Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services

被引:0
|
作者
Saru Kumari
Km. Renuka
机构
[1] Ch. Charan Singh University,Department of Mathematics
来源
关键词
Biometrics; Offline password guessing attack; Authentication; Telecare medical information system; Anonymity; Burrows–Abadi–Needham logic;
D O I
暂无
中图分类号
学科分类号
摘要
The telecare medical information system (TMIS) offers remote healthcare services to the patients at their doorstep. Including this serenity, it is compulsory to preserve privacy and to give guaranty to the patients for secured TMIS communication. Authentication protocols are usually exploited to ensure privacy and protect communication between patients and remote assistance. Currently, we observe the inaccuracy of an authentication protocol for TMIS. The scheme is recently proposed by Qiu et al. to realize healthcare services. We find that their protocol is vulnerable to offline password guessing, replay, and anonymity violation attacks. To avoid these weaknesses, we have developed an improved biometric-based protocol. Our proposed protocol is capable to prevent the said attacks. We validate the security of our proposed protocol using Burrows–Abadi–Needham logic. We compare the performance of the proposed protocol with the preceding protocols and conclude that the proposed protocol is more secure and efficient as compared to its former counterparts.
引用
收藏
页码:27 / 45
页数:18
相关论文
共 50 条
  • [1] Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services
    Kumari, Saru
    Renuka, Km
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (01) : 27 - 45
  • [2] A Note on “Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services”
    Zhengjun Cao
    Wireless Personal Communications, 2023, 133 : 2439 - 2444
  • [3] A Note on "Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services"
    Cao, Zhengjun
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 133 (04) : 2439 - 2444
  • [4] A secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systems
    Lin, Han-Yu
    PLOS ONE, 2018, 13 (12):
  • [5] A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems
    Li, Chun-Ta
    Lee, Cheng-Chi
    Weng, Chi-Yao
    Chen, Song-Jhih
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
  • [6] A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems
    Chun-Ta Li
    Cheng-Chi Lee
    Chi-Yao Weng
    Song-Jhih Chen
    Journal of Medical Systems, 2016, 40
  • [7] Efficient Joint Key Authentication Model in E-Healthcare
    Sajjad, Muhammad
    Malik, Tauqeer Safdar
    Khurram, Shahzada
    Gardezi, Akber Abid
    Alassery, Fawaz
    Hamam, Habib
    Cheikhrouhou, Omar
    Shafiq, Muhammad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (02): : 2739 - 2753
  • [8] ECC-based lightweight authentication and access control scheme for IoT E-healthcare
    Yao, Hailong
    Yan, Qiao
    Fu, Xingbing
    Zhang, Zhibin
    Lan, Caihui
    SOFT COMPUTING, 2022, 26 (09) : 4441 - 4461
  • [9] ECC-based lightweight authentication and access control scheme for IoT E-healthcare
    Hailong Yao
    Qiao Yan
    Xingbing Fu
    Zhibin Zhang
    Caihui Lan
    Soft Computing, 2022, 26 : 4441 - 4461
  • [10] A robust and lightweight secure access scheme for cloud based E-healthcare services
    Mehedi Masud
    Gurjot Singh Gaba
    Karanjeet Choudhary
    Roobaea Alroobaea
    M. Shamim Hossain
    Peer-to-Peer Networking and Applications, 2021, 14 : 3043 - 3057