An Improved Authentication Protocol in Telemedicine System

  • Lijuan ZhengEmail author
  • Yunjia Zhang
  • Rui Zhang
  • Jianyou Chen
  • Meng Cui
  • Chunlei Song
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11338)


Telemedicine is an effective way to solve the imbalance in the distribution of medical resources. However, since related medical privacy data needs to be transmitted over the Internet, it will be exposed to the attacker. Therefore, designing a corresponding authentication protocol to protect users’ privacy has practical significance. For the security problems existing in telemedicine systems, an improved telemedicine system authentication protocol is proposed. This authentication protocol has indistinguishability and forward security, it can effectively resist attacks such as retransmission, tracking, eavesdropping, man-in-the-middle and denial of service. The relevant security performance analysis proves that this protocol can have higher efficiency and security.


Telemedicine Authentication Hash function Digital signature 



This research was partially supported by Research and practice of higher education teaching reform of Hebei Education Department (No. 2016GJJG112).


  1. 1.
    Ying, Z.: Design and simulation of authentication scheme for telemedicine system. Zhejiang Gongshang University, Hang Zhou (2015)Google Scholar
  2. 2.
    Guo, R., Wen, Q., Jin, Z., Zhang, H.: An Efficient and secure certificateless authentication protocol for healthcare system on wireless medical sensor networks. Sci. World J. 2013, 1–7 (2013)Google Scholar
  3. 3.
    Wu, Z.-Y., Lee, Y.-C., Lai, F., Chung, Y.: A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(4), 2609–2619 (2012)CrossRefGoogle Scholar
  4. 4.
    He, D., Chen, J., Zhang, R.: A More Secure Authentication Scheme for Telecare Medicine Information Systems. Plenum Press, New York (2012)Google Scholar
  5. 5.
    Wei, J., Hu, X., Liu, W.: An Improved Authentication Scheme for Telecare Medicine Information Systems. Plenum Press, New York (2012)CrossRefGoogle Scholar
  6. 6.
    Jiang, Q., Ma, J., Ma, Z., Li, G.: A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1), 9897 (2013)CrossRefGoogle Scholar
  7. 7.
    Padhy, R.P., Patra, M.R., Satapathy, S.C.: Design and implementation of a cloud based rural healthcare information system model. UNIASCIT 2(1), 149–157 (2012). ISSN 2250-0987Google Scholar
  8. 8.
    Banerjee, A., Agrawal, P., Rajkumar, R.: Design of a cloud based emergency healthcare service model. Int. J. Appl. Eng. Res. 8(19), 2261–2264 (2013)Google Scholar
  9. 9.
    Chen, C.-L., Yang, T.-T., Shih, T.-F.: A secure medical data exchange protocol based on cloud environment. J. Med. Syst. 38, 112 (2014). Scholar
  10. 10.
    Chen, C.-L., Yang, T.-T., Chiang, M.-L., Shih, T.-F.: A privacy authentication scheme based on cloud for medical environment. J. Med. Syst. 38, 143 (2014). Scholar
  11. 11.
    Deng, Y.: Research on privacy preserving authentication protocol in mobile medical care network. Anhui University, He Fei (2017)Google Scholar
  12. 12.
    Zheng, L.: Research and design of authentication protocol in identity and location separation network. Beijing Jiaotong University, Beijing (2014)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Lijuan Zheng
    • 1
    Email author
  • Yunjia Zhang
    • 1
  • Rui Zhang
    • 2
  • Jianyou Chen
    • 3
  • Meng Cui
    • 1
  • Chunlei Song
    • 1
  1. 1.School of Information Science and TechnologyShiJiaZhuang TieDao UniversityShijiazhuangChina
  2. 2.State Key Laboratory of Information Security (SKLOIS), Institute of Information EngineeringChinese Academy of SciencesBeijingChina
  3. 3.Hebei Coal Safety (Security) Training CenterQinhuangdaoChina

Personalised recommendations