Literature DB >> 24777588

On the security of two remote user authentication schemes for telecare medical information systems.

Kee-Won Kim1, Jae-Dong Lee.   

Abstract

The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes.

Entities:  

Mesh:

Year:  2014        PMID: 24777588     DOI: 10.1007/s10916-014-0017-1

Source DB:  PubMed          Journal:  J Med Syst        ISSN: 0148-5598            Impact factor:   4.460


  6 in total

1.  An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

Authors:  Hung-Ming Chen; Jung-Wen Lo; Chang-Kuo Yeh
Journal:  J Med Syst       Date:  2012-06-07       Impact factor: 4.460

2.  A privacy enhanced authentication scheme for telecare medical information systems.

Authors:  Qi Jiang; Jianfeng Ma; Zhuo Ma; Guangsong Li
Journal:  J Med Syst       Date:  2013-01-12       Impact factor: 4.460

3.  Cryptanalysis and improvement of 'A privacy enhanced scheme for telecare medical information systems'.

Authors:  Saru Kumari; Muhammad Khurram Khan; Rahul Kumar
Journal:  J Med Syst       Date:  2013-05-22       Impact factor: 4.460

4.  Managing medical and insurance information through a smart-card-based information system.

Authors:  C Lambrinoudakis; S Gritzalis
Journal:  J Med Syst       Date:  2000-08       Impact factor: 4.460

5.  A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

Authors:  Ya-Fen Chang; Shih-Hui Yu; Ding-Rui Shiao
Journal:  J Med Syst       Date:  2013-01-15       Impact factor: 4.460

6.  A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

Authors:  Ashok Kumar Das; Adrijit Goswami
Journal:  J Med Syst       Date:  2013-05-10       Impact factor: 4.460

  6 in total
  17 in total

1.  Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps.

Authors:  Yanrong Lu; Lixiang Li; Haipeng Peng; Dong Xie; Yixian Yang
Journal:  J Med Syst       Date:  2015-04-22       Impact factor: 4.460

2.  On the security flaws in ID-based password authentication schemes for telecare medical information systems.

Authors:  Dheerendra Mishra
Journal:  J Med Syst       Date:  2014-11-23       Impact factor: 4.460

3.  On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.

Authors:  Hamed Arshad; Vahid Teymoori; Morteza Nikooghadam; Hassan Abbassi
Journal:  J Med Syst       Date:  2015-06-18       Impact factor: 4.460

4.  Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

Authors:  Hamed Arshad; Morteza Nikooghadam
Journal:  J Med Syst       Date:  2014-10-29       Impact factor: 4.460

5.  The current and future needs of our medical systems.

Authors:  Jesse M Ehrenfeld
Journal:  J Med Syst       Date:  2015-02-01       Impact factor: 4.460

6.  A Double Chaotic Layer Encryption Algorithm for Clinical Signals in Telemedicine.

Authors:  M A Murillo-Escobar; L Cardoza-Avendaño; R M López-Gutiérrez; C Cruz-Hernández
Journal:  J Med Syst       Date:  2017-02-28       Impact factor: 4.460

Review 7.  A Survey of Authentication Schemes in Telecare Medicine Information Systems.

Authors:  Muhammad Umair Aslam; Abdelouahid Derhab; Kashif Saleem; Haider Abbas; Mehmet Orgun; Waseem Iqbal; Baber Aslam
Journal:  J Med Syst       Date:  2016-11-30       Impact factor: 4.460

8.  Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care.

Authors:  Lili Xu; Fan Wu
Journal:  J Med Syst       Date:  2015-01-29       Impact factor: 4.460

9.  A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems.

Authors:  Dheerendra Mishra; Jangirala Srinivas; Sourav Mukhopadhyay
Journal:  J Med Syst       Date:  2014-08-16       Impact factor: 4.460

10.  Improvement of a uniqueness-and-anonymity-preserving user authentication scheme for connected health care.

Authors:  Qi Xie; Wenhao Liu; Shengbao Wang; Lidong Han; Bin Hu; Ting Wu
Journal:  J Med Syst       Date:  2014-07-04       Impact factor: 4.460

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.