Page 175 - ITU KALEIDOSCOPE, ATLANTA 2019
P. 175

THOUGHT-BASED AUTHENTICATED KEY EXCHANGE



                                                      Phillip H. Griffin

                                                 Griffin Information Security


                              ABSTRACT                        "universal access to health care for all a reality – across the
                                                              globe" [3]. With over "95% of the world population" being
           Identity  authentication  techniques  based  on  password-  "covered  by  mobile  networks"  as  of  December  2018  and
           authenticated key exchange (PAKE) protocols rely on weak   over "7 billion mobile subscriptions in the world" [3], ICT
           secrets shared between users and host systems. In PAKE, a   is poised to connect patients to the "social services, health
           symmetric  key  is  derived  from  the  shared  secret,  used  to   workers, and care agencies" that  can help them overcome
           mutually  authenticate  communicating  parties,  and  then   their healthcare challenges [2].
           used  to  establish  a  secure  channel  for  subsequent
           communications. A common source of PAKE weak secrets   Though there have been notable improvements in achieving
           are  password  and  passphrase  strings.  Though  easily   SDG outcomes, there is still much more work to be done.
           recalled by a user, these inputs typically require keyboard   ICT promises to play an increasingly important roll in this
           entry,  limiting  their  utility  in  achieving  universal  access.   work,  as  it  is  the  "technology  with  the  greatest  impact  in
           This  paper  describes  authentication  techniques  based  on   promoting  the  inclusion  of  persons  with  disabilities"  [4],
           weak  secrets  derived  from  knowledge  extracted  from   and it has the ability to eliminate isolation of the elderly by
           biometric sensors and brain-actuated control systems. The   "connecting them to the world around them" [5]. With the
           derived secrets are converted into a format suitable for use   growing availability of smart phones, wireless and mobile
           by  a  PAKE  protocol.  When  combined  with  other   computing,  ICT  can  deliver  a  new  age,  "not  only  of
           authentication factors, PAKE protocols can be extended to   information  sharing  in  general,  but  of  the  proliferation  of
           provide  strong,  two-factor  identity  authentication  that  is   web-based  services" and mobile access that can help bring
           easy to use by persons living in assistive environments.   health  and  wellbeing  to  both  " disabled  and  non-disabled
                                                              communities alike" [4].
              Keywords – assistive environments, authentication,
                     biometrics, key exchange, security       It is especially important to remediate security risk for those
                                                              people requiring assistive living services, and for those who
                         1.  INTRODUCTION                     depend  on  telemedicine.  The  delivery  of  ICT  "services
                                                              provided  through  cloud  and  web-based  systems  over
           In  2017,  the  World  Health  Organization  (WHO)  reported   unsecured  public  networks  exposes  this  vulnerable
           that more than "one billion people worldwide - about 15%   population  to  increased  security  risk"  [5].  Authentication
           of the world's population" are persons with some form of   and secure communications are crucial security controls for
           disability  [1].  Earlier  United  Nations  (UN)  and  WHO   those  who  must  rely  on  telemedicine,  which  uses
           reports predicted a tripling of the number of "people aged   "telecommunications  to,  remotely,  provide  medical
           65 or older"  in 2010 "to 1.5 billion in 2050, 16 % of the   information and services” and to reliably “transfer medical
           entire world population" [2]. As the numbers of elderly and   information and services from one place to another" [6].
           disabled people continue to grow, more of them are striving
           to retain their autonomy and remain in their homes. As the   Providing vulnerable populations and their caregivers who
           cost  of  healthcare  continues  to  rise,  governments  have   rely on these systems with security assurance begins with
           struggled to find ways of providing care to these vulnerable   reliable mutual authentication that is accessible by everyone.
           populations.                                       A  user-centric  approach  guided  by  the  design  goals  of
                                                              universal access can help to ensure that inclusive outcomes
           Ambient  assisted  living  (AAL)  aims  to  achieve  the  UN   are  achieved.  Providing  data  confidentiality  and  secure
           Sustainable Development Goal (SDG) of ensuring healthy   communications  solutions  that  combat  man-in-the-middle
           lives and promoting the wellbeing of all people, regardless   and phishing attacks is also critical. These goals can be met
           of their age, location or income. At its core, AAL relies on   by  extending  the  capabilities  and  scope  of  an  existing
           the  use  of  information  and  communications  technology   protocol  used  for  secure  authentication,  Recommendation
           (ICT)  innovation,  networks  and  standards  to  deliver   ITU-T X.1035.
           services that increase "the life quality of patients" and "their
           relatives"  [2].  ICT  and  "specifically  mHealth  solutions"
           provide new opportunities to bring access to healthcare and
           AAL  services  "to people  in  remote  areas"  and  to  make





           978-92-61-28401-5/CFP1968P-ART @ ITU 2019      – 155 –                                    Kaleidoscope
   170   171   172   173   174   175   176   177   178   179   180