On the Security Flaws in ID-based Password Authentication Schemes for Telecare Medical Information Systems

被引:0
|
作者
Dheerendra Mishra
机构
[1] Indian Institute of Technology Kharagpur,Department of Mathematics
来源
关键词
Telecare medical information system; Password based authentication; Smart card; Security; Privacy;
D O I
暂无
中图分类号
学科分类号
摘要
Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu’s for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai’s scheme to known session specific temporary information attack, vulnerability of Wu and Xu’s scheme to off-line password guessing attack, and vulnerability of Xie et al.’s scheme to untraceable on-line password guessing attack.
引用
收藏
相关论文
共 50 条
  • [21] Security analysis and Improvement of a Privacy Authentication Scheme for Telecare Medical Information Systems
    Fan Wu
    Lili Xu
    Journal of Medical Systems, 2013, 37
  • [22] Security Analysis and Improvement of a Privacy Authentication Scheme for Telecare Medical Information Systems
    Wu, Fan
    Xu, Lili
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (04)
  • [23] Security Improvement of Two Dynamic ID-based Authentication Schemes by Sood-Sarje-Singh
    Martinez-Pelaez, R.
    Rico-Novella, F.
    Forne, J.
    Velarde-Alvarado, P.
    JOURNAL OF APPLIED RESEARCH AND TECHNOLOGY, 2013, 11 : 755 - 763
  • [24] Provable security of ID-based proxy signature schemes
    Gu, CX
    Zhu, YF
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1277 - 1286
  • [25] Security Vulnerability of ID-Based Key Sharing Schemes
    Hwang, JungYeon
    Youn, Taek-Young
    Susilo, Willy
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (10): : 2641 - 2643
  • [26] Understanding Security Failures of Two Authentication and Key Agreement Schemes for Telecare Medicine Information Systems
    Dheerendra Mishra
    Journal of Medical Systems, 2015, 39
  • [27] Understanding Security Failures of Two Authentication and Key Agreement Schemes for Telecare Medicine Information Systems
    Mishra, Dheerendra
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (03)
  • [28] Three ID-based information security functions
    Lee, WB
    Chang, CC
    COMPUTER COMMUNICATIONS, 1997, 20 (14) : 1301 - 1307
  • [29] A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems
    Masdari, Mohammad
    Ahmadzadeh, Safiyyeh
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 87 : 1 - 19
  • [30] A robust authentication scheme for telecare medical information systems
    R. Madhusudhan
    Chaitanya S. Nayak
    Multimedia Tools and Applications, 2019, 78 : 15255 - 15273