Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems

被引:92
|
作者
Chaudhry, Shehzad Ashraf [1 ]
Naqvi, Husnain [1 ]
Shon, Taeshik [2 ]
Sher, Muhammad [1 ]
Farash, Mohammad Sabzinejad [3 ]
机构
[1] Int Islamic Univ Islamabad, Dept Comp Sci & Software Engn, Islamabad, Pakistan
[2] Ajou Univ, Coll Informat Technol, Div Informat & Comp Engn, Suwon 443749, South Korea
[3] Kharazmi Univ, Mohammad Sabzinejad Farash Dept Math & Comp Sci, Tehran, Iran
关键词
Authentication; Authenticated key agreement; Elliptic curve cryptography; Impersonation attack; TMIS; Body area networks; REMOTE USER AUTHENTICATION; KEY AGREEMENT PROTOCOL; EXCHANGE PROTOCOL; EFFICIENT; SCHEME; SECURE; ANONYMITY; ROBUST;
D O I
10.1007/s10916-015-0244-0
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Telecare medical information systems (TMIS) provides rapid and convenient health care services remotely. Efficient authentication is a prerequisite to guarantee the security and privacy of patients in TMIS. Authentication is used to verify the legality of the patients and TMIS server during remote access. Very recently Islam et al. (J. Med. Syst. 38(10): 135, 2014) proposed a two factor authentication protocol for TMIS using elliptic curve cryptography (ECC) to improve Xu et al.'s (J. Med. Syst. 38(1): 9994, 2014) protocol. They claimed their improved protocol to be efficient and provides all security requirements. However our analysis reveals that Islam et al.'s protocol suffers from user impersonation and server impersonation attacks. Furthermore we proposed an enhanced protocol. The proposed protocol while delivering all the virtues of Islam et al.'s protocol resists all known attacks.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems
    Dianli Guo
    Qiaoyan Wen
    Wenmin Li
    Hua Zhang
    Zhengping Jin
    Journal of Medical Systems, 2015, 39
  • [22] Cryptanalysis and improvement of REAS-TMIS: Resource-efficient authentication scheme for telecare medical information system
    Kumar, C. Madan
    Amin, Ruhul
    Brindha, M.
    SECURITY AND PRIVACY, 2023, 6 (01)
  • [23] On the Security of Three-factor Authentication Scheme for Telecare Medical Information Systems
    Jiang, Qi
    Li, Bingyan
    Ma, Jianfeng
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 879 - 884
  • [24] An Improved Authentication Scheme for Telecare Medicine Information Systems
    Wei, Jianghong
    Hu, Xuexian
    Liu, Wenfen
    JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) : 3597 - 3604
  • [25] An Improved Authentication Scheme for Telecare Medicine Information Systems
    Jianghong Wei
    Xuexian Hu
    Wenfen Liu
    Journal of Medical Systems, 2012, 36 : 3597 - 3604
  • [26] On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems
    Kee-Won Kim
    Jae-Dong Lee
    Journal of Medical Systems, 2014, 38
  • [27] On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems
    Kim, Kee-Won
    Lee, Jae-Dong
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (05)
  • [28] A robust authentication scheme for telecare medical information systems
    R. Madhusudhan
    Chaitanya S. Nayak
    Multimedia Tools and Applications, 2019, 78 : 15255 - 15273
  • [29] A Secure Authentication Scheme for Telecare Medical Information Systems
    Chang, Chin-Chen
    Lee, Jung-San
    Lo, Yu-Ya
    Liu, Yanjun
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, 2017, 63 : 303 - 312
  • [30] A robust authentication scheme for telecare medical information systems
    Madhusudhan, R.
    Nayak, Chaitanya S.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (11) : 15255 - 15273