Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications

作者: Xiong Li , Jianwei Niu , Marimuthu Karuppiah , Saru Kumari , Fan Wu

DOI: 10.1007/S10916-016-0629-8

关键词: AuthenticationOne-time passwordPasswordComputer securitySmart cardLoginPassword policyS/KEYComputer scienceChallenge–response authentication

摘要: Benefited from the development of network and communication technologies, E-health care systems telemedicine have got fast development. By using systems, patient can enjoy remote medical service provided by server. Medical data are important privacy information for patient, so it is an issue to ensure secure transmitted through public network. Authentication scheme thwart unauthorized users accessing services via insecure environments, user authentication with protection mechanism security systems. Recently, based on three factors (password, biometric smart card), was been proposed Amin et al., they claimed that their withstand most common attacks. Unfortunate, we find cannot achieve untraceability feature patient. Besides, lacks a password check such inefficient login mistake input wrong password. Due same reason, vulnerable Denial Service (DoS) attack if updates mistakenly In order improve level application, robust Then, prove our analysed. Security performance analyses show more powerful when compared other related schemes.

参考文章(37)
James H. Burrows, Secure Hash Standard ,(1995)
Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, Xiong Li, Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems Journal of Medical Systems. ,vol. 39, pp. 1- 21 ,(2015) , 10.1007/S10916-015-0318-Z
Saru Kumari, Muhammad Khurram Khan, Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme' International Journal of Communication Systems. ,vol. 27, pp. 3939- 3955 ,(2014) , 10.1002/DAC.2590
Young-Hwa An, Security improvements of dynamic ID-based remote user authentication scheme with session key agreement international conference on advanced communication technology. pp. 1072- 1076 ,(2013)
Xiong Li, Jianwei Niu, Junguo Liao, Wei Liang, Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update International Journal of Communication Systems. ,vol. 28, pp. 374- 382 ,(2015) , 10.1002/DAC.2676
Bae-Ling Chen, Wen-Chung Kuo, Lih-Chyau Wuu, Robust smart-card-based remote user password authentication scheme International Journal of Communication Systems. ,vol. 27, pp. 377- 389 ,(2014) , 10.1002/DAC.2368
Xiong Li, Jianwei Niu, Zhibo Wang, Caisen Chen, Applying biometrics to design three-factor remote user authentication scheme with key agreement Security and Communication Networks. ,vol. 7, pp. 1488- 1497 ,(2014) , 10.1002/SEC.767
Qi Jiang, Fushan Wei, Shuai Fu, Jianfeng Ma, Guangsong Li, Abdulhameed Alelaiwi, Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy Nonlinear Dynamics. ,vol. 83, pp. 2085- 2101 ,(2016) , 10.1007/S11071-015-2467-5
Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu, Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment IEEE Transactions on Dependable and Secure Computing. ,vol. 12, pp. 428- 442 ,(2015) , 10.1109/TDSC.2014.2355850