ABSTRACT
Medical field is one of the many important fields that keeps growing day by day. Since health care is essential for every human being, development of medical systems play a vital role in the overall development of society. With the help of the Internet, medical services are provided through TMIS (Telecare Medicine Information System). During the process, information related to patient is transmitted over open channels and ensuring safety to this information is an essential task. For this, a number of remote user authentication schemes have been proposed and evolved over the time. Chen et al. proposed an authentication scheme for TMIS in 2018. Through analysis of their scheme, it has been shown that their scheme cannot withstand user impersonation attack, server masquerading attack, password guessing attack and cannot preserve user anonymity. These weaknesses have been presented in this paper. In addition to this, an improved scheme has been proposed which overcomes the aforementioned security defects. Also, this paper discusses the security analysis of the proposed scheme, which proves that it is more secure and can be practically implemented.
- Hamed Arshad, Vahid Teymoori, Morteza Nikooghadam, and Hassan Abbassi. 2015. On the security of a two-factor authentication and key agreement scheme for telecare medicine information systems. Journal of medical systems 39, 8 (2015), 76.Google ScholarDigital Library
- Kukki Arya and Abhinav Vidwansh. 2015. A Robust Authentication Scheme for Telecare Medicine Information Systems. International Journal of Computer Applications 123, 6 (2015).Google ScholarCross Ref
- Fahad T Bin Muhaya. 2015. Cryptanalysis and security enhancement of Zhu's authentication scheme for Telecare medicine information system. Security and Communication Networks 8, 2 (2015), 149--158.Google ScholarDigital Library
- Tianjie Cao and Jingxuan Zhai. 2013. Improved dynamic id-based authentication scheme for telecare medical information systems. Journal of medical systems 37, 2 (2013), 9912.Google ScholarCross Ref
- Chin Chen Chang, Jung San Lee, Yu Ya Lo, and Yanjun Liu. 2017. A Secure Authentication Scheme for Telecare Medical Information Systems. In Advances in Intelligent Information Hiding and Multimedia Signal Processing. Springer, 303--312.Google Scholar
- Ankita Chaturvedi, Dheerendra Mishra, and Sourav Mukhopadhyay. 2017. An enhanced dynamic ID-based authentication scheme for telecare medical information systems. Journal of King Saud University-Computer and Information Sciences 29, 1 (2017), 54--62.Google ScholarDigital Library
- Shehzad Ashraf Chaudhry, Husnain Naqvi, Taeshik Shon, Muhammad Sher, and Mohammad Sabzinejad Farash. 2015. Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems. Journal of Medical Systems 39, 6 (2015), 66.Google ScholarDigital Library
- Chien Ming Chen, Bin Xiang, Eric Wang Ke, Tsu Yang Wu, and Jerry Chun Wei Lin. 2018. Improvement of an Anonymous and Lightweight Authentication Scheme for TMIS. Journal of Applied Mathematics and Physics 6, 01 (2018), 18.Google ScholarCross Ref
- Hung Ming Chen, Jung Wen Lo, and Chang Kuo Yeh. 2012. An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. Journal of medical systems 36, 6 (2012), 3907--3915.Google ScholarDigital Library
- Ashok Kumar Das, Anil Kumar Sutrala, Vanga Odelu, and Adrijit Goswami. 2017. A secure smartcard-based anonymous user authentication scheme for healthcare applications using wireless medical sensor networks. Wireless Personal Communications 94, 3 (2017), 1899--1933.Google ScholarDigital Library
- He Debiao, Chen Jianhua, and Zhang Rui. 2012. A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems 36, 3 (2012), 1989--1995.Google ScholarDigital Library
- Debasis Giri, Tanmoy Maitra, Ruhul Amin, and PD Srivastava. 2015. An efficient and robust rsa-based remote user authentication for telecare medical information systems. Journal of medical systems 39, 1 (2015), 145.Google ScholarDigital Library
- Prosanta Gope and Biplab Sikdar. 2018. Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices. IEEE Internet of Things Journal (2018).Google Scholar
- SK Islam. 2016. Design and analysis of an improved smartcard-based remote user password authentication scheme. International Journal of Communication Systems 29, 11 (2016), 1708--1719.Google ScholarDigital Library
- Xiaoying Jia, Debiao He, Neeraj Kumar, and Kim-Kwang Raymond Choo. 2018. Authenticated key agreement scheme for fog-driven IoT healthcare system. Wireless Networks (2018), 1--14.Google Scholar
- Qi Jiang, Zhiren Chen, Bingyan Li, Jian Shen, Li Yang, and Jianfeng Ma. 2017. Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. Journal of Ambient Intelligence and Humanized Computing (2017), 1--13.Google Scholar
- Qi Jiang, Sherali Zeadally, Jianfeng Ma, and Debiao He. 2017. Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5 (2017), 3376--3392.Google ScholarCross Ref
- Dongwoo Kang, Donghoon Lee, Seokhyang Cho, Jaewook Jung, and Dongho Won. 2017. Cryptanalysis and improvement of robust authentication scheme for telecare medicine information systems. In Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication. ACM, 18.Google ScholarDigital Library
- JiLiang Li, WeiGuo Zhang, Saru Kumari, Kim-Kwang Raymond Choo, and Dieter Hogrefe. 2018. Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps. Transactions on Emerging Telecommunications Technologies 29, 6 (2018), e3295.Google ScholarCross Ref
- Xiong Li, Jianwei Niu, Saru Kumari, Fan Wu, Arun Kumar Sangaiah, and Kim-Kwang Raymond Choo. 2018. A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. Journal of Network and Computer Applications 103 (2018), 194--204.Google ScholarDigital Library
- Xiong Li, Fan Wu, Muhammad Khurram Khan, Lili Xu, Jian Shen, and Minho Jo. 2017. A secure chaotic map-based remote authentication scheme for telecare medicine information systems. Future Generation Computer Systems (2017).Google Scholar
- Chia Hui Liu and Yu Fang Chung. 2017. Secure user authentication scheme for wireless healthcare sensor networks. Computers & Electrical Engineering 59 (2017), 250--261.Google ScholarCross Ref
- R Madhusudhan and R. C Mittal. 2012. Dynamic ID-based remote user password authentication schemes using smart cards: A review. Journal of Network and Computer Applications 35, 4 (2012), 1235--1248.Google ScholarDigital Library
- Omid Mir, Jorge Munilla, and Saru Kumari. 2017. Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks. Peer-to-Peer Networking and Applications 10, 1 (2017), 79--91.Google ScholarCross Ref
- Omid Mir, Theo van der Weide, and Cheng-Chi Lee. 2015. A secure user anonymity and authentication scheme using AVISPA for telecare medical information systems. Journal of medical systems 39, 9 (2015), 89.Google ScholarDigital Library
- Dheerendra Mishra. 2015. On the security flaws in id-based password authentication schemes for telecare medical information systems. Journal of medical systems 39, 1 (2015), 154.Google ScholarDigital Library
- Dheerendra Mishra, Sourav Mukhopadhyay, Saru Kumari, Muhammad Khurram Khan, and Ankita Chaturvedi. 2014. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. Journal of medical systems 38, 5 (2014), 41.Google ScholarDigital Library
- Dheerendra Mishra, Jangirala Srinivas, and Sourav Mukhopadhyay. 2014. A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. Journal of medical systems 38, 10 (2014), 120.Google ScholarDigital Library
- Jongho Moon, Younsung Choi, Jiye Kim,and Dongho Won. 2016. An improvement of robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps. Journal of medical systems 40, 3 (2016), 70.Google ScholarDigital Library
- Jian Shen, Shaohua Chang, Jun Shen, Qi Liu, and Xingming Sun. 2018. A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Computer Systems 78 (2018), 956--963.Google ScholarDigital Library
- Anil Kumar Sutrala, Ashok Kumar Das, Vanga Odelu, Mohammad Wazid, and Saru Kumari. 2016. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems. Computer methods and programs in biomedicine 135 (2016), 167--185.Google Scholar
- Chwei Shyong Tsai, Cheng Chi Lee, and Min Shiang Hwang. 2006. Password authentication schemes: Current status and key issues. IJ Network Security 3, 2 (2006), 101--115.Google Scholar
- Zhiwei Wang. 2018. A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity. Future Generation Computer Systems 82 (2018), 342--348.Google ScholarCross Ref
- Jianghong Wei, Xuexian Hu, and Wenfen Liu. 2012. An improved authentication scheme for telecare medicine information systems. Journal of medical systems 36, 6 (2012), 3597--3604.Google ScholarDigital Library
- Fan Wu, Xiong Li, Arun Kumar Sangaiah, Lili Xu, Saru Kumari, Liuxi Wu, and Jian Shen. 2018. A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Generation Computer Systems 82 (2018), 727--737.Google ScholarCross Ref
- Zhen Yu Wu, Yueh Chun Lee, Feipei Lai, Hung Chang Lee, and Yufang Chung. 2012. A secure authentication scheme for telecare medicine information systems. Journal of medical systems 36, 3 (2012), 1529--1535.Google ScholarDigital Library
- Hu Xiong, Junyi Tao, and Chen Yuan. 2017. Enabling telecare medical information systems with strong authentication and anonymity. IEEE Access 5 (2017), 5648--5661.Google Scholar
- Liping Zhang, Yixin Zhang, Shanyu Tang, and He Luo. 2018. Privacy protection for e-health systems by means of dynamic authentication and three-factor key agreement. IEEE Transactions on Industrial Electronics 65, 3 (2018), 2795--2805.Google ScholarCross Ref
- Liping Zhang, Shaohui Zhu, and Shanyu Tang. 2017. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE journal of biomedical and health informatics 21, 2 (2017), 465--475.Google Scholar
- Zhian Zhu. 2012. An efficient authentication scheme for telecare medicine information systems. Journal of medical systems 36, 6 (2012), 3833--3838.Google ScholarDigital Library
Index Terms
- An improved user authentication scheme for telecare medical information systems
Recommendations
An Efficient and Robust RSA-Based Remote User Authentication for Telecare Medical Information Systems
It is not always possible for a patient to go to a doctor in critical or urgent period. Telecare Medical Information Systems (TMIS) provides a facility by which a patient can communicate to a doctor through a medical server via internet from home. To ...
A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems
A Telecare Medical Information System (TMIS) enables doctors and physicians at a medical center to provide remote care via Internet to the registered patients at any place. Considering the privacy of the patients, medical data, secure and authenticated ...
An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems
Telecare medical information system (TMIS) constructs an efficient and convenient connection between patients and the medical server. The patients can enjoy medical services through public networks, and hence the protection of patients' privacy is very ...
Comments