Skip to main content
Top
Published in: Journal of Medical Systems 6/2012

01-12-2012 | Original Paper

An Improved Authentication Scheme for Telecare Medicine Information Systems

Published in: Journal of Medical Systems | Issue 6/2012

Login to get access

Abstract

The telecare medicine information system enables or supports health-care delivery services. In order to safeguard patients’ privacy, such as telephone number, medical record number, health information, etc., a secure authentication scheme will thus be in demand. Recently, Wu et al. proposed a smart card based password authentication scheme for the telecare medicine information system. Later, He et al. pointed out that Wu et al.’s scheme could not resist impersonation attacks and insider attacks, and then presented a new scheme. In this paper, we show that both of them fail to achieve two-factor authentication as smart card based password authentication schemes should achieve. We also propose an improved authentication scheme for the telecare medicine information system, and demonstrate that the improved one satisfies the security requirements of two-factor authentication and is also efficient.
Literature
1.
go back to reference Lambrinoudakis, C., and Gritzalis, S., Managing medical and insura nce information through a smart-card-based information system. J. Med. Syst. 24(4):213–234, 2000.CrossRef Lambrinoudakis, C., and Gritzalis, S., Managing medical and insura nce information through a smart-card-based information system. J. Med. Syst. 24(4):213–234, 2000.CrossRef
2.
go back to reference Wu, Z. Y., Lee, Y. C., Lai, F., Lee H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 2010. doi:10.1007/s10916-010-9614-9. Wu, Z. Y., Lee, Y. C., Lai, F., Lee H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 2010. doi:10.​1007/​s10916-010-9614-9.
4.
go back to reference Liao, E., Lee, C. C., and Hwang, M. S., A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 72(4):727–740, 2006.MathSciNetMATHCrossRef Liao, E., Lee, C. C., and Hwang, M. S., A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 72(4):727–740, 2006.MathSciNetMATHCrossRef
5.
go back to reference Awasthi, A. K., and Lal, S., An enhanced remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 50(2):583–586, 2004.CrossRef Awasthi, A. K., and Lal, S., An enhanced remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 50(2):583–586, 2004.CrossRef
6.
go back to reference Lee, N. Y., and Chiu, Y. C., Improved remote authentication scheme with smart card. Comput. Stand. Interfaces 27(2):177–180, 2005.CrossRef Lee, N. Y., and Chiu, Y. C., Improved remote authentication scheme with smart card. Comput. Stand. Interfaces 27(2):177–180, 2005.CrossRef
7.
go back to reference Song, R., Korba, L., and Yee, G., Analysis of smart card-based remote user authentication schemes. In: Proceedings of the 2007 International Conference on Security and Management, pp. 323–329, 2007. Song, R., Korba, L., and Yee, G., Analysis of smart card-based remote user authentication schemes. In: Proceedings of the 2007 International Conference on Security and Management, pp. 323–329, 2007.
8.
go back to reference Xu, J., Zhu, W. T., and Feng D. G., An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4):723–728, 2009.CrossRef Xu, J., Zhu, W. T., and Feng D. G., An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4):723–728, 2009.CrossRef
11.
go back to reference Kocher, P., Jaffe, J., and Jun, B., Differential power analysis. In: Proceedings of Advances in Cryptology 1999, pp. 388–397, 1999. Kocher, P., Jaffe, J., and Jun, B., Differential power analysis. In: Proceedings of Advances in Cryptology 1999, pp. 388–397, 1999.
12.
go back to reference Messerges, T. S., Dabbish, E. A., and Sloan R. H., Examining smart-card secur ity under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.MathSciNetCrossRef Messerges, T. S., Dabbish, E. A., and Sloan R. H., Examining smart-card secur ity under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.MathSciNetCrossRef
13.
Metadata
Title
An Improved Authentication Scheme for Telecare Medicine Information Systems
Publication date
01-12-2012
Published in
Journal of Medical Systems / Issue 6/2012
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-012-9835-1

Other articles of this Issue 6/2012

Journal of Medical Systems 6/2012 Go to the issue