Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 7-Day Trial for You or Your Team.

Learn More →

Robust Anonymous Authentication Scheme for Telecare Medical Information Systems

Robust Anonymous Authentication Scheme for Telecare Medical Information Systems Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient’s privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.’s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.’s scheme also has some weaknesses. In particular, Chen et al.’s scheme does not provide user’s privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user’s smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Journal of Medical Systems Springer Journals

Robust Anonymous Authentication Scheme for Telecare Medical Information Systems

Journal of Medical Systems , Volume 37 (2) – Jan 16, 2013

Loading next page...
 
/lp/springer-journals/robust-anonymous-authentication-scheme-for-telecare-medical-nHOTBNP3Ob

References (29)

Publisher
Springer Journals
Copyright
Copyright © 2013 by Springer Science+Business Media New York
Subject
Statistics; Statistics for Life Sciences, Medicine, Health Sciences; Health Informatics
ISSN
0148-5598
eISSN
1573-689X
DOI
10.1007/s10916-012-9911-6
pmid
23321972
Publisher site
See Article on Publisher Site

Abstract

Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient’s privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.’s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.’s scheme also has some weaknesses. In particular, Chen et al.’s scheme does not provide user’s privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user’s smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

Journal

Journal of Medical SystemsSpringer Journals

Published: Jan 16, 2013

There are no references for this article.