ACM Transactions on Computer Systems (TOCS)
Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
An improved BioHashing for human authentication
Pattern Recognition
Two-factor mutual authentication based on smart cards and passwords
Journal of Computer and System Sciences
An efficient biometrics-based remote user authentication scheme using smart cards
Journal of Network and Computer Applications
Two-factor user authentication in wireless sensor networks
IEEE Transactions on Wireless Communications
Journal of Network and Computer Applications
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
A More Secure Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
A Secure Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
Journal of Medical Systems
Journal of Medical Systems
Journal of Medical Systems
Hi-index | 0.00 |
User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.