Back
 JAMP  Vol.6 No.1 , January 2018
Improvement of an Anonymous and Lightweight Authentication Scheme for TMIS
Abstract:
Telecare Medicine Information Systems (TMIS) provides flexible and convenient healthcare for patients. However, the medical data transmitted between patients and doctors are exposed to unsecure public networks. To protect the patient’s personal information, many authentication schemes are designed. Recently, Kang et al. proposed a hash based authentication schemes for TMIS and claimed that it could resist various attacks. However, we find that their proposed scheme is unsecure to traceability attack and user impersonation attack. In order to enhance the security and preserve the efficiency of Kang et al.’s, we proposed a new anonymous and lightweight scheme. The analysis demonstrates that our proposed scheme is superior to Kang et al.’s and the related schemes in security.
Cite this paper: Chen, C. , Xiang, B. , Ke, E. , Wu, T. , Lin, J. (2018) Improvement of an Anonymous and Lightweight Authentication Scheme for TMIS. Journal of Applied Mathematics and Physics, 6, 18-28. doi: 10.4236/jamp.2018.61003.
References

[1]   Kang, D., Lee, D., Cho, S., Jung, J. and Won, D. (2017) Cryptanalysis and Improvement of Robust Authentication Scheme for Telecare Medicine Information Systems. In Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, ACM, 18.

[2]   Zhu, Z. (2012) An Efficient Authentication Scheme for Telecare Medicine Information Systems. Journal of Medical Systems, 36, 3833-3838. https://doi.org/10.1007/s10916-012-9856-9

[3]   Wei, J., Hu, X. and Liu, W. (2012) An Improved Authentication Scheme for Telecare Medicine Information Systems. Journal of Medical Systems, 36, 3597-3604. https://doi.org/10.1007/s10916-012-9835-1

[4]   Debiao, H., Jianhua, C. and Rui, Z. (2012) A More Secure Authentication Scheme for Telecare Medicine Information Systems. Journal of Medical Systems, 36, 1989-1995. https://doi.org/10.1007/s10916-011-9658-5

[5]   Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C. and Chung, Y. (2012) A Secure Authentication Scheme for Telecare Medicine Information Systems. Journal of Medical Systems, 36, 1529-1535. https://doi.org/10.1007/s10916-010-9614-9

[6]   Arya, K. and Vidwansh, A. (2015) A Robust Authentication Scheme for Telecare Medicine Information Systems. International Journal of Computer Applications, 123, No. 6. https://doi.org/10.5120/ijca2015905341

[7]   Kocher, P., Jaffe, J. and Jun, B. (1999) Differential Power Analysis. In: Advances in cryptology—CRYPTO’99, Springer, Berlin, 789-789. https://doi.org/10.1007/3-540-48405-1_25

[8]   Messerges, T.S., Dabbish, E.A. and Sloan, R.H. (2002) Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Transactions on Computers, 51, 541-552. https://doi.org/10.1109/TC.2002.1004593

[9]   Chen, C.M., Li, C.T., Liu, S., Wu, T.Y. and Pan, J.S. (2017) A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System. IEEE Access, 5, 3410-3422. https://doi.org/10.1109/ACCESS.2017.2675163

[10]   Sun, H.M., He, B.Z., Chen, C.M., Wu, T.Y., Lin, C.H. and Wang, H. (2015) A Provable Authenticated Group Key Agreement Protocol for Mobile Environment. Information Sciences, 321, 224-237. https://doi.org/10.1016/j.ins.2015.01.037

[11]   Chen, C.M., Fang, W., Wang, K.H. and Wu, T.Y. (2017) Comments on “An Improved Secure and Efficient Password and Chaos-Based Two-Party Key Agreement Protocol”. Nonlinear Dynamics, 87, 2073-2075. https://doi.org/10.1007/s11071-016-3171-9

[12]   Chen, C.M., Xu, L., Wu, T.Y. and Li, C.R. (2016) On the Security of a Chaotic Maps-Based Three-Party Authenticated Key Agreement Protocol. Journal of Network Intelligence, No. 2, 61-65.

 
 
Top