2014
DOI: 10.1007/s10916-014-0136-8
|View full text |Cite
|
Sign up to set email alerts
|

Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems

Abstract: Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security fla… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
89
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
9

Relationship

4
5

Authors

Journals

citations
Cited by 114 publications
(89 citation statements)
references
References 49 publications
0
89
0
Order By: Relevance
“…The essence of the active tracking resistance of the proposed scheme is that each calculation of Auth = ( + TK 2 ) ⊕ ( 1 + TK 1 ) involves the confusion value ( 1 + TK 1 ), where the computation of TK 1 needs either tag's secret 2 or the server's private key ; therefore, International Journal of Distributed Sensor Networks 5 Arshad and Nikooghadam [12] Liao and Hsiao [9] He et al [13] Ours The server's computational cost Server Spoofing Attack Resistance. To impersonate the server, the adversary must be able to generate a valid message 3 = {Auth }, where 1 = 1 and Auth = ( +2TK 2 )⊕2 ( 1 + TK 1 ).…”
Section: Security Analysismentioning
confidence: 99%
“…The essence of the active tracking resistance of the proposed scheme is that each calculation of Auth = ( + TK 2 ) ⊕ ( 1 + TK 1 ) involves the confusion value ( 1 + TK 1 ), where the computation of TK 1 needs either tag's secret 2 or the server's private key ; therefore, International Journal of Distributed Sensor Networks 5 Arshad and Nikooghadam [12] Liao and Hsiao [9] He et al [13] Ours The server's computational cost Server Spoofing Attack Resistance. To impersonate the server, the adversary must be able to generate a valid message 3 = {Auth }, where 1 = 1 and Auth = ( +2TK 2 )⊕2 ( 1 + TK 1 ).…”
Section: Security Analysismentioning
confidence: 99%
“…By using TMISs, patients (especially in hard-to-reach places and rural areas) can stay at their home and obtain healthcare services at the right time and lower cost. Patients can send their body parameters which indicate their health condition to medical servers and receive a proper treatment from doctors [1,2]. These systems not only reduces patients expenses and problems, but also can save precious resources in hospitals, such as veteran doctors, beds, medical devices and so on.…”
Section: Introductionmentioning
confidence: 99%
“…Since the authentication mechanism can prevent the medical resources from being accessed by malicious attackers and the session key can encrypt the packets to ensure the confidentiality of medical data [3,4]. Hitherto, many authentication and key agreement schemes have been proposed to provide security in TMIS, which can be classified into ones [5][6][7][8][9][10][11][12] using symmetric key cryptography only and ones using public key cryptography [13][14][15][16][17][18][19][20][21][22][23][24][25][26][27][28].…”
Section: Introductionmentioning
confidence: 99%
“…But the time-consuming modular exponentiation operation involving these schemes is not suitable for the wireless medical devices with limited computational capability. To address the problem, several authentication schemes [26][27][28][29] based on the elliptic curve cryptography (ECC) were presented. Compared with RSA, ECC provides better performance since it achieves same security level with smaller key size.…”
Section: Introductionmentioning
confidence: 99%