Literature DB >> 26084586

On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.

Hamed Arshad1, Vahid Teymoori, Morteza Nikooghadam, Hassan Abbassi.   

Abstract

Telecare medicine information systems (TMISs) aim to deliver appropriate healthcare services in an efficient and secure manner to patients. A secure mechanism for authentication and key agreement is required to provide proper security in these systems. Recently, Bin Muhaya demonstrated some security weaknesses of Zhu's authentication and key agreement scheme and proposed a security enhanced authentication and key agreement scheme for TMISs. However, we show that Bin Muhaya's scheme is vulnerable to off-line password guessing attacks and does not provide perfect forward secrecy. Furthermore, in order to overcome the mentioned weaknesses, we propose a new two-factor anonymous authentication and key agreement scheme using the elliptic curve cryptosystem. Security and performance analyses demonstrate that the proposed scheme not only overcomes the weaknesses of Bin Muhaya's scheme, but also is about 2.73 times faster than Bin Muhaya's scheme.

Entities:  

Mesh:

Year:  2015        PMID: 26084586     DOI: 10.1007/s10916-015-0259-6

Source DB:  PubMed          Journal:  J Med Syst        ISSN: 0148-5598            Impact factor:   4.460


  18 in total

1.  An efficient authentication scheme for telecare medicine information systems.

Authors:  Zhian Zhu
Journal:  J Med Syst       Date:  2012-04-25       Impact factor: 4.460

2.  An improved authentication scheme for telecare medicine information systems.

Authors:  Jianghong Wei; Xuexian Hu; Wenfen Liu
Journal:  J Med Syst       Date:  2012-02-29       Impact factor: 4.460

3.  A secure authentication scheme for telecare medicine information systems.

Authors:  Zhen-Yu Wu; Yueh-Chun Lee; Feipei Lai; Hung-Chang Lee; Yufang Chung
Journal:  J Med Syst       Date:  2010-10-27       Impact factor: 4.460

4.  An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

Authors:  Ashok Kumar Das; Bezawada Bruhadeshwar
Journal:  J Med Syst       Date:  2013-09-06       Impact factor: 4.460

5.  On the security flaws in ID-based password authentication schemes for telecare medical information systems.

Authors:  Dheerendra Mishra
Journal:  J Med Syst       Date:  2014-11-23       Impact factor: 4.460

6.  A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems.

Authors:  Dheerendra Mishra; Jangirala Srinivas; Sourav Mukhopadhyay
Journal:  J Med Syst       Date:  2014-08-16       Impact factor: 4.460

7.  Cryptanalysis and improvement of Yan et al.'s biometric-based authentication scheme for telecare medicine information systems.

Authors:  Dheerendra Mishra; Sourav Mukhopadhyay; Ankita Chaturvedi; Saru Kumari; Muhammad Khurram Khan
Journal:  J Med Syst       Date:  2014-06-01       Impact factor: 4.460

8.  Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce.

Authors:  Dheerendra Mishra; Sourav Mukhopadhyay; Saru Kumari; Muhammad Khurram Khan; Ankita Chaturvedi
Journal:  J Med Syst       Date:  2014-04-26       Impact factor: 4.460

9.  On the security of two remote user authentication schemes for telecare medical information systems.

Authors:  Kee-Won Kim; Jae-Dong Lee
Journal:  J Med Syst       Date:  2014-04-29       Impact factor: 4.460

10.  Robust anonymous authentication scheme for telecare medical information systems.

Authors:  Qi Xie; Jun Zhang; Na Dong
Journal:  J Med Syst       Date:  2013-01-16       Impact factor: 4.460

View more
  3 in total

1.  A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications.

Authors:  Arezou Ostad-Sharif; Dariush Abbasinezhad-Mood; Morteza Nikooghadam
Journal:  J Med Syst       Date:  2018-12-01       Impact factor: 4.460

2.  The Impact of the Security Competency on "Self-Efficacy in Information Security" for Effective Health Information Security in Iran.

Authors:  Ahmad Bakhtiyari Shahri; Zuraini Ismail; Shahram Mohanna
Journal:  J Med Syst       Date:  2016-09-28       Impact factor: 4.460

3.  Analysis of Security Protocols for Mobile Healthcare.

Authors:  Mohammad Wazid; Sherali Zeadally; Ashok Kumar Das; Vanga Odelu
Journal:  J Med Syst       Date:  2016-09-17       Impact factor: 4.460

  3 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.