Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications

被引:0
|
作者
Xiong Li
Jianwei Niu
Marimuthu Karuppiah
Saru Kumari
Fan Wu
机构
[1] Beihang University,State Key Laboratory of Virtual Reality Technology and Systems, School of Computer Science and Engineering
[2] Hunan University of Science and Technology,School of Computer Science and Engineering
[3] VIT University,School of Computing Science and Engineering
[4] Ch. Charan Singh University,Department of Mathematics
[5] Xiamen Institute of Technology,Department of Computer Science and Engineering
来源
Journal of Medical Systems | 2016年 / 40卷
关键词
E-health care systems; Authentication; Dynamic identity; Privacy protection;
D O I
暂无
中图分类号
学科分类号
摘要
Benefited from the development of network and communication technologies, E-health care systems and telemedicine have got the fast development. By using the E-health care systems, patient can enjoy the remote medical service provided by the medical server. Medical data are important privacy information for patient, so it is an important issue to ensure the secure of transmitted medical data through public network. Authentication scheme can thwart unauthorized users from accessing services via insecure network environments, so user authentication with privacy protection is an important mechanism for the security of E-health care systems. Recently, based on three factors (password, biometric and smart card), an user authentication scheme for E-health care systems was been proposed by Amin et al., and they claimed that their scheme can withstand most of common attacks. Unfortunate, we find that their scheme cannot achieve the untraceability feature of the patient. Besides, their scheme lacks a password check mechanism such that it is inefficient to find the unauthorized login by the mistake of input a wrong password. Due to the same reason, their scheme is vulnerable to Denial of Service (DoS) attack if the patient updates the password mistakenly by using a wrong password. In order improve the security level of authentication scheme for E-health care application, a robust user authentication scheme with privacy protection is proposed for E-health care systems. Then, security prove of our scheme are analysed. Security and performance analyses show that our scheme is more powerful and secure for E-health care systems when compared with other related schemes.
引用
收藏
相关论文
共 50 条
  • [41] Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain
    Kang, Dongwoo
    Jung, Jaewook
    Mun, Jongho
    Lee, Donghoon
    Choi, Younsung
    Won, Dongho
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1462 - 1476
  • [42] A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS
    Li, Chun-Ta
    Lee, Cheng-Chi
    Wang, Lian-Jun
    Liu, Chen-Ju
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (08): : 4821 - 4831
  • [43] An Efficient Two-Factor User Authentication Framework for Wireless Sensor Networks
    Zhao, Jingying
    Guo, Hai
    Wei, Wei
    COMPUTATIONAL MECHANICS, MATERIALS AND ENGINEERING APPLICATIONS, 2012, 147 : 320 - 323
  • [44] Hardware based Two-Factor User Authentication for the Internet of Things
    Gurabi, Mehdi Akbari
    Alfandi, Omar
    Bochem, Arne
    Hogrefe, Dieter
    2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2018, : 1081 - 1086
  • [45] An efficient secure authentication on cloud based e-health care system in WBAN
    Rani, A. Antony Viswasa
    Baburaj, E.
    BIOMEDICAL RESEARCH-INDIA, 2016, 27 : S53 - S59
  • [46] An Enhanced Secure Authentication Scheme with User Anonymity in Mobile Cloud Computing
    Madhusudhan, R.
    Suvidha, K. S.
    2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 17 - 22
  • [47] Provably Secure Mutual Authentication and Key Agreement Scheme with User Anonymity
    Hwang, Tzonelih
    Gope, Prosanta
    2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,
  • [48] A secure authentication and key agreement scheme for roaming service with user anonymity
    Arshad, Hamed
    Rasoolzadegan, Abbas
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (18)
  • [49] Efficient and secure source authentication scheme for multicast user authentication
    Jeong, Yoon-su
    Lee, Sang-hyuk
    Shin, Seung-soo
    JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2013, 20 (10) : 2741 - 2746
  • [50] Efficient and secure source authentication scheme for multicast user authentication
    JEONG Yoon-su
    LEE Sang-hyuk
    SHIN Seung-soo
    JournalofCentralSouthUniversity, 2013, 20 (10) : 2741 - 2746