Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
A more efficient and secure dynamic ID-based remote user authentication scheme
Computer Communications
Two-factor user authentication in wireless sensor networks
IEEE Transactions on Wireless Communications
An improved dynamic ID-based remote user authentication with key agreement scheme
Computers and Electrical Engineering
A dynamic ID-based remote user authentication scheme
IEEE Transactions on Consumer Electronics
A More Secure Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
A Secure Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
An Efficient Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
An Improved Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
Journal of Medical Systems
A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems
Journal of Medical Systems
Hi-index | 0.00 |
Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.