Literature DB >> 23689993

Cryptanalysis and improvement of 'A privacy enhanced scheme for telecare medical information systems'.

Saru Kumari1, Muhammad Khurram Khan, Rahul Kumar.   

Abstract

To ensure reliable telecare services some user authentication schemes for telecare medical information system (TMIS) have been presented in literature. These schemes are proposed with intent to regulate only authorized access to medical services so that medical information can be protected from misuse. Very recently Jiang et al. proposed a user authentication scheme for TMIS which they claimed to provide enhanced privacy. They made use of symmetric encryption/decryption with cipher block chaining mode (CBC) to achieve the claimed user privacy. Their scheme provides features like user anonymity and user un-traceability unlike its preceding schemes on which it is built. Unluckily, authors overlook some important aspects in designing their scheme due to which it falls short to resist user impersonation attack, guessing attacks and denial of service attack. Besides, its password change phase is not secure; air message confidentiality is at risk and also has some other drawbacks. Therefore, we propose an improved scheme free from problems observed in Jiang et al.'s scheme and more suitable for TMIS.

Mesh:

Year:  2013        PMID: 23689993     DOI: 10.1007/s10916-013-9952-5

Source DB:  PubMed          Journal:  J Med Syst        ISSN: 0148-5598            Impact factor:   4.460


  11 in total

1.  An efficient authentication scheme for telecare medicine information systems.

Authors:  Zhian Zhu
Journal:  J Med Syst       Date:  2012-04-25       Impact factor: 4.460

2.  An improved authentication scheme for telecare medicine information systems.

Authors:  Jianghong Wei; Xuexian Hu; Wenfen Liu
Journal:  J Med Syst       Date:  2012-02-29       Impact factor: 4.460

3.  Design and implementation of a telecare information platform.

Authors:  Shing-Han Li; Ching-Yao Wang; Wen-Hui Lu; Yuan-Yuan Lin; David C Yen
Journal:  J Med Syst       Date:  2010-12-01       Impact factor: 4.460

4.  A secure authentication scheme for telecare medicine information systems.

Authors:  Zhen-Yu Wu; Yueh-Chun Lee; Feipei Lai; Hung-Chang Lee; Yufang Chung
Journal:  J Med Syst       Date:  2010-10-27       Impact factor: 4.460

5.  A cryptographic key management solution for HIPAA privacy/security regulations.

Authors:  W-B Lee; C-D Lee
Journal:  IEEE Trans Inf Technol Biomed       Date:  2008-01

6.  A more secure authentication scheme for telecare medicine information systems.

Authors:  He Debiao; Chen Jianhua; Zhang Rui
Journal:  J Med Syst       Date:  2011-03-01       Impact factor: 4.460

7.  Strong authentication scheme for telecare medicine information systems.

Authors:  Qiong Pu; Jian Wang; Rongyong Zhao
Journal:  J Med Syst       Date:  2011-05-19       Impact factor: 4.460

8.  A privacy enhanced authentication scheme for telecare medical information systems.

Authors:  Qi Jiang; Jianfeng Ma; Zhuo Ma; Guangsong Li
Journal:  J Med Syst       Date:  2013-01-12       Impact factor: 4.460

9.  Managing medical and insurance information through a smart-card-based information system.

Authors:  C Lambrinoudakis; S Gritzalis
Journal:  J Med Syst       Date:  2000-08       Impact factor: 4.460

10.  Technical guidelines for enhancing privacy and data protection in modern electronic medical environments.

Authors:  Stefanos Gritzalis; Costas Lambrinoudakis; Dimitrios Lekkas; Spyros Deftereos
Journal:  IEEE Trans Inf Technol Biomed       Date:  2005-09
View more
  29 in total

1.  A secure biometrics-based authentication scheme for telecare medicine information systems.

Authors:  Xiaopeng Yan; Weiheng Li; Ping Li; Jiantao Wang; Xinhong Hao; Peng Gong
Journal:  J Med Syst       Date:  2013-08-31       Impact factor: 4.460

2.  An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing.

Authors:  Vinod Kumar; Srinivas Jangirala; Musheer Ahmad
Journal:  J Med Syst       Date:  2018-06-28       Impact factor: 4.460

3.  Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems.

Authors:  Shehzad Ashraf Chaudhry; Husnain Naqvi; Taeshik Shon; Muhammad Sher; Mohammad Sabzinejad Farash
Journal:  J Med Syst       Date:  2015-04-26       Impact factor: 4.460

4.  On the security flaws in ID-based password authentication schemes for telecare medical information systems.

Authors:  Dheerendra Mishra
Journal:  J Med Syst       Date:  2014-11-23       Impact factor: 4.460

5.  The current and future needs of our medical systems.

Authors:  Jesse M Ehrenfeld
Journal:  J Med Syst       Date:  2015-02-01       Impact factor: 4.460

6.  A Double Chaotic Layer Encryption Algorithm for Clinical Signals in Telemedicine.

Authors:  M A Murillo-Escobar; L Cardoza-Avendaño; R M López-Gutiérrez; C Cruz-Hernández
Journal:  J Med Syst       Date:  2017-02-28       Impact factor: 4.460

Review 7.  A Survey of Authentication Schemes in Telecare Medicine Information Systems.

Authors:  Muhammad Umair Aslam; Abdelouahid Derhab; Kashif Saleem; Haider Abbas; Mehmet Orgun; Waseem Iqbal; Baber Aslam
Journal:  J Med Syst       Date:  2016-11-30       Impact factor: 4.460

8.  A Selective Group Authentication Scheme for IoT-Based Medical Information System.

Authors:  YoHan Park; YoungHo Park
Journal:  J Med Syst       Date:  2017-02-15       Impact factor: 4.460

9.  On the security of two remote user authentication schemes for telecare medical information systems.

Authors:  Kee-Won Kim; Jae-Dong Lee
Journal:  J Med Syst       Date:  2014-04-29       Impact factor: 4.460

10.  A comprehensive survey of energy-aware routing protocols in wireless body area sensor networks.

Authors:  Mehdi Effatparvar; Mehdi Dehghan; Amir Masoud Rahmani
Journal:  J Med Syst       Date:  2016-07-28       Impact factor: 4.460

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.