A More Secure Authentication Scheme for Telecare Medicine Information Systems
Top Cited Papers
- 1 March 2011
- journal article
- Published by Springer Nature in Journal of Medical Systems
- Vol. 36 (3), 1989-1995
- https://doi.org/10.1007/s10916-011-9658-5
Abstract
It is important to guarantee the privacy and the security of the users in the telecare medicine information system. Recently, Wu et al.’s proposed an authentication scheme for mobile devices in telecare medicine information system. They added the pre-computing idea within the communication process to avoid the time-consuming exponential computations. They also claimed their scheme can withstand various attacks. We will show that their scheme suffers from the impersonation attack to the insider’s attack. In order to overcome the weaknesses, we propose an improved scheme to eliminate the weakness. Our scheme is not only more secure than Wu et al.’s scheme, but also has better performance. Then our scheme is more efficient and appropriate to collocating with low power mobile devices for the telecare medicine information system.Keywords
This publication has 12 references indexed in Scilit:
- An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable securityInformation Fusion, 2011
- A Secure Authentication Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 2010
- An improved smart card based password authentication scheme with provable securityComputer Standards & Interfaces, 2008
- A new mutual authentication scheme based on nonce and smart cardsComputer Communications, 2008
- A Cryptographic Key Management Solution for HIPAA Privacy/Security RegulationsIEEE Transactions on Information Technology in Biomedicine, 2008
- A password authentication scheme over insecure networksJournal of Computer and System Sciences, 2006
- Secure authentication scheme for session initiation protocolComputers & Security, 2005
- Managing medical and insurance information through a smart-card-based information system.Journal of Medical Systems, 2000
- Differential Power AnalysisLecture Notes in Computer Science, 1999
- New directions in cryptographyIEEE Transactions on Information Theory, 1976