CFP last date
20 May 2024
Reseach Article

A Robust Authentication Scheme for Telecare Medicine Information Systems

by Kukki Arya, Abhinav Vidwansh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 123 - Number 6
Year of Publication: 2015
Authors: Kukki Arya, Abhinav Vidwansh
10.5120/ijca2015905341

Kukki Arya, Abhinav Vidwansh . A Robust Authentication Scheme for Telecare Medicine Information Systems. International Journal of Computer Applications. 123, 6 ( August 2015), 5-10. DOI=10.5120/ijca2015905341

@article{ 10.5120/ijca2015905341,
author = { Kukki Arya, Abhinav Vidwansh },
title = { A Robust Authentication Scheme for Telecare Medicine Information Systems },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 123 },
number = { 6 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 5-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume123/number6/21961-2015905341/ },
doi = { 10.5120/ijca2015905341 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:11:54.862899+05:30
%A Kukki Arya
%A Abhinav Vidwansh
%T A Robust Authentication Scheme for Telecare Medicine Information Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 123
%N 6
%P 5-10
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Telecare Medicine Information System (TMIS) has established a connection between patients at home and doctors at a clinical center by using telecommunication systems and physiological monitoring devices. Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctors accessing to Electronic Medical Records (EMR). Remote user authentication is desirable for TMIS to verify the correctness of communicating parties. The password based authentication schemes provide efficient and scalable solutions for remote user authentication. In this context, numerous schemes have been proposed to achieve these goals. However, these schemes are vulnerable to various attacks. Moreover, they are neither efficient nor user friendly. Specially, some schemes require the exponential computation or public key cryptography which leads to very low efficiency for smart card. This paper shows that recently proposed Zhian Zhu’s scheme is incorrect. Moreover, it has insecure change of password, and no early wrong password detection and session key generation. To remedy, robust authentication scheme for TMIS has been proposed using one way hash function.

References
  1. Adamsk, T., Winiecki, W., Entity identification algorithms for distributed measurement and control systems with asymmetry of computational power, Prz Elektrotechniczn,( 2008),No. 05
  2. Cheng, X.R., Li, M.X., The authentication of the grid monitoring system for wireless sensor networks, Prz Elektrotechniczn, (2013),No.01a
  3. Pejaś, J., El Fray , I., Ruciński, A., Authentication protocol for software and hardware components in distributed electronic signature creation system, Prz Elektrotechniczn, (2012),No.10b
  4. Wu, Z. Y., Lee, Y. C., Lai, F., Lee H. C., and Chung, Y., "A secure authentication scheme for telecare medicine information systems", Journal of Medical Systems (Springer). DOI: 10.1007/s10916-010-9614-9, 2010.
  5. He, D. B., Chen, J. H., and Zhang, R., "A more secure authentication scheme for telecare medicine information systems", Journal of Medical Systems (Springer). DOI:10.1007/s10916-011-9658-5, 2011.
  6. Wei, J., Hu, X., Liu, W., "An Improved Authentication Scheme for Telecare Medicine Information Systems", Journal of Medical Systems (Springer). DOI:10.1007/s10916-012-9835-1, 2012.
  7. Zhian Zhu, "An Efficient Authentication Scheme for Telecare Medicine Information Systems", Journal of Medical Systems (Springer). DOI: 10.1007/s10916-012-9856-9, 2012.
  8. Fan, Ch.-I. Sun, Huang, W. Z., Vincent, S.-M.,Provably secure randomized blind signature scheme based on bilinear pairing,Comput Math Appl, 2010, No.60,285–293
  9. Koblitz, N., Menezes, A.J., Vanstone, S.A.,The state of elliptic curve cryptography, Design Code Cryptogr, (19)2000, No.2-3, 173–193
  10. Xue,K.M.,Hong, P.L., Security improvement on an anonymous key agreement protocol based on chaotic maps, Commun Nonlinear Sci Numer Simulat, 2012, No.17, 2969–2977
  11. Menezes, A., Van Oorschot, P. C., Vanstone, S. Handbook of Applied Cryptography, CRC Press, USA, 1997.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Hash function Password Smart card TMIS.