Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services

被引:0
|
作者
Saru Kumari
Km. Renuka
机构
[1] Ch. Charan Singh University,Department of Mathematics
来源
关键词
Biometrics; Offline password guessing attack; Authentication; Telecare medical information system; Anonymity; Burrows–Abadi–Needham logic;
D O I
暂无
中图分类号
学科分类号
摘要
The telecare medical information system (TMIS) offers remote healthcare services to the patients at their doorstep. Including this serenity, it is compulsory to preserve privacy and to give guaranty to the patients for secured TMIS communication. Authentication protocols are usually exploited to ensure privacy and protect communication between patients and remote assistance. Currently, we observe the inaccuracy of an authentication protocol for TMIS. The scheme is recently proposed by Qiu et al. to realize healthcare services. We find that their protocol is vulnerable to offline password guessing, replay, and anonymity violation attacks. To avoid these weaknesses, we have developed an improved biometric-based protocol. Our proposed protocol is capable to prevent the said attacks. We validate the security of our proposed protocol using Burrows–Abadi–Needham logic. We compare the performance of the proposed protocol with the preceding protocols and conclude that the proposed protocol is more secure and efficient as compared to its former counterparts.
引用
收藏
页码:27 / 45
页数:18
相关论文
共 50 条
  • [31] LEASE: Lattice and ECC-based Authentication and Integrity Verification Scheme in E-Healthcare
    Dua, Amit
    Chaudhary, Rajat
    Aujla, Gagangeet Singh
    Jindal, Anish
    Kumar, Neeraj
    Rodrigues, Joel J. P. C.
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [32] Security analysis of the generalized key agreement and password authentication protocol
    Yeh, HT
    Sun, HM
    Hwang, T
    IEEE COMMUNICATIONS LETTERS, 2001, 5 (11) : 462 - 463
  • [33] Reflection attack on a generalized key agreement and password authentication protocol
    Ku, WC
    Lee, HL
    Chen, CM
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (05) : 1386 - 1388
  • [34] Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare ServicesAuthorized Access to Healthcare Services
    Dharminder Dharminder
    Dheerendra Mishra
    Xiong Li
    Journal of Medical Systems, 2020, 44
  • [35] An enhanced two factor authentication for e-healthcare system
    Likitha S.
    Saravanan R.
    International Journal of Internet Manufacturing and Services, 2020, 7 (03) : 252 - 274
  • [36] An efficient authentication and key agreement scheme for secure smart grid communication services
    Hammami, Hamza
    Obaidat, Mohammad S.
    Ben Yahia, Sadok
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (15)
  • [37] An e-healthcare authentication protocol employing cloud computing
    Mohit, Prerna
    Amin, Ruhul
    Biswas, G. P.
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2021, 36 (03) : 155 - 168
  • [38] Cryptanalysis and Biometric-Based Enhancement of a Remote User Authentication Scheme for E-Healthcare System
    Rifaqat Ali
    Arup Kumar Pal
    Arabian Journal for Science and Engineering, 2018, 43 : 7837 - 7852
  • [39] E-healthcare: an analysis of key themes in research
    Mukherjee, Avinandan
    McGinnis, John
    INTERNATIONAL JOURNAL OF PHARMACEUTICAL AND HEALTHCARE MARKETING, 2007, 1 (04) : 349 - 363
  • [40] Cryptanalysis and Biometric-Based Enhancement of a Remote User Authentication Scheme for E-Healthcare System
    Ali, Rifaqat
    Pal, Arup Kumar
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) : 7837 - 7852