A Secure Authentication Scheme for Telecare Medicine Information Systems

被引:204
作者
Wu, Zhen-Yu [1 ]
Lee, Yueh-Chun [2 ]
Lai, Feipei [1 ,3 ,5 ]
Lee, Hung-Chang [4 ]
Chung, Yufang [6 ]
机构
[1] Natl Taiwan Univ, Dept Comp Sci & Informat Engn, Taipei 10764, Taiwan
[2] Natl Taiwan Univ, Grad Inst Networking & Multimedia, Taipei 10764, Taiwan
[3] Natl Taiwan Univ, Dept Elect Engn, Taipei 10764, Taiwan
[4] Tamkang Univ, Dept Informat Management, Taipei, Taiwan
[5] Natl Taiwan Univ, Grad Inst Biomed Elect & Bioinformat, Taipei 10764, Taiwan
[6] Tunghai Univ, Dept Elect Engn, Taichung 40704, Taiwan
关键词
Telecare medicine information system; Authentication scheme; Efficiency; Pre-computing; Time-consuming; REMOTE AUTHENTICATION; PUBLIC-KEY; SMART; PROTECTION; EFFICIENT; PRIVACY;
D O I
10.1007/s10916-010-9614-9
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
The telecare medicine information system enables or supports health-care delivery services. In recent years, the increased availability of lower-cost telecommunications systems and custom made physiological monitoring devices for patients have made it possible to bring the advantages of telemedicine directly into the patient's home. These systems are moving towards an environment where automated patient medical records and electronically interconnected telecare facilities are prevalent. A secure authentication scheme will thus be needed to safeguard data integrity, confidentiality, and availability. Many schemes based on cryptography have been proposed for the goals. However, much of the schemes are vulnerable to various attacks, and are neither efficient, nor user friendly. Specially, in terms of efficiency, some schemes need the exponential computation resulting in high time cost. Therefore, we propose a novel authentication scheme that is added the pre-computing idea within the communication process to avoid the time-consuming exponential computations. Finally, it is shown to be more secure and practical for telecare medicine environments.
引用
收藏
页码:1529 / 1535
页数:7
相关论文
共 21 条
[1]  
Chen CL, 2009, INT J INNOV COMPUT I, V5, P1243
[2]   An efficient and practical solution to remote authentication: Smart card [J].
Chien, HY ;
Jan, JK ;
Tseng, YM .
COMPUTERS & SECURITY, 2002, 21 (04) :372-375
[3]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[4]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[5]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[6]   Technical guidelines for enhancing privacy and data protection in modern electronic medical environments [J].
Gritzalis, S ;
Lambrinoudakis, C ;
Lekkas, D ;
Deftereos, S .
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2005, 9 (03) :413-423
[7]   Security issues for implementation of e-medical records [J].
Huston, T .
COMMUNICATIONS OF THE ACM, 2001, 44 (09) :89-94
[8]  
Jones D., 2003, CORD TECHNOLOGY TODA, V15
[9]   Managing medical and insurance information through a smart-card-based information system [J].
Lambrinoudakis C. ;
Gritzalis S. .
Journal of Medical Systems, 2000, 24 (4) :213-234
[10]   Improved remote authentication scheme with smart card [J].
Lee, NY ;
Chiu, YC .
COMPUTER STANDARDS & INTERFACES, 2005, 27 (02) :177-180