Literature DB >> 27900653

A Survey of Authentication Schemes in Telecare Medicine Information Systems.

Muhammad Umair Aslam1, Abdelouahid Derhab2, Kashif Saleem2, Haider Abbas3,4,5, Mehmet Orgun6,7, Waseem Iqbal1, Baber Aslam1.   

Abstract

E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.

Keywords:  Biometric; Password; Smart card; Telecare medicine information system; User anonymity; User interaction

Mesh:

Year:  2016        PMID: 27900653     DOI: 10.1007/s10916-016-0658-3

Source DB:  PubMed          Journal:  J Med Syst        ISSN: 0148-5598            Impact factor:   4.460


  37 in total

1.  An efficient authentication scheme for telecare medicine information systems.

Authors:  Zhian Zhu
Journal:  J Med Syst       Date:  2012-04-25       Impact factor: 4.460

2.  An improved authentication scheme for telecare medicine information systems.

Authors:  Jianghong Wei; Xuexian Hu; Wenfen Liu
Journal:  J Med Syst       Date:  2012-02-29       Impact factor: 4.460

3.  A secure authentication scheme for telecare medicine information systems.

Authors:  Zhen-Yu Wu; Yueh-Chun Lee; Feipei Lai; Hung-Chang Lee; Yufang Chung
Journal:  J Med Syst       Date:  2010-10-27       Impact factor: 4.460

4.  A secure biometrics-based authentication scheme for telecare medicine information systems.

Authors:  Xiaopeng Yan; Weiheng Li; Ping Li; Jiantao Wang; Xinhong Hao; Peng Gong
Journal:  J Med Syst       Date:  2013-08-31       Impact factor: 4.460

5.  Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care.

Authors:  Lili Xu; Fan Wu
Journal:  J Med Syst       Date:  2015-01-29       Impact factor: 4.460

6.  Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems.

Authors:  S K Hafizul Islam; Muhammad Khurram Khan
Journal:  J Med Syst       Date:  2014-09-05       Impact factor: 4.460

7.  Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems.

Authors:  Qi Jiang; Jianfeng Ma; Xiang Lu; Youliang Tian
Journal:  J Med Syst       Date:  2014-02-04       Impact factor: 4.460

8.  Cryptanalysis and improvement of Yan et al.'s biometric-based authentication scheme for telecare medicine information systems.

Authors:  Dheerendra Mishra; Sourav Mukhopadhyay; Ankita Chaturvedi; Saru Kumari; Muhammad Khurram Khan
Journal:  J Med Syst       Date:  2014-06-01       Impact factor: 4.460

9.  An improved anonymous authentication scheme for telecare medical information systems.

Authors:  Fengtong Wen; Dianli Guo
Journal:  J Med Syst       Date:  2014-04-30       Impact factor: 4.460

10.  An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem.

Authors:  Yanrong Lu; Lixiang Li; Haipeng Peng; Yixian Yang
Journal:  J Med Syst       Date:  2015-02-14       Impact factor: 4.460

View more
  1 in total

1.  Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor Networks: A Survey.

Authors:  Anwar Noureddine Bahache; Noureddine Chikouche; Fares Mezrag
Journal:  SN Comput Sci       Date:  2022-07-18
  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.