Literature DB >> 24194093

Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems.

Wei-Chuen Yau1, Raphael C-W Phan.   

Abstract

Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system.

Entities:  

Mesh:

Year:  2013        PMID: 24194093     DOI: 10.1007/s10916-013-9993-9

Source DB:  PubMed          Journal:  J Med Syst        ISSN: 0148-5598            Impact factor:   4.460


  5 in total

1.  An efficient authentication scheme for telecare medicine information systems.

Authors:  Zhian Zhu
Journal:  J Med Syst       Date:  2012-04-25       Impact factor: 4.460

2.  An improved authentication scheme for telecare medicine information systems.

Authors:  Jianghong Wei; Xuexian Hu; Wenfen Liu
Journal:  J Med Syst       Date:  2012-02-29       Impact factor: 4.460

3.  A secure authentication scheme for telecare medicine information systems.

Authors:  Zhen-Yu Wu; Yueh-Chun Lee; Feipei Lai; Hung-Chang Lee; Yufang Chung
Journal:  J Med Syst       Date:  2010-10-27       Impact factor: 4.460

4.  A more secure authentication scheme for telecare medicine information systems.

Authors:  He Debiao; Chen Jianhua; Zhang Rui
Journal:  J Med Syst       Date:  2011-03-01       Impact factor: 4.460

5.  A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

Authors:  Tian-Fu Lee; Chuan-Ming Liu
Journal:  J Med Syst       Date:  2013-03-15       Impact factor: 4.460

  5 in total
  8 in total

1.  Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

Authors:  Hamed Arshad; Morteza Nikooghadam
Journal:  J Med Syst       Date:  2014-10-29       Impact factor: 4.460

2.  A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications.

Authors:  Arezou Ostad-Sharif; Dariush Abbasinezhad-Mood; Morteza Nikooghadam
Journal:  J Med Syst       Date:  2018-12-01       Impact factor: 4.460

3.  A Double Chaotic Layer Encryption Algorithm for Clinical Signals in Telemedicine.

Authors:  M A Murillo-Escobar; L Cardoza-Avendaño; R M López-Gutiérrez; C Cruz-Hernández
Journal:  J Med Syst       Date:  2017-02-28       Impact factor: 4.460

4.  On securing wireless sensor network--novel authentication scheme against DOS attacks.

Authors:  K Nirmal Raja; M Marsaline Beno
Journal:  J Med Syst       Date:  2014-08-09       Impact factor: 4.460

5.  Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems.

Authors:  S K Hafizul Islam; Muhammad Khurram Khan
Journal:  J Med Syst       Date:  2014-09-05       Impact factor: 4.460

6.  Chaos based encryption system for encrypting electroencephalogram signals.

Authors:  Chin-Feng Lin; Shun-Han Shih; Jin-De Zhu
Journal:  J Med Syst       Date:  2014-04-15       Impact factor: 4.460

7.  A more secure anonymous user authentication scheme for the integrated EPR information system.

Authors:  Fengtong Wen
Journal:  J Med Syst       Date:  2014-04-24       Impact factor: 4.460

8.  Security Analysis and Improvement of 'a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System'.

Authors:  S K Hafizul Islam; Muhammad Khurram Khan; Xiong Li
Journal:  PLoS One       Date:  2015-08-11       Impact factor: 3.240

  8 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.