| Literature DB >> 25681101 |
Yanrong Lu1, Lixiang Li, Haipeng Peng, Yixian Yang.
Abstract
The telecare medical information systems (TMISs) enable patients to conveniently enjoy telecare services at home. The protection of patient's privacy is a key issue due to the openness of communication environment. Authentication as a typical approach is adopted to guarantee confidential and authorized interaction between the patient and remote server. In order to achieve the goals, numerous remote authentication schemes based on cryptography have been presented. Recently, Arshad et al. (J Med Syst 38(12): 2014) presented a secure and efficient three-factor authenticated key exchange scheme to remedy the weaknesses of Tan et al.'s scheme (J Med Syst 38(3): 2014). In this paper, we found that once a successful off-line password attack that results in an adversary could impersonate any user of the system in Arshad et al.'s scheme. In order to thwart these security attacks, an enhanced biometric and smart card based remote authentication scheme for TMISs is proposed. In addition, the BAN logic is applied to demonstrate the completeness of the enhanced scheme. Security and performance analyses show that our enhanced scheme satisfies more security properties and less computational cost compared with previously proposed schemes.Entities:
Mesh:
Year: 2015 PMID: 25681101 PMCID: PMC4328119 DOI: 10.1007/s10916-015-0221-7
Source DB: PubMed Journal: J Med Syst ISSN: 0148-5598 Impact factor: 4.460
Notations
|
| The patient and the telecare server |
|
| Identity, password, biometric of the patient |
|
| Biohash function |
|
| Hash function |
|
| Private key selected by |
| ⊕, || | Exclusive-or operation and concatenation operation |
Fig. 1Registration and authentication phase of the enhanced scheme
BAN logic notations
|
|
|
|
| Share a key |
| # |
|
|
| A sees |
|
| A said |
| { |
|
| ( |
|
| < |
|
Functionality comparison
| Ours | Arshad et al. [ | Tan et al. [ | Awasthi et al. [ | Wen et al. [ | |
|---|---|---|---|---|---|
| User anonymity | Yes | Yes | Yes | No | Yes |
| Mutual authentication | Yes | Yes | Yes | Yes | Yes |
| The session key perfect forward secrecy | Yes | Yes | - | - | Yes |
| Insider attack | Yes | Yes | Yes | Yes | Yes |
| Impersonation attack | Yes | No | Yes | - | - |
| Off-line password guessing attack | Yes | No | Yes | Yes | Yes |
| Replay attack | Yes | Yes | No | Yes | Yes |
| Modification attack | Yes | Yes | Yes | - | - |
Performance comparison
| Ours | Arshad et al. [ | Tan et al. [ | Awasthi et al. [ | Wen et al. [ | |
|---|---|---|---|---|---|
| Registration | 3 | 4 | 3 | 3 | 3 |
| Login and authentication | 4 | 4 | 6 | 6 | 1 |
| +1 | +1 | ||||
| Password change | 3 | 4 | 4 | 4 | 4 |