Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems

被引:92
|
作者
Chaudhry, Shehzad Ashraf [1 ]
Naqvi, Husnain [1 ]
Shon, Taeshik [2 ]
Sher, Muhammad [1 ]
Farash, Mohammad Sabzinejad [3 ]
机构
[1] Int Islamic Univ Islamabad, Dept Comp Sci & Software Engn, Islamabad, Pakistan
[2] Ajou Univ, Coll Informat Technol, Div Informat & Comp Engn, Suwon 443749, South Korea
[3] Kharazmi Univ, Mohammad Sabzinejad Farash Dept Math & Comp Sci, Tehran, Iran
关键词
Authentication; Authenticated key agreement; Elliptic curve cryptography; Impersonation attack; TMIS; Body area networks; REMOTE USER AUTHENTICATION; KEY AGREEMENT PROTOCOL; EXCHANGE PROTOCOL; EFFICIENT; SCHEME; SECURE; ANONYMITY; ROBUST;
D O I
10.1007/s10916-015-0244-0
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Telecare medical information systems (TMIS) provides rapid and convenient health care services remotely. Efficient authentication is a prerequisite to guarantee the security and privacy of patients in TMIS. Authentication is used to verify the legality of the patients and TMIS server during remote access. Very recently Islam et al. (J. Med. Syst. 38(10): 135, 2014) proposed a two factor authentication protocol for TMIS using elliptic curve cryptography (ECC) to improve Xu et al.'s (J. Med. Syst. 38(1): 9994, 2014) protocol. They claimed their improved protocol to be efficient and provides all security requirements. However our analysis reveals that Islam et al.'s protocol suffers from user impersonation and server impersonation attacks. Furthermore we proposed an enhanced protocol. The proposed protocol while delivering all the virtues of Islam et al.'s protocol resists all known attacks.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems
    Jiang, Qi
    Chen, Zhiren
    Li, Bingyan
    Shen, Jian
    Yang, Li
    Ma, Jianfeng
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1061 - 1073
  • [32] On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems
    Kim, Kee-Won
    Lee, Jae-Dong
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (05)
  • [33] An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Naqvi, Husnain
    Khan, Muhammad Khurram
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (11)
  • [34] An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography
    Shehzad Ashraf Chaudhry
    Khalid Mahmood
    Husnain Naqvi
    Muhammad Khurram Khan
    Journal of Medical Systems, 2015, 39
  • [35] A robust authentication scheme for telecare medical information systems
    Madhusudhan, R.
    Nayak, Chaitanya S.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (11) : 15255 - 15273
  • [36] Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    Chaturvedi, Ankita
    Kumari, Saru
    Khan, Muhammad Khurram
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (06)
  • [37] Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System
    Ryu, Jongseok
    Oh, Jihyeon
    Kwon, Deokkyu
    Son, Seunghwan
    Lee, Joonyoung
    Park, Yohan
    Park, Youngho
    IEEE ACCESS, 2022, 10 : 11511 - 11526
  • [38] On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems
    Lin, Han-Yu
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
  • [39] Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems
    Li, Chun-Ta
    Shih, Dong-Her
    Wang, Chun-Cheng
    COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2018, 157 : 191 - 203
  • [40] A Secure Authentication and Key Agreement Protocol for Telecare Medicine Information System
    Li, Xuanang
    Zheng, Zhiming
    Zhang, Xiao
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 275 - 281