首页> 外文期刊>Security and communication networks >Cryptanalysis and Improvement of “An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems”
【24h】

Cryptanalysis and Improvement of “An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems”

机译:对“远程医疗医学信息系统的高效,安全,基于动态ID的身份验证方案”的分析和改进

获取原文
获取原文并翻译 | 示例

摘要

Recently, telecare medicine information systems (TMIS) have emerged as an effective mechanism to raise quality convenience and availability of healthcare services. User authentication schemes play an important role in solving security problems and grant access to healthcare services only to the authorized users. In 2010, a few authentication schemes were proposed for TMIS. These were based on the concept of static identity. In 2012, Chen et al. proposed a dynamic ID-based authentication scheme for TMIS, so that the user's identity is not revealed to anyone. However, Chen et al.'s scheme does not involve complex computations like the previous scheme for TMIS, yet it suffers from various security problems. We will show that attackers can not only impersonate the legal participants of the scheme but can also compute the shared session-key. In fact, it is an attack over the confidential communication between the participants. We will also show other drawbacks, such as password guessing attack, denial-of-service attack, immediate replay attack, and incomplete password change phase, present in the scheme. We also demonstrate user anonymity breach in Chen et al.'s scheme. To overcome these problems, we propose an improvement to Chen et al.'s scheme with a different approach. Our approach is aimed at providing an authentication mechanism for TMIS with strong security features. Copyright © 2013 John Wiley & Sons, Ltd.
机译:最近,远程护理医学信息系统(TMIS)已经成为提高医疗服务质量便利性和可用性的有效机制。用户身份验证方案在解决安全问题以及仅向授权用户授予访问医疗保健服务方面发挥着重要作用。在2010年,为TMIS提出了一些认证方案。这些是基于静态身份的概念。 2012年,Chen等。提出了一种基于动态ID的TMIS身份验证方案,从而不会向任何人透露用户的身份。但是,Chen等人的方案没有像以前的TMIS方案那样涉及复杂的计算,但是它存在各种安全问题。我们将证明攻击者不仅可以模拟该方案的合法参与者,而且可以计算共享的会话密钥。实际上,这是对参与者之间机密通信的攻击。我们还将展示该方案中存在的其他缺陷,例如密码猜测攻击,拒绝服务攻击,立即重播攻击以及不完整的密码更改阶段。我们还展示了Chen等人的方案中违反用户匿名的行为。为了克服这些问题,我们提出了使用不同方法对Chen等人的方案进行改进的方法。我们的方法旨在为具有强大安全功能的TMIS提供身份验证机制。版权所有©2013 John Wiley&Sons,Ltd.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号