skip to main content
10.1145/3278576.3278603acmconferencesArticle/Chapter ViewAbstractPublication PageschConference Proceedingsconference-collections
research-article

An improved user authentication scheme for telecare medical information systems

Published:22 January 2020Publication History

ABSTRACT

Medical field is one of the many important fields that keeps growing day by day. Since health care is essential for every human being, development of medical systems play a vital role in the overall development of society. With the help of the Internet, medical services are provided through TMIS (Telecare Medicine Information System). During the process, information related to patient is transmitted over open channels and ensuring safety to this information is an essential task. For this, a number of remote user authentication schemes have been proposed and evolved over the time. Chen et al. proposed an authentication scheme for TMIS in 2018. Through analysis of their scheme, it has been shown that their scheme cannot withstand user impersonation attack, server masquerading attack, password guessing attack and cannot preserve user anonymity. These weaknesses have been presented in this paper. In addition to this, an improved scheme has been proposed which overcomes the aforementioned security defects. Also, this paper discusses the security analysis of the proposed scheme, which proves that it is more secure and can be practically implemented.

References

  1. Hamed Arshad, Vahid Teymoori, Morteza Nikooghadam, and Hassan Abbassi. 2015. On the security of a two-factor authentication and key agreement scheme for telecare medicine information systems. Journal of medical systems 39, 8 (2015), 76.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Kukki Arya and Abhinav Vidwansh. 2015. A Robust Authentication Scheme for Telecare Medicine Information Systems. International Journal of Computer Applications 123, 6 (2015).Google ScholarGoogle ScholarCross RefCross Ref
  3. Fahad T Bin Muhaya. 2015. Cryptanalysis and security enhancement of Zhu's authentication scheme for Telecare medicine information system. Security and Communication Networks 8, 2 (2015), 149--158.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Tianjie Cao and Jingxuan Zhai. 2013. Improved dynamic id-based authentication scheme for telecare medical information systems. Journal of medical systems 37, 2 (2013), 9912.Google ScholarGoogle ScholarCross RefCross Ref
  5. Chin Chen Chang, Jung San Lee, Yu Ya Lo, and Yanjun Liu. 2017. A Secure Authentication Scheme for Telecare Medical Information Systems. In Advances in Intelligent Information Hiding and Multimedia Signal Processing. Springer, 303--312.Google ScholarGoogle Scholar
  6. Ankita Chaturvedi, Dheerendra Mishra, and Sourav Mukhopadhyay. 2017. An enhanced dynamic ID-based authentication scheme for telecare medical information systems. Journal of King Saud University-Computer and Information Sciences 29, 1 (2017), 54--62.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Shehzad Ashraf Chaudhry, Husnain Naqvi, Taeshik Shon, Muhammad Sher, and Mohammad Sabzinejad Farash. 2015. Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems. Journal of Medical Systems 39, 6 (2015), 66.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Chien Ming Chen, Bin Xiang, Eric Wang Ke, Tsu Yang Wu, and Jerry Chun Wei Lin. 2018. Improvement of an Anonymous and Lightweight Authentication Scheme for TMIS. Journal of Applied Mathematics and Physics 6, 01 (2018), 18.Google ScholarGoogle ScholarCross RefCross Ref
  9. Hung Ming Chen, Jung Wen Lo, and Chang Kuo Yeh. 2012. An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. Journal of medical systems 36, 6 (2012), 3907--3915.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Ashok Kumar Das, Anil Kumar Sutrala, Vanga Odelu, and Adrijit Goswami. 2017. A secure smartcard-based anonymous user authentication scheme for healthcare applications using wireless medical sensor networks. Wireless Personal Communications 94, 3 (2017), 1899--1933.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. He Debiao, Chen Jianhua, and Zhang Rui. 2012. A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems 36, 3 (2012), 1989--1995.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Debasis Giri, Tanmoy Maitra, Ruhul Amin, and PD Srivastava. 2015. An efficient and robust rsa-based remote user authentication for telecare medical information systems. Journal of medical systems 39, 1 (2015), 145.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Prosanta Gope and Biplab Sikdar. 2018. Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices. IEEE Internet of Things Journal (2018).Google ScholarGoogle Scholar
  14. SK Islam. 2016. Design and analysis of an improved smartcard-based remote user password authentication scheme. International Journal of Communication Systems 29, 11 (2016), 1708--1719.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Xiaoying Jia, Debiao He, Neeraj Kumar, and Kim-Kwang Raymond Choo. 2018. Authenticated key agreement scheme for fog-driven IoT healthcare system. Wireless Networks (2018), 1--14.Google ScholarGoogle Scholar
  16. Qi Jiang, Zhiren Chen, Bingyan Li, Jian Shen, Li Yang, and Jianfeng Ma. 2017. Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. Journal of Ambient Intelligence and Humanized Computing (2017), 1--13.Google ScholarGoogle Scholar
  17. Qi Jiang, Sherali Zeadally, Jianfeng Ma, and Debiao He. 2017. Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5 (2017), 3376--3392.Google ScholarGoogle ScholarCross RefCross Ref
  18. Dongwoo Kang, Donghoon Lee, Seokhyang Cho, Jaewook Jung, and Dongho Won. 2017. Cryptanalysis and improvement of robust authentication scheme for telecare medicine information systems. In Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication. ACM, 18.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. JiLiang Li, WeiGuo Zhang, Saru Kumari, Kim-Kwang Raymond Choo, and Dieter Hogrefe. 2018. Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps. Transactions on Emerging Telecommunications Technologies 29, 6 (2018), e3295.Google ScholarGoogle ScholarCross RefCross Ref
  20. Xiong Li, Jianwei Niu, Saru Kumari, Fan Wu, Arun Kumar Sangaiah, and Kim-Kwang Raymond Choo. 2018. A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. Journal of Network and Computer Applications 103 (2018), 194--204.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Xiong Li, Fan Wu, Muhammad Khurram Khan, Lili Xu, Jian Shen, and Minho Jo. 2017. A secure chaotic map-based remote authentication scheme for telecare medicine information systems. Future Generation Computer Systems (2017).Google ScholarGoogle Scholar
  22. Chia Hui Liu and Yu Fang Chung. 2017. Secure user authentication scheme for wireless healthcare sensor networks. Computers & Electrical Engineering 59 (2017), 250--261.Google ScholarGoogle ScholarCross RefCross Ref
  23. R Madhusudhan and R. C Mittal. 2012. Dynamic ID-based remote user password authentication schemes using smart cards: A review. Journal of Network and Computer Applications 35, 4 (2012), 1235--1248.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Omid Mir, Jorge Munilla, and Saru Kumari. 2017. Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks. Peer-to-Peer Networking and Applications 10, 1 (2017), 79--91.Google ScholarGoogle ScholarCross RefCross Ref
  25. Omid Mir, Theo van der Weide, and Cheng-Chi Lee. 2015. A secure user anonymity and authentication scheme using AVISPA for telecare medical information systems. Journal of medical systems 39, 9 (2015), 89.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Dheerendra Mishra. 2015. On the security flaws in id-based password authentication schemes for telecare medical information systems. Journal of medical systems 39, 1 (2015), 154.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Dheerendra Mishra, Sourav Mukhopadhyay, Saru Kumari, Muhammad Khurram Khan, and Ankita Chaturvedi. 2014. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. Journal of medical systems 38, 5 (2014), 41.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Dheerendra Mishra, Jangirala Srinivas, and Sourav Mukhopadhyay. 2014. A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. Journal of medical systems 38, 10 (2014), 120.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Jongho Moon, Younsung Choi, Jiye Kim,and Dongho Won. 2016. An improvement of robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps. Journal of medical systems 40, 3 (2016), 70.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Jian Shen, Shaohua Chang, Jun Shen, Qi Liu, and Xingming Sun. 2018. A lightweight multi-layer authentication protocol for wireless body area networks. Future Generation Computer Systems 78 (2018), 956--963.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Anil Kumar Sutrala, Ashok Kumar Das, Vanga Odelu, Mohammad Wazid, and Saru Kumari. 2016. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems. Computer methods and programs in biomedicine 135 (2016), 167--185.Google ScholarGoogle Scholar
  32. Chwei Shyong Tsai, Cheng Chi Lee, and Min Shiang Hwang. 2006. Password authentication schemes: Current status and key issues. IJ Network Security 3, 2 (2006), 101--115.Google ScholarGoogle Scholar
  33. Zhiwei Wang. 2018. A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity. Future Generation Computer Systems 82 (2018), 342--348.Google ScholarGoogle ScholarCross RefCross Ref
  34. Jianghong Wei, Xuexian Hu, and Wenfen Liu. 2012. An improved authentication scheme for telecare medicine information systems. Journal of medical systems 36, 6 (2012), 3597--3604.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Fan Wu, Xiong Li, Arun Kumar Sangaiah, Lili Xu, Saru Kumari, Liuxi Wu, and Jian Shen. 2018. A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Generation Computer Systems 82 (2018), 727--737.Google ScholarGoogle ScholarCross RefCross Ref
  36. Zhen Yu Wu, Yueh Chun Lee, Feipei Lai, Hung Chang Lee, and Yufang Chung. 2012. A secure authentication scheme for telecare medicine information systems. Journal of medical systems 36, 3 (2012), 1529--1535.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Hu Xiong, Junyi Tao, and Chen Yuan. 2017. Enabling telecare medical information systems with strong authentication and anonymity. IEEE Access 5 (2017), 5648--5661.Google ScholarGoogle Scholar
  38. Liping Zhang, Yixin Zhang, Shanyu Tang, and He Luo. 2018. Privacy protection for e-health systems by means of dynamic authentication and three-factor key agreement. IEEE Transactions on Industrial Electronics 65, 3 (2018), 2795--2805.Google ScholarGoogle ScholarCross RefCross Ref
  39. Liping Zhang, Shaohui Zhu, and Shanyu Tang. 2017. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE journal of biomedical and health informatics 21, 2 (2017), 465--475.Google ScholarGoogle Scholar
  40. Zhian Zhu. 2012. An efficient authentication scheme for telecare medicine information systems. Journal of medical systems 36, 6 (2012), 3833--3838.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An improved user authentication scheme for telecare medical information systems
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CHASE '18: Proceedings of the 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies
          September 2018
          139 pages
          ISBN:9781450359580
          DOI:10.1145/3278576

          Copyright © 2018 ACM

          © 2018 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 22 January 2020

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader