, and it can be claimed that the execution time of the proposed scheme is suitable for different real-life applications, including medical care systems.

Table 2.

Performance comparisons among the proposed scheme and other related schemes.

Yeh et al. [5] (2011) Liu–Chung [21] (2016) The Proposed Scheme
Computation cost (Ui) 2TEM + 1TEA + 1TMH + 3TH 1TEM + 1TBP + 1TMH + 2TH 2TEM + 8TH
Computation cost (TA) 5TEM + 3TEA + 4TMH 2TBP + 1TH 1TEM + 4TH
Computation cost (S) 2TEM + 2TEA + 3TMH 1TBP + 1TMH + 2TH 4TH
Total execution time 10.53 ms 13.81 ms 3.51 ms

Lastly, the security criteria and functional properties of three ECC-based authentication schemes are summarized in Table 3. It is visible from Table 3 that Yeh et al.’s scheme [5] is vulnerable to password disclosure attack in the registration phase and also does not provide the user anonymity property, where Liu–Chung’s scheme [21] does not support this property. The proposed scheme can prevent all of the security weaknesses of the former scheme and provide mutual authentication and user anonymity to protect data integrity and user privacy. From Table 2 and Table 3, the proposed scheme not only keeps lower computational cost, but also possesses more security requirements along with strong security protection on the relevant security attacks for IoT-based medical care systems.

Table 3.

Functionality comparisons among the proposed scheme and other related schemes.

Yeh et al. [5] (2011) Liu–Chung [21] (2016) The Proposed Scheme
F1 χ χ
F2 χ
F3
F4 χ
F5 χ χ
F6 χ
F7 χ
F8 χ
F9 χ
F10 χ

F1: Provision of user anonymity; F2: provision of efficient login phase; F3: provision of mutual authentication; F4: provision of session key security; F5: prevention of password disclosure attack; F6: prevention of replay attack; F7: prevention of sensed data disclosure attack; F8: prevention of sensed data forgery attack; F9: prevention of stolen smart card attack; F10: prevention of off-line password guessing attack; √: yes; χ: no; −: not mentioned.

8. Conclusions

In this paper, we first give a brief review of Liu–Chung’s authentication scheme combined with its basic security analysis and find that their scheme is vulnerable to password disclosure, off-line password guessing, sensed data disclosure, sensed data forgery, replay attacks and the stolen smart card problem. Furthermore, their scheme cannot achieve user anonymity and session key security, and it has unnecessary redundancy in protocol design. In order to repair their security flaws and improve the system performance, an improved efficient scheme is proposed. The security analysis indicates that the proposed authentication scheme is able to withstand those attacks mentioned and satisfies all desirable security attributes, such as user anonymity, mutual authentication, session key security and an efficient verification mechanism during the login phase. Comparing the efficiency with other ECC-based authentication schemes, the proposed scheme is comparable in terms of the computational overheads and practical as the secure authentication mechanism for the IoT-based medical care system.

Acknowledgments

The authors would like to thank the anonymous reviewers and the Editor for their constructive and generous feedback on this paper. In addition, this research was partially supported and funded by the Ministry of Science and Technology, Taiwan, R.O.C., under Contract No. MOST 105-2221-E-165-005.

Author Contributions

Chun-Ta Li proposed the ideas and wrote the paper; Tsu-Yang Wu and Chin-Ling Chen are corresponding authors who contributed to prove, analyze the data and supervise the paper; Cheng-Chi Lee and Chien-Ming Chen also supported the writing, and supervised parts of the scheme.

Conflicts of Interest

The authors declare no conflict of interest.

References

  • 1.Chiou S.Y., Ying Z., Liu J. Improvement of a privacy authentication scheme Based on cloud for medical environment. J. Med. Syst. 2016;40:101. doi: 10.1007/s10916-016-0453-1. [DOI] [PubMed] [Google Scholar]
  • 2.He D., Kumar N., Chen J. Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimed. Syst. 2015;21:49–60. doi: 10.1007/s00530-013-0346-9. [DOI] [Google Scholar]
  • 3.Li C.T., Weng C.Y., Lee C.C. An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors. 2013;13:9589–9603. doi: 10.3390/s130809589. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 4.Li C.T., Lee C.C., Weng C.Y. A secure cloud-assisted wireless body area network in mobile emergency medical care system. J. Med. Syst. 2016;40:117. doi: 10.1007/s10916-016-0474-9. [DOI] [PubMed] [Google Scholar]
  • 5.Yeh H.L., Chen T.H., Liu P.C., Kim T.H., Wei H.W. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors. 2011;11:4767–4779. doi: 10.3390/s110504767. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 6.Zhou J., Cao Z., Dong X., Xiong N., Vasilakos A.V. 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf. Sci. 2015;314:255–276. doi: 10.1016/j.ins.2014.09.003. [DOI] [Google Scholar]
  • 7.Choi J., In Y., Park C., Seok S., Seo H., Kim H. Secure IoT framework and 2D architecture for end-to-end security. J. Supercomput. 2016 doi: 10.1007/s11227-016-1684-0. [DOI] [Google Scholar]
  • 8.Kumari S., Khan M.K., Atiquzzaman M. User authentication schemes for wireless sensor networks: A review. Ad Hoc Netw. 2015;27:159–194. doi: 10.1016/j.adhoc.2014.11.018. [DOI] [Google Scholar]
  • 9.Li C.T. A secure chaotic maps based privacy-protection scheme for multi-server environments. Secur. Commun. Netw. 2016;9:2276–2290. doi: 10.1002/sec.1487. [DOI] [Google Scholar]
  • 10.Maitra T., Amin R., Giri D., Srivastava P.D. An efficient and robust user authentication scheme for hierarchical wireless sensor networks without tamper-proof smart card. Int. J. Netw. Secur. 2016;18:553–564. [Google Scholar]
  • 11.Messai M.L., Seba H., Aliouat M. A lightweight key management scheme for wireless sensor networks. J. Supercomput. 2015;71:4400–4422. doi: 10.1007/s11227-015-1534-5. [DOI] [Google Scholar]
  • 12.Rawat P., Singh K.D., Chaouchi H., Bonnin J.M. Wireless sensor networks: A survey on recent developments and potential synergies. J. Supercomput. 2014;68:1–48. doi: 10.1007/s11227-013-1021-9. [DOI] [Google Scholar]
  • 13.Wong K., Zheng Y., Cao J., Wang S. A dynamic user authentication scheme for wireless sensor networks; Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC); Taichung, Taiwan. 5–7 June 2006; pp. 244–251. [Google Scholar]
  • 14.Tseng H.R., Jan R.H., Yang W. An improved dynamic user authentication scheme for wireless sensor networks; Proceedings of the IEEE Globecom; Washington, DC, USA. 26–30 November 2007; pp. 986–990. [Google Scholar]
  • 15.Lee T.H. Simple dynamic user authentication protocols for wireless sensor networks; Proceedings of the 2nd International Conference on Sensor Technologies and Applications; Cap Esterel, France. 25–31 August 2008; pp. 657–660. [Google Scholar]
  • 16.Das M.L. Two-factor user authentication in wireless sensor Networks. IEEE Trans. Wirel. Commun. 2009;8:1086–1090. doi: 10.1109/TWC.2008.080128. [DOI] [Google Scholar]
  • 17.Huang H.F., Chang Y.F., Liu C.H. Enhancement of two-factor user authentication in wireless sensor networks; Proceedings of the 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP); Darmstadt, Germany. 15–17 October 2010; pp. 27–30. [Google Scholar]
  • 18.Li C.T., Lee C.C., Wang L.J., Liu C.J. A secure billing service with two-factor user authentication in wireless sensor networks. Int. J. Innov. Comput. Inf. Control. 2011;7:4821–4831. [Google Scholar]
  • 19.Yoo S.G., Park K.Y., Kim J. A security-performance-balanced user authentication scheme for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2012;2012:382810. doi: 10.1155/2012/382810. [DOI] [Google Scholar]
  • 20.Xue K., Ma C., Hong P., Ding R. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 2013;36:316–323. doi: 10.1016/j.jnca.2012.05.010. [DOI] [Google Scholar]
  • 21.Liu C.H., Chung Y.F. Secure user authentication scheme for wireless healthcare sensor networks. Comput. Electr. Eng. 2016;59:250–261. doi: 10.1016/j.compeleceng.2016.01.002. [DOI] [Google Scholar]
  • 22.Joux A. The weil and tate pairings as building blocks for public key cryptosystems. Lect. Notes Comput. Sci. 2002;2369:20–32. [Google Scholar]
  • 23.He D., Zhao W., Wu S. Security analysis of a dynamic ID-based authentication scheme for multi-server environment using smart cards. Int. J. Netw. Secur. 2013;15:350–356. [Google Scholar]
  • 24.He D., Zeadally S., Kumar N., Lee J.H. Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 2016 doi: 10.1109/JSYST.2016.2544805. [DOI] [Google Scholar]
  • 25.Wang Y., Zhong H., Xu Y., Cui J. ECPB: Efficient conditional privacy-preserving authentication scheme supporting batch verification for VANETs. Int. J. Netw. Secur. 2016;18:374–382. [Google Scholar]
  • 26.Messerges T.S., Dabbish E.A., Sloan R.H. Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 2002;51:541–552. doi: 10.1109/TC.2002.1004593. [DOI] [Google Scholar]
  • 27.Bellare M., Rogaway P. Random oracles are practical: A paradigm designing efficient protocols; Proceedings of the 1st ACM Conference on Computer and Communications Security; Fairfax, VA, USA. 3–5 November 1993; pp. 62–73. [Google Scholar]
  • 28.Canetti R., Goldreich O., Halevi S. The random oracle metholodology, revisited. J. ACM. 2004;51:557–594. doi: 10.1145/1008731.1008734. [DOI] [Google Scholar]
  • 29.Chen C.M., Li C.T., Liu S., Wu T.Y., Pan J.S. A provable secure private data delegation scheme for mountaineering events in emergency system. IEEE Access. 2017;5:3410–3422. doi: 10.1109/ACCESS.2017.2675163. [DOI] [Google Scholar]
  • 30.Wu T.Y., Tseng Y.M. An efficient user authentication and key exchange protocol for mobile client-server environments. Comput. Netw. 2010;54:1520–1530. doi: 10.1016/j.comnet.2009.12.008. [DOI] [Google Scholar]
  • 31.He D. An efficient remote user authentication and key agreement protocol for mobile client-Vserver environment from pairings. Ad Hoc Netw. 2012;10:1009–1016. doi: 10.1016/j.adhoc.2012.01.002. [DOI] [Google Scholar]
  • 32.Shamus Software. [(accessed on 22 June 2017)]; Available online: https://github.com/miracl/MIRACL.

Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES