Access the full text.
Sign up today, get DeepDyve free for 14 days.
A. Armando, D. Basin, Yohan Boichut, Yannick Chevalier, L. Compagna, Jorge Cuéllar, P. Drielsma, Pierre-Cyrille Héam, O. Kouchnarenko, Jacopo Mantovani, S. Mödersheim, David Oheimb, M. Rusinowitch, Judson Santiago, Mathieu Turuani, L. Viganò, L. Vigneron (2005)
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
Ruhul Amin, G. Biswas (2016)
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networksAd Hoc Networks, 36
Ruhul Amin, G. Biswas (2015)
An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMISJournal of Medical Systems, 39
Shehzad Chaudhry, M. Farash, S. Naqvi, S. Kumari, M. Khan (2015)
An enhanced privacy preserving remote user authentication scheme with provable securitySecur. Commun. Networks, 8
Zhian Zhu (2012)
An Efficient Authentication Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 36
Xiong Li, J. Niu, M. Khan, Junguo Liao (2013)
An enhanced smart card based remote user password authentication schemeJ. Netw. Comput. Appl., 36
Tianjie Cao, Jingxuan Zhai (2013)
Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information SystemsJournal of Medical Systems, 37
Xiao-peng Yan, Weiheng Li, Ping Li, Jiantao Wang, Xinhong Hao, Peng Gong (2013)
A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 37
D. He, Ding Wang (2015)
Robust Biometrics-Based Authentication Scheme for Multiserver EnvironmentIEEE Systems Journal, 9
Belén Zapata, J. Alemán, A. Idri, J. Álvarez (2015)
Empirical Studies on Usability of mHealth Apps: A Systematic Literature ReviewJournal of Medical Systems, 39
Ping Guo, Jin Wang, Xuehua Geng, Chang Kim, Jeong-Uk Kim (2014)
A Variable Threshold-Value Authentication Architecture for Wireless Mesh NetworksJournal of Internet Technology, 15
Chun-Ta Li, Cheng-Chi Lee, C. Weng (2014)
A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information SystemsJournal of Medical Systems, 38
D. He, Neeraj Kumar, N. Chilamkurti (2015)
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networksInf. Sci., 321
Jian Shen, Haowen Tan, Jin Wang, Jinwei Wang, Sungyoung Lee (2015)
A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor NetworksJournal of Internet Technology, 16
P. Kocher, J. Jaffe, Benjamin Jun (1999)
Differential Power Analysis
Cheng-Chi Lee, Che-Wei Hsu, Yan-Ming Lai, A. Vasilakos (2013)
An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic MapsJournal of Medical Systems, 37
Hung-Ming Chen, Jung-Wen Lo, Chang-Kuo Yeh (2012)
An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information SystemsJournal of Medical Systems, 36
Qianna Xie, Wenhao Liu, Shengbao Wang, Lidong Han, B. Hu, Ting Wu (2014)
Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health CareJournal of Medical Systems, 38
Ruhul Amin, S. Islam, G. Biswas, M. Khan, M. Obaidat (2015)
Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information SystemJournal of Medical Systems, 39
Ruhul Amin, G. Biswas (2015)
A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User AnonymityJournal of Medical Systems, 39
Debasis Giri, Tanmoy Maitra, Ruhul Amin, P. Srivastava (2014)
An Efficient and Robust RSA-Based Remote User Authentication for Telecare Medical Information SystemsJournal of Medical Systems, 39
D. He, Neeraj Kumar, Jianhua Chen, Cheng-Chi Lee, N. Chilamkurti, Seng-Soo Yeo (2015)
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networksMultimedia Systems, 21
Xiong Li, Yongping Xiong, Jian Ma, Wendong Wang (2012)
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cardsJ. Netw. Comput. Appl., 35
Ruhul Amin, G. Biswas (2015)
Remote Access Control Mechanism Using Rabin Public Key Cryptosystem
Zhengxing Huang, Yurong Bao, W. Dong, Xudong Lu, H. Duan (2014)
Online Treatment Compliance Checking for Clinical PathwaysJournal of Medical Systems, 38
S. Kalra, S. Sood (2013)
Advanced remote user authentication protocol for multi-server architecture based on ECCJ. Inf. Secur. Appl., 18
Zuowen Tan (2013)
An efficient biometrics-based authentication scheme for telecare medicine information systemsPrzegląd Elektrotechniczny
Hakhyun Kim, Woongryul Jeon, Yunho Lee, Dongho Won (2011)
Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement schemeIACR Cryptol. ePrint Arch., 2011
Ruhul Amin, G. Biswas (2015)
Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server EnvironmentWireless Personal Communications, 84
Debiao He, Jianhua Chen, Rui Zhang (2012)
A More Secure Authentication Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 36
T. Messerges, E. Dabbish, R. Sloan (2002)
Examining Smart-Card Security under the Threat of Power Analysis AttacksIEEE Trans. Computers, 51
D Dolev, AC Yao (1983)
On the security of public key protocolsIEEE Trans. Inf. Theory, 29
(2012)
A More Secure Authentication Scheme for Telecare Medicine Information Systems
Qianna Xie, Jun Zhang, Na Dong (2013)
Robust Anonymous Authentication Scheme for Telecare Medical Information SystemsJournal of Medical Systems, 37
S. Islam, M. Khan, M. Obaidat, F. Muhaya (2015)
Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic MapsWireless Personal Communications, 84
M. Farash, Shehzad Chaudhry, Mohammad Heydari, S. Sadough, S. Kumari, M. Khan (2017)
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable securityInternational Journal of Communication Systems, 30
W. Tzeng, Kuang-Ming Kuo, Paul Talley, Hsiu-Chin Chen, Jhi-Joung Wang (2015)
Do ePortfolios Contribute to Learners’ Reflective Thinking Activities? : A Preliminary Study of Nursing Staff UsersJournal of Medical Systems, 39
Z. Wu, Yueh-Chun Lee, F. Lai, Hung-Chang Lee, Yu-Fang Chung (2012)
A Secure Authentication Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 36
S. Islam (2015)
Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic mapsInf. Sci., 312
S. Islam, G. Biswas (2013)
AN EFFICIENT AND SECURE STRONG DESIGNATED VERIFIER SIGNATURE SCHEME WITHOUT BILINEAR PAIRINGSJournal of applied mathematics & informatics, 31
Tian-Fu Lee, I-Pin Chang, Tsung-Hung Lin, Ching-Cheng Wang (2013)
A Secure and Efficient Password-Based User Authentication Scheme Using Smart Cards for the Integrated EPR Information SystemJournal of Medical Systems, 37
Ruhul Amin, G. Biswas (2015)
A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical Server Usable in TMISJournal of Medical Systems, 39
Ruhul Amin, S. Islam, G. Biswas, M. Khan (2015)
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
R Amin, SH Islam, GP Biswas, MK Khan, MS Obaidat (2015)
Design and analysis of an enhanced patient-server mutual authentication protocol for telecare medical information systemJ. Med. Technol., 39
Xiong Li, Jian Ma, Wendong Wang, Yongping Xiong, Junsong Zhang (2013)
A novel smart card and dynamic ID based remote user authentication scheme for multi-server environmentsMath. Comput. Model., 58
D. Mishra, S. Mukhopadhyay, Ankita Chaturvedi, S. Kumari, M. Khan (2013)
Cryptanalysis and Improvement of Yan et al.’s Biometric-Based Authentication Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 38
Han-Yu Lin (2014)
Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement SchemeWireless Personal Communications, 78
D. Dolev, A. Yao (1983)
On the security of public key protocols22nd Annual Symposium on Foundations of Computer Science (sfcs 1981)
Chien-Lung Hsu, Yu-Hao Chuang, Chen-li Kuo (2015)
A Novel Remote User Authentication Scheme from Bilinear Pairings Via InternetWireless Personal Communications, 83
Han-Yu Lin (2013)
On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information SystemsJournal of Medical Systems, 37
Xiong Li, J. Niu, Jian Ma, Wendong Wang, Chenglian Liu (2011)
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cardsJ. Netw. Comput. Appl., 34
Lili Xu, Fan Wu (2015)
Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health CareJournal of Medical Systems, 39
Vanga Odelu, A. Das, A. Goswami (2014)
Cryptanalysis on 'Robust Biometrics-Based Authentication Scheme for Multi-server Environment'IACR Cryptol. ePrint Arch., 2014
Jianghong Wei, Xuexian Hu, Wenfen Liu (2012)
An Improved Authentication Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 36
Zhiheng Wang, Zhanqiang Huo, Wenbo Shi (2014)
A Dynamic Identity Based Authentication Scheme Using Chaotic Maps for Telecare Medicine Information SystemsJournal of Medical Systems, 39
Ruhul Amin, S. Islam, G. Biswas, M. Khan, Xiong Li (2015)
Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care SystemsJournal of Medical Systems, 39
D. Mishra, Jangirala Srinivas, S. Mukhopadhyay (2014)
A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 38
Eunjun Yoon, K. Yoo (2010)
Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystemThe Journal of Supercomputing, 63
Yongjun Ren, Jian Shen, Jin Wang, Jin Han, Sungyoung Lee (2015)
Mutual Verifiable Provable Data Auditing in Public Cloud StorageJournal of Internet Technology, 16
Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian (2014)
Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information SystemsJournal of Medical Systems, 38
(2015)
J Med Syst
In the last few years, numerous remote user authentication and session key agreement schemes have been put forwarded for Telecare Medical Information System, where the patient and medical server exchange medical information using Internet. We have found that most of the schemes are not usable for practical applications due to known security weaknesses. It is also worth to note that unrestricted number of patients login to the single medical server across the globe. Therefore, the computation and maintenance overhead would be high and the server may fail to provide services. In this article, we have designed a medical system architecture and a standard mutual authentication scheme for single medical server, where the patient can securely exchange medical data with the doctor(s) via trusted central medical server over any insecure network. We then explored the security of the scheme with its resilience to attacks. Moreover, we formally validated the proposed scheme through the simulation using Automated Validation of Internet Security Schemes and Applications software whose outcomes confirm that the scheme is protected against active and passive attacks. The performance comparison demonstrated that the proposed scheme has lower communication cost than the existing schemes in literature. In addition, the computation cost of the proposed scheme is nearly equal to the exiting schemes. The proposed scheme not only efficient in terms of different security attacks, but it also provides an efficient login, mutual authentication, session key agreement and verification and password update phases along with password recovery.
Journal of Medical Systems – Springer Journals
Published: Oct 3, 2015
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.