Skip to main content

Cryptanalysis of an Authenticated Key Agreement Scheme for Fog-driven IoT Healthcare System

  • Conference paper
  • First Online:
Advances in Smart Vehicular Technology, Transportation, Communication and Applications

Abstract

Under the influence of the rapid development of fog computing, many new technologies and environments that combine fog computing with IoT have been proposed. Recently, Jia et al. proposed a three-party authentication key protocol scheme that can prove security for the fog-driven IoT medical system. They claimed their scheme can resist several well-known attacks. In this paper, we point out their scheme has some security flaws based on Canetti-Krawczyk’s adversarial model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Al Hamid, H.A., Rahman, S.M.M., Hossain, M.S., Almogren, A., Alamri, A.: A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5, 22313–22328 (2017)

    Google Scholar 

  2. Ali, R., Pal, A.K.: An efficient three factor-based authentication scheme in multiserver environment using ECC. Int. J. Commun. Syst. 31(4) (2018)

    Google Scholar 

  3. Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) Advances in Cryptology—EUROCRYPT 2001, pp. 453–474. Springer, Berlin, Heidelberg (2001)

    Chapter  Google Scholar 

  4. Challa, S., Das, A.K., Odelu, V., Kumar, N., Kumari, S., Khan, M.K., Vasilakos, A.V.: An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput. Electr. Eng. 69, 534–554 (2018)

    Article  Google Scholar 

  5. Gupta, P.C., Dhar, J.: Hash based multi-server key exchange protocol using smart card. Wirel. Pers. Commun. 87(1), 225–244 (2016)

    Article  Google Scholar 

  6. Huang, C., Lu, R., Choo, K.K.R.: Vehicular fog computing: architecture, use case, and security and forensic challenges. IEEE Commun. Mag. 55(11), 105–111 (2017)

    Article  Google Scholar 

  7. Jia, X., He, D., Kumar, N., Choo, K.K.R.: Authenticated key agreement scheme for fog-driven IoT healthcare system. Wirel. Netw. 1–14 (2018)

    Google Scholar 

  8. Karuppiah, M., Das, A.K., Li, X., Kumari, S., Wu, F., Chaudhry, S.A., Niranchana, R.: Secure remote user mutual authentication scheme with key agreement for cloud environment. Mob. Netw. Appl. 24(3), 1046–1062 (2019)

    Article  Google Scholar 

  9. Kaul, S.D., Awasthi, A.K.: Security enhancement of an improved remote user authentication scheme with key agreement. Wirel. Pers. Commun. 89(2), 621–637 (2016)

    Article  Google Scholar 

  10. Li, X., Peng, J., Obaidat, M.S., Wu, F., Khan, M.K., Chen, C.: A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Syst. J. (2019)

    Google Scholar 

  11. Osanaiye, O., Chen, S., Yan, Z., Lu, R., Choo, K.K.R., Dlodlo, M.: From cloud to fog computing: a review and a conceptual live VM migration framework. IEEE Access 5, 8284–8300 (2017)

    Article  Google Scholar 

  12. Park, K., Park, Y., Das, A.K., Yu, S., Lee, J., Park, Y.: A dynamic privacy-preserving key management protocol for v2g in social internet of things. IEEE Access (2019)

    Google Scholar 

  13. Shen, J., Zhou, T., Wei, F., Sun, X., Xiang, Y.: Privacy-preserving and lightweight key agreement protocol for v2g in the social internet of things. IEEE Internet Things J. 5(4), 2526–2536 (2017)

    Article  Google Scholar 

  14. Soni, P., Pal, A.K., Islam, S.H.: An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system. Comput. Methods Programs Biomed. 182 (2019)

    Google Scholar 

  15. Tomar, A., Dhar, J.: An ECC based secure authentication and key exchange scheme in multi-server environment. Wirel. Pers. Commun. 1–22 (2019)

    Google Scholar 

  16. Wang, F., Xu, G., Wang, C., Peng, J.: A provably secure biometrics-based authentication scheme for multiserver environment. Secur. Commun. Netw. 2019 (2019)

    Google Scholar 

Download references

Ackonwledgments

The work was supported in part by the Natural Science Foundation of Fujian Province under Grant no. 2018J01636 and the Science and Technology Development Center, Ministry of Education, China under Grant no. 2017A13025.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, T. et al. (2021). Cryptanalysis of an Authenticated Key Agreement Scheme for Fog-driven IoT Healthcare System. In: Balas, V.E., Pan, JS., Wu, TY. (eds) Advances in Smart Vehicular Technology, Transportation, Communication and Applications. Smart Innovation, Systems and Technologies, vol 226. Springer, Singapore. https://doi.org/10.1007/978-981-16-1209-1_11

Download citation

Publish with us

Policies and ethics