Advertisement

A Secure Authentication Scheme for Telecare Medical Information Systems

  • Chin-Chen Chang
  • Jung-San Lee
  • Yu-Ya Lo
  • Yanjun LiuEmail author
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 63)

Abstract

In 2012, Chen et al. proposed an ID based authentication scheme for Telecare Medical Information Systems. However it has some security weaknesses. Later Xie et al. have proposed a new scheme to improve the security so that various attacks can be resisted, such as offline password guessing attacks, user anonymity attacks, impersonation attacks, and perfect forward secrecy. However, Xie et al.’s scheme is vulnerable to the denial of service (Dos) attack when a patient submits a login request to the server. We proposed a secure authentication scheme for telecare medical information systems in out method, we use visual secret sharing which was proposed by Shamir to generate one-time password to overcome the denial of service attack problem.

Keywords

Timestamp TMIS one-way collision-free hash function 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Wu, Z. U., Lee, Y. H., Lai, F. P., Lee, H. C., Chung, Y. F.: A secure authentication scheme for telecare medicine information systems. Journal of Medical systems, 36(3),1529–1535 (2012)Google Scholar
  2. 2.
    He, D. B., Chen, J. H., Zhang, R.: A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(3), 1989–1995 (2012)Google Scholar
  3. 3.
    Wei, J. H., Hu, X. X., Liu, W. F.: An improved authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(6), 3597–3604 (2012)Google Scholar
  4. 4.
    Zhu, Z.: An efficient authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(6), 3833–3838 (2012)Google Scholar
  5. 5.
    Muhaya, F. T.: Cryptanalysis and security enhancement of Zhu’s authentication scheme for Telecare medicine information system. Security and Communication Networks, 8(2), 149–158 (2015)Google Scholar
  6. 6.
    Islam, S. K., Biswas, G. P.: Cryptanalysis and improvement of a password-based user authentication scheme for the integrated EPR information system. Journal of King Saud University - Computer and Information Sciences, 27(2), 211–221 (2015)Google Scholar
  7. 7.
    Jiang, Q., Ma, J. F., Ma, Z., Li, G. S.: A privacy enhanced authentication scheme for telecare medical information systems. Journal of Medical Systems, 37(1), 1–8(2013)Google Scholar
  8. 8.
    Chen, H. M., Lo, J. W., Yeh, C. K.: An e_cient and secure dynamic ID-based authentication scheme for telecare medical information systems. Journal of Medical Systems, 36(6), 3907–3915 (2012)Google Scholar
  9. 9.
    Islam, S. K., Khan, M. K.: Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems. Journal of Medical Systems, 38(10), 1–16 (2014)Google Scholar
  10. 10.
    Zhang, L. P., Zhu, S. H.: Robust ECC-based authenticated key agreement scheme with privacy protection for telecare medicine information systems. Journal of Medical Systems, 39(5), 1–11 (2015)Google Scholar
  11. 11.
    Liu, W. H., Xie, Q.,Wang, S. B., Hu, B.: An improved authenticated key agreement protocol for telecare medicine information system. SpringerPlus, 5(1), 1–16 (2016)Google Scholar
  12. 12.
    Xie, Q., Zhang, J., Dong, N.: Robust anonymous authentication scheme for telecare medical information systems. Journal of Medical Systems, 37(2), 1–8 (2013)Google Scholar
  13. 13.
    Shamir, A.: How to share a secret. Communications of the ACM, 22(11), 612–613 (1979)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Chin-Chen Chang
    • 1
  • Jung-San Lee
    • 1
  • Yu-Ya Lo
    • 2
  • Yanjun Liu
    • 1
    Email author
  1. 1.Department of Information Engineering and Computer ScienceFeng Chia UniversityTaichungTaiwan, R.O.C.
  2. 2.Department of Computer Science and Information EngineeringNational Chung Cheng UniversityChiayiTaiwan, R.O.C.

Personalised recommendations