Literature DB >> 25912427

Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems.

Shehzad Ashraf Chaudhry1, Husnain Naqvi, Taeshik Shon, Muhammad Sher, Mohammad Sabzinejad Farash.   

Abstract

Telecare medical information systems (TMIS) provides rapid and convenient health care services remotely. Efficient authentication is a prerequisite to guarantee the security and privacy of patients in TMIS. Authentication is used to verify the legality of the patients and TMIS server during remote access. Very recently Islam et al. (J. Med. Syst. 38(10):135, 2014) proposed a two factor authentication protocol for TMIS using elliptic curve cryptography (ECC) to improve Xu et al.'s (J. Med. Syst. 38(1):9994, 2014) protocol. They claimed their improved protocol to be efficient and provides all security requirements. However our analysis reveals that Islam et al.'s protocol suffers from user impersonation and server impersonation attacks. Furthermore we proposed an enhanced protocol. The proposed protocol while delivering all the virtues of Islam et al.'s protocol resists all known attacks.

Entities:  

Mesh:

Year:  2015        PMID: 25912427     DOI: 10.1007/s10916-015-0244-0

Source DB:  PubMed          Journal:  J Med Syst        ISSN: 0148-5598            Impact factor:   4.460


  15 in total

1.  An efficient authentication scheme for telecare medicine information systems.

Authors:  Zhian Zhu
Journal:  J Med Syst       Date:  2012-04-25       Impact factor: 4.460

2.  An improved authentication scheme for telecare medicine information systems.

Authors:  Jianghong Wei; Xuexian Hu; Wenfen Liu
Journal:  J Med Syst       Date:  2012-02-29       Impact factor: 4.460

3.  A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

Authors:  Ashok Kumar Das
Journal:  J Med Syst       Date:  2015-02-10       Impact factor: 4.460

4.  A secure authentication scheme for telecare medicine information systems.

Authors:  Zhen-Yu Wu; Yueh-Chun Lee; Feipei Lai; Hung-Chang Lee; Yufang Chung
Journal:  J Med Syst       Date:  2010-10-27       Impact factor: 4.460

5.  An efficient and robust RSA-based remote user authentication for telecare medical information systems.

Authors:  Debasis Giri; Tanmoy Maitra; Ruhul Amin; P D Srivastava
Journal:  J Med Syst       Date:  2014-11-18       Impact factor: 4.460

6.  A dynamic identity based authentication scheme using chaotic maps for telecare medicine information systems.

Authors:  Zhiheng Wang; Zhanqiang Huo; Wenbo Shi
Journal:  J Med Syst       Date:  2014-11-26       Impact factor: 4.460

7.  Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care.

Authors:  Lili Xu; Fan Wu
Journal:  J Med Syst       Date:  2015-01-29       Impact factor: 4.460

8.  A privacy enhanced authentication scheme for telecare medical information systems.

Authors:  Qi Jiang; Jianfeng Ma; Zhuo Ma; Guangsong Li
Journal:  J Med Syst       Date:  2013-01-12       Impact factor: 4.460

9.  Cryptanalysis and improvement of 'A privacy enhanced scheme for telecare medical information systems'.

Authors:  Saru Kumari; Muhammad Khurram Khan; Rahul Kumar
Journal:  J Med Syst       Date:  2013-05-22       Impact factor: 4.460

10.  Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems.

Authors:  S K Hafizul Islam; Muhammad Khurram Khan
Journal:  J Med Syst       Date:  2014-09-05       Impact factor: 4.460

View more
  13 in total

1.  Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.

Authors:  Ruhul Amin; S K Hafizul Islam; G P Biswas; Muhammad Khurram Khan; Xiong Li
Journal:  J Med Syst       Date:  2015-09-05       Impact factor: 4.460

2.  An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing.

Authors:  Vinod Kumar; Srinivas Jangirala; Musheer Ahmad
Journal:  J Med Syst       Date:  2018-06-28       Impact factor: 4.460

3.  A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications.

Authors:  Arezou Ostad-Sharif; Dariush Abbasinezhad-Mood; Morteza Nikooghadam
Journal:  J Med Syst       Date:  2018-12-01       Impact factor: 4.460

Review 4.  A Survey of Authentication Schemes in Telecare Medicine Information Systems.

Authors:  Muhammad Umair Aslam; Abdelouahid Derhab; Kashif Saleem; Haider Abbas; Mehmet Orgun; Waseem Iqbal; Baber Aslam
Journal:  J Med Syst       Date:  2016-11-30       Impact factor: 4.460

5.  A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.

Authors:  Prerna Mohit; Ruhul Amin; Arijit Karati; G P Biswas; Muhammad Khurram Khan
Journal:  J Med Syst       Date:  2017-02-17       Impact factor: 4.460

6.  An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography.

Authors:  Shehzad Ashraf Chaudhry; Khalid Mahmood; Husnain Naqvi; Muhammad Khurram Khan
Journal:  J Med Syst       Date:  2015-09-23       Impact factor: 4.460

Review 7.  Design of a Secure Medical Data Sharing Scheme Based on Blockchain.

Authors:  Xu Cheng; Fulong Chen; Dong Xie; Hui Sun; Cheng Huang
Journal:  J Med Syst       Date:  2020-01-08       Impact factor: 4.460

8.  Dependable and Provable Secure Two-Factor Mutual Authentication Scheme Using ECC for IoT-Based Telecare Medical Information System.

Authors:  Niranchana Radhakrishnan; Amutha Prabakar Muniyandi
Journal:  J Healthc Eng       Date:  2022-02-14       Impact factor: 2.682

9.  Privacy-Preserving and Efficient Truly Three-Factor Authentication Scheme for Telecare Medical Information Systems.

Authors:  Dongqing Xu; Jianhua Chen; Shu Zhang; Qin Liu
Journal:  J Med Syst       Date:  2018-10-02       Impact factor: 4.460

10.  Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

Authors:  Mojtaba Alizadeh; Mazdak Zamani; Sabariah Baharun; Azizah Abdul Manaf; Kouichi Sakurai; Hiroaki Anada; Hiroki Anada; Hassan Keshavarz; Shehzad Ashraf Chaudhry; Muhammad Khurram Khan
Journal:  PLoS One       Date:  2015-11-18       Impact factor: 3.240

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.