Literature DB >> 26433889

An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.

Ruhul Amin1, S K Hafizul Islam2, G P Biswas3, Muhammad Khurram Khan4, Neeraj Kumar5.   

Abstract

In the last few years, numerous remote user authentication and session key agreement schemes have been put forwarded for Telecare Medical Information System, where the patient and medical server exchange medical information using Internet. We have found that most of the schemes are not usable for practical applications due to known security weaknesses. It is also worth to note that unrestricted number of patients login to the single medical server across the globe. Therefore, the computation and maintenance overhead would be high and the server may fail to provide services. In this article, we have designed a medical system architecture and a standard mutual authentication scheme for single medical server, where the patient can securely exchange medical data with the doctor(s) via trusted central medical server over any insecure network. We then explored the security of the scheme with its resilience to attacks. Moreover, we formally validated the proposed scheme through the simulation using Automated Validation of Internet Security Schemes and Applications software whose outcomes confirm that the scheme is protected against active and passive attacks. The performance comparison demonstrated that the proposed scheme has lower communication cost than the existing schemes in literature. In addition, the computation cost of the proposed scheme is nearly equal to the exiting schemes. The proposed scheme not only efficient in terms of different security attacks, but it also provides an efficient login, mutual authentication, session key agreement and verification and password update phases along with password recovery.

Entities:  

Keywords:  Attack; Authentication; Elliptic curve; Password; Smart card; Telecare medical information system

Mesh:

Year:  2015        PMID: 26433889     DOI: 10.1007/s10916-015-0351-y

Source DB:  PubMed          Journal:  J Med Syst        ISSN: 0148-5598            Impact factor:   4.460


  24 in total

1.  An efficient authentication scheme for telecare medicine information systems.

Authors:  Zhian Zhu
Journal:  J Med Syst       Date:  2012-04-25       Impact factor: 4.460

2.  An improved authentication scheme for telecare medicine information systems.

Authors:  Jianghong Wei; Xuexian Hu; Wenfen Liu
Journal:  J Med Syst       Date:  2012-02-29       Impact factor: 4.460

3.  A secure authentication scheme for telecare medicine information systems.

Authors:  Zhen-Yu Wu; Yueh-Chun Lee; Feipei Lai; Hung-Chang Lee; Yufang Chung
Journal:  J Med Syst       Date:  2010-10-27       Impact factor: 4.460

4.  A secure biometrics-based authentication scheme for telecare medicine information systems.

Authors:  Xiaopeng Yan; Weiheng Li; Ping Li; Jiantao Wang; Xinhong Hao; Peng Gong
Journal:  J Med Syst       Date:  2013-08-31       Impact factor: 4.460

5.  An efficient and robust RSA-based remote user authentication for telecare medical information systems.

Authors:  Debasis Giri; Tanmoy Maitra; Ruhul Amin; P D Srivastava
Journal:  J Med Syst       Date:  2014-11-18       Impact factor: 4.460

6.  Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care.

Authors:  Lili Xu; Fan Wu
Journal:  J Med Syst       Date:  2015-01-29       Impact factor: 4.460

7.  Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems.

Authors:  Qi Jiang; Jianfeng Ma; Xiang Lu; Youliang Tian
Journal:  J Med Syst       Date:  2014-02-04       Impact factor: 4.460

8.  Cryptanalysis and improvement of Yan et al.'s biometric-based authentication scheme for telecare medicine information systems.

Authors:  Dheerendra Mishra; Sourav Mukhopadhyay; Ankita Chaturvedi; Saru Kumari; Muhammad Khurram Khan
Journal:  J Med Syst       Date:  2014-06-01       Impact factor: 4.460

9.  Robust anonymous authentication scheme for telecare medical information systems.

Authors:  Qi Xie; Jun Zhang; Na Dong
Journal:  J Med Syst       Date:  2013-01-16       Impact factor: 4.460

10.  A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

Authors:  Tian-Fu Lee; I-Pin Chang; Tsung-Hung Lin; Ching-Cheng Wang
Journal:  J Med Syst       Date:  2013-04-04       Impact factor: 4.460

View more
  9 in total

1.  A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications.

Authors:  Arezou Ostad-Sharif; Dariush Abbasinezhad-Mood; Morteza Nikooghadam
Journal:  J Med Syst       Date:  2018-12-01       Impact factor: 4.460

2.  A Selective Group Authentication Scheme for IoT-Based Medical Information System.

Authors:  YoHan Park; YoungHo Park
Journal:  J Med Syst       Date:  2017-02-15       Impact factor: 4.460

3.  An Improved Two-Layer Authentication Scheme for Wireless Body Area Networks.

Authors:  Xiaoguang Liu; Chunhua Jin; Fagen Li
Journal:  J Med Syst       Date:  2018-06-29       Impact factor: 4.460

4.  A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.

Authors:  Shehzad Ashraf Chaudhry; Muhammad Tawab Khan; Muhammad Khurram Khan; Taeshik Shon
Journal:  J Med Syst       Date:  2016-09-19       Impact factor: 4.460

5.  An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

Authors:  Alavalapati Goutham Reddy; Ashok Kumar Das; Vanga Odelu; Kee-Young Yoo
Journal:  PLoS One       Date:  2016-05-10       Impact factor: 3.240

6.  An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

Authors:  Jaewook Jung; Dongwoo Kang; Donghoon Lee; Dongho Won
Journal:  PLoS One       Date:  2017-01-03       Impact factor: 3.240

7.  A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing.

Authors:  Hoon Ko; Libor Měsíček; Jongsun Choi; Seogchan Hwang
Journal:  J Healthc Eng       Date:  2018-03-29       Impact factor: 2.682

8.  Blockchain-Based Deep Learning to Process IoT Data Acquisition in Cognitive Data.

Authors:  S Hannah; A J Deepa; Varghese S Chooralil; S BrillySangeetha; N Yuvaraj; R Arshath Raja; C Suresh; Rahul Vignesh; K Srihari; Assefa Alene
Journal:  Biomed Res Int       Date:  2022-02-11       Impact factor: 3.411

9.  LAP-IoHT: A Lightweight Authentication Protocol for the Internet of Health Things.

Authors:  Chien-Ming Chen; Zhaoting Chen; Saru Kumari; Meng-Chang Lin
Journal:  Sensors (Basel)       Date:  2022-07-20       Impact factor: 3.847

  9 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.