On the Security Flaws in ID-based Password Authentication Schemes for Telecare Medical Information Systems

被引:36
作者
Mishra, Dheerendra [1 ]
机构
[1] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
关键词
Telecare medical information system; Password based authentication; Smart card; Security; Privacy; ELECTRONIC HEALTH RECORD; POWER ANALYSIS; EFFICIENT;
D O I
10.1007/s10916-014-0154-6
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.
引用
收藏
页数:16
相关论文
共 41 条
[1]  
[Anonymous], IACR CRYPTOLOGY EPRI
[2]  
[Anonymous], ARXIV13110151
[3]  
Boyd Colin., 2003, INF SECUR CRYTOGR
[4]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[5]   Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems [J].
Cao, Tianjie ;
Zhai, Jingxuan .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
[6]   An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems [J].
Chen, Hung-Ming ;
Lo, Jung-Wen ;
Yeh, Chang-Kuo .
JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) :3907-3915
[7]   An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System [J].
Das, Ashok Kumar ;
Bruhadeshwar, Bezawada .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (05)
[8]  
Eisenbarth T, 2008, LECT NOTES COMPUT SC, V5157, P203, DOI 10.1007/978-3-540-85174-5_12
[9]   A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems [J].
Hao, Xinhong ;
Wang, Jiantao ;
Yang, Qinghai ;
Yan, Xiaopeng ;
Li, Ping .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
[10]   Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks [J].
He, Debiao ;
Kumar, Neeraj ;
Chen, Jianhua ;
Lee, Cheng-Chi ;
Chilamkurti, Naveen ;
Yeo, Seng-Soo .
MULTIMEDIA SYSTEMS, 2015, 21 (01) :49-60