Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications

被引:0
|
作者
Xiong Li
Jianwei Niu
Marimuthu Karuppiah
Saru Kumari
Fan Wu
机构
[1] Beihang University,State Key Laboratory of Virtual Reality Technology and Systems, School of Computer Science and Engineering
[2] Hunan University of Science and Technology,School of Computer Science and Engineering
[3] VIT University,School of Computing Science and Engineering
[4] Ch. Charan Singh University,Department of Mathematics
[5] Xiamen Institute of Technology,Department of Computer Science and Engineering
来源
Journal of Medical Systems | 2016年 / 40卷
关键词
E-health care systems; Authentication; Dynamic identity; Privacy protection;
D O I
暂无
中图分类号
学科分类号
摘要
Benefited from the development of network and communication technologies, E-health care systems and telemedicine have got the fast development. By using the E-health care systems, patient can enjoy the remote medical service provided by the medical server. Medical data are important privacy information for patient, so it is an important issue to ensure the secure of transmitted medical data through public network. Authentication scheme can thwart unauthorized users from accessing services via insecure network environments, so user authentication with privacy protection is an important mechanism for the security of E-health care systems. Recently, based on three factors (password, biometric and smart card), an user authentication scheme for E-health care systems was been proposed by Amin et al., and they claimed that their scheme can withstand most of common attacks. Unfortunate, we find that their scheme cannot achieve the untraceability feature of the patient. Besides, their scheme lacks a password check mechanism such that it is inefficient to find the unauthorized login by the mistake of input a wrong password. Due to the same reason, their scheme is vulnerable to Denial of Service (DoS) attack if the patient updates the password mistakenly by using a wrong password. In order improve the security level of authentication scheme for E-health care application, a robust user authentication scheme with privacy protection is proposed for E-health care systems. Then, security prove of our scheme are analysed. Security and performance analyses show that our scheme is more powerful and secure for E-health care systems when compared with other related schemes.
引用
收藏
相关论文
共 50 条
  • [31] An Efficient Remote User Authentication Scheme with Strong Anonymity
    Liu, Yanfei
    Zhao, Ziming
    Li, Hui
    Luo, Qun
    Yang, Yixian
    PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON CYBERWORLDS, 2008, : 180 - 185
  • [32] An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
    He, Daojing
    Gao, Yi
    Chan, Sammy
    Chen, Chun
    Bu, Jiajun
    AD HOC & SENSOR WIRELESS NETWORKS, 2010, 10 (04) : 361 - 371
  • [33] Cryptanalysis and improvement of a two-factor user authentication scheme for smart home
    Kaur, Damandeep
    Kumar, Devender
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [34] A MORE SECURE AND EFFICIENT AUTHENTICATION SCHEME WITH ROAMING SERVICE AND USER ANONYMITY FOR MOBILE COMMUNICATIONS
    Li, Chun-Ta
    INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (01): : 69 - 76
  • [35] An efficient improvement remote user mutual authentication and session key agreement scheme for E-health care systems
    Ravanbakhsh, Niloofar
    Nazari, Mahboubeh
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (01) : 55 - 88
  • [36] An efficient improvement remote user mutual authentication and session key agreement scheme for E-health care systems
    Niloofar Ravanbakhsh
    Mahboubeh Nazari
    Multimedia Tools and Applications, 2018, 77 : 55 - 88
  • [37] More secure smart card-based remote user password authentication scheme with user anonymity
    Kumari, Saru
    Khan, Muhammad Khurram
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2039 - 2053
  • [38] Two-Factor User Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem
    Qu, Juan
    Tan, Xiao-Ling
    JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2014, 2014
  • [39] A Usable and Secure Two-Factor Authentication Scheme
    Akram, Syed
    Misbahuddin, Mohammed
    Varaprasad, G.
    INFORMATION SECURITY JOURNAL, 2012, 21 (04): : 169 - 182
  • [40] Proposing Secure and Lightweight Authentication Scheme for IoT Based E-Health Applications
    Almulhim, Maria
    Zaman, Noor
    2018 20TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2018, : 481 - 487