Skip to main content
Top
Published in: Journal of Medical Systems 3/2012

01-06-2012 | ORIGINAL PAPER

A More Secure Authentication Scheme for Telecare Medicine Information Systems

Authors: He Debiao, Chen Jianhua, Zhang Rui

Published in: Journal of Medical Systems | Issue 3/2012

Login to get access

Abstract

It is important to guarantee the privacy and the security of the users in the telecare medicine information system. Recently, Wu et al.’s proposed an authentication scheme for mobile devices in telecare medicine information system. They added the pre-computing idea within the communication process to avoid the time-consuming exponential computations. They also claimed their scheme can withstand various attacks. We will show that their scheme suffers from the impersonation attack to the insider’s attack. In order to overcome the weaknesses, we propose an improved scheme to eliminate the weakness. Our scheme is not only more secure than Wu et al.’s scheme, but also has better performance. Then our scheme is more efficient and appropriate to collocating with low power mobile devices for the telecare medicine information system.
Literature
1.
go back to reference Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst. 24(4):213–234, 2000.CrossRef Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst. 24(4):213–234, 2000.CrossRef
2.
go back to reference Lee, W. B., and Lee, C. D., A cryptographic key management solution for HIPAA privacy/security regulations. IEEE Trans. Inf. Technol. Biomed. 12(1):34–41, 2008.CrossRef Lee, W. B., and Lee, C. D., A cryptographic key management solution for HIPAA privacy/security regulations. IEEE Trans. Inf. Technol. Biomed. 12(1):34–41, 2008.CrossRef
3.
go back to reference Liao, E., Lee, C. C., and Hwang, M. S., A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 72(4):727–740, 2006.MathSciNetMATHCrossRef Liao, E., Lee, C. C., and Hwang, M. S., A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 72(4):727–740, 2006.MathSciNetMATHCrossRef
5.
go back to reference Yang, C. C., Wang, R. C., and Liu, W. T., Secure authentication scheme for session initiation protocol. Comput. Secur. 24:381–386, 2005.CrossRef Yang, C. C., Wang, R. C., and Liu, W. T., Secure authentication scheme for session initiation protocol. Comput. Secur. 24:381–386, 2005.CrossRef
6.
go back to reference Liu, J. Y., Zhou, A. M., and Gao, M. X., A new mutual authentication scheme based on nonce and smart cards. Comput. Commun. 31(10):2205–2209, 2008.CrossRef Liu, J. Y., Zhou, A. M., and Gao, M. X., A new mutual authentication scheme based on nonce and smart cards. Comput. Commun. 31(10):2205–2209, 2008.CrossRef
7.
8.
go back to reference Xu, J., Zhu, W. T., and Feng, D. G., An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4):723–728, 2009.CrossRef Xu, J., Zhu, W. T., and Feng, D. G., An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4):723–728, 2009.CrossRef
9.
10.
go back to reference Kocher, P., Jaffe, J., and Jun, B., Differential power analysis, Proc. Adv. Cryptology (CRYPTO'99). 388–397, 1999. Kocher, P., Jaffe, J., and Jun, B., Differential power analysis, Proc. Adv. Cryptology (CRYPTO'99). 388–397, 1999.
11.
go back to reference Messerges, T. S., Dabbish, E. A., and Sloan, R. H., Examining smart card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.MathSciNetCrossRef Messerges, T. S., Dabbish, E. A., and Sloan, R. H., Examining smart card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.MathSciNetCrossRef
12.
go back to reference Ku, W.-C., and Chen, S.-M., Cryptanalysis of a flexible remote user authentication scheme using smart cards [J].ACMSIGOPS Oper. Syst. Rev. 39(1):90–96, 2005.MathSciNetCrossRef Ku, W.-C., and Chen, S.-M., Cryptanalysis of a flexible remote user authentication scheme using smart cards [J].ACMSIGOPS Oper. Syst. Rev. 39(1):90–96, 2005.MathSciNetCrossRef
Metadata
Title
A More Secure Authentication Scheme for Telecare Medicine Information Systems
Authors
He Debiao
Chen Jianhua
Zhang Rui
Publication date
01-06-2012
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 3/2012
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-011-9658-5

Other articles of this Issue 3/2012

Journal of Medical Systems 3/2012 Go to the issue