Skip to main content
Erschienen in: Journal of Medical Systems 3/2012

01.06.2012 | ORIGINAL PAPER

A Secure Authentication Scheme for Telecare Medicine Information Systems

verfasst von: Zhen-Yu Wu, Yueh-Chun Lee, Feipei Lai, Hung-Chang Lee, Yufang Chung

Erschienen in: Journal of Medical Systems | Ausgabe 3/2012

Einloggen, um Zugang zu erhalten

Abstract

The telecare medicine information system enables or supports health-care delivery services. In recent years, the increased availability of lower-cost telecommunications systems and custom made physiological monitoring devices for patients have made it possible to bring the advantages of telemedicine directly into the patient’s home. These systems are moving towards an environment where automated patient medical records and electronically interconnected telecare facilities are prevalent. A secure authentication scheme will thus be needed to safeguard data integrity, confidentiality, and availability. Many schemes based on cryptography have been proposed for the goals. However, much of the schemes are vulnerable to various attacks, and are neither efficient, nor user friendly. Specially, in terms of efficiency, some schemes need the exponential computation resulting in high time cost. Therefore, we propose a novel authentication scheme that is added the pre-computing idea within the communication process to avoid the time-consuming exponential computations. Finally, it is shown to be more secure and practical for telecare medicine environments.
Literatur
1.
Zurück zum Zitat Yang, C. M., Lin, H. C., Chang, P., and Jian, W. S., Taiwan’s perspective on electronic medical records’ security and privacy protection: Lessons learned from HIPAA. Comput. Methods Programs Biol. 82(3):277–282, 2006.CrossRef Yang, C. M., Lin, H. C., Chang, P., and Jian, W. S., Taiwan’s perspective on electronic medical records’ security and privacy protection: Lessons learned from HIPAA. Comput. Methods Programs Biol. 82(3):277–282, 2006.CrossRef
2.
Zurück zum Zitat Lee, W. B., and Lee, C. D., A cryptographic key management solution for HIPAA privacy/security regulations. IEEE Trans. Inf. Technol. Biomed. 12(1):34–41, 2008.CrossRef Lee, W. B., and Lee, C. D., A cryptographic key management solution for HIPAA privacy/security regulations. IEEE Trans. Inf. Technol. Biomed. 12(1):34–41, 2008.CrossRef
3.
Zurück zum Zitat Gritzalis, S., Lambrinoudakis, C., Lekkas, D., and Deftereos, S., Technical guidelines for enhancing privacy and data protection in modern electronic medical environments. IEEE Trans. Inf. Technol. Biomed. 9(3):413–423, 2005.CrossRef Gritzalis, S., Lambrinoudakis, C., Lekkas, D., and Deftereos, S., Technical guidelines for enhancing privacy and data protection in modern electronic medical environments. IEEE Trans. Inf. Technol. Biomed. 9(3):413–423, 2005.CrossRef
4.
Zurück zum Zitat Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst. 24(4):213–234, 2000.CrossRef Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst. 24(4):213–234, 2000.CrossRef
5.
Zurück zum Zitat Tsai, J. L., Efficient nonce-based authentication scheme for session initiation protocol. Int. J. Netw. Sec. 9(1):12–16, 2009. Tsai, J. L., Efficient nonce-based authentication scheme for session initiation protocol. Int. J. Netw. Sec. 9(1):12–16, 2009.
6.
Zurück zum Zitat Lee, N. Y., and Chiu, Y. C., Improved remote authentication scheme with smart card. Comput. Stand. Interfaces 27(2):177–180, 2005.CrossRef Lee, N. Y., and Chiu, Y. C., Improved remote authentication scheme with smart card. Comput. Stand. Interfaces 27(2):177–180, 2005.CrossRef
7.
Zurück zum Zitat Chien, H.-Y., Jan, J.-K., and Tseng, Y.-M., An efficient and practical solution to remote authentication: Smart card. Comput. Secur. 21(4):372–375, 2002.CrossRef Chien, H.-Y., Jan, J.-K., and Tseng, Y.-M., An efficient and practical solution to remote authentication: Smart card. Comput. Secur. 21(4):372–375, 2002.CrossRef
8.
Zurück zum Zitat Song, R., Korba, L., Yee, G., Analysis of smart card-based remote user authentication schemes. Proceedings of the 2007 International Conference on Security and Management, 323–329, 2007. Song, R., Korba, L., Yee, G., Analysis of smart card-based remote user authentication schemes. Proceedings of the 2007 International Conference on Security and Management, 323–329, 2007.
9.
Zurück zum Zitat Das, M. L., Two-factor user authentication in wireless sensor networks. IEEE Trans. Wireless Commun. 8(3):1086–1090, 2009.CrossRef Das, M. L., Two-factor user authentication in wireless sensor networks. IEEE Trans. Wireless Commun. 8(3):1086–1090, 2009.CrossRef
10.
Zurück zum Zitat Liao, E., Lee, C. C., and Hwang, M. S., A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 72(4):727–740, 2006.MathSciNetMATHCrossRef Liao, E., Lee, C. C., and Hwang, M. S., A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 72(4):727–740, 2006.MathSciNetMATHCrossRef
12.
Zurück zum Zitat Yang, C. C., Wang, R. C., and Liu, W. T., Secure authentication scheme for session initiation protocol. Comput. Secur. 24:381–386, 2005.CrossRef Yang, C. C., Wang, R. C., and Liu, W. T., Secure authentication scheme for session initiation protocol. Comput. Secur. 24:381–386, 2005.CrossRef
13.
Zurück zum Zitat Xu, J., Zhu, W. T., and Feng, D. G., An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4):723–728, 2009.CrossRef Xu, J., Zhu, W. T., and Feng, D. G., An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4):723–728, 2009.CrossRef
14.
Zurück zum Zitat Liu, J. Y., Zhou, A. M., and Gao, M. X., A new mutual authentication scheme based on nonce and smart cards. Comput. Commun. 31(10):2205–2209, 2008.CrossRef Liu, J. Y., Zhou, A. M., and Gao, M. X., A new mutual authentication scheme based on nonce and smart cards. Comput. Commun. 31(10):2205–2209, 2008.CrossRef
15.
Zurück zum Zitat Jones, D., Smart cards for the people. Card Technol. Today 15(3):16–16(1), 2003.CrossRef Jones, D., Smart cards for the people. Card Technol. Today 15(3):16–16(1), 2003.CrossRef
16.
Zurück zum Zitat Chen, C.-L., Chen, Y.-Y., and Chen, Y.-H., Group-based authentication to protect digital content for business applications. Int. J. Innovative Comput. Inf. Control 5(5):1243–1251, 2009. Chen, C.-L., Chen, Y.-Y., and Chen, Y.-H., Group-based authentication to protect digital content for business applications. Int. J. Innovative Comput. Inf. Control 5(5):1243–1251, 2009.
17.
Zurück zum Zitat Lo, N. W., and Yeh, K.-H., A novel authentication scheme for mobile commerce transactions. Int. J. Innovative Comput. Inf. Control 6(7):3093–3103, 2010. Lo, N. W., and Yeh, K.-H., A novel authentication scheme for mobile commerce transactions. Int. J. Innovative Comput. Inf. Control 6(7):3093–3103, 2010.
18.
Zurück zum Zitat Yoon, E., and Yoo, K., An efficient password authentication schemes without using the server public key for grid computing. GCC 2005 LNCS 3795:149–154, 2005. Yoon, E., and Yoo, K., An efficient password authentication schemes without using the server public key for grid computing. GCC 2005 LNCS 3795:149–154, 2005.
19.
Zurück zum Zitat Stallings, W., Cryptography and network security: Principal and practices. 4th Edition. Prentice Hall, 2005. Stallings, W., Cryptography and network security: Principal and practices. 4th Edition. Prentice Hall, 2005.
20.
Zurück zum Zitat Huston, T., Security issues for implementation of E-medical records. Commun. ACM 44(9):89–94, 2001.CrossRef Huston, T., Security issues for implementation of E-medical records. Commun. ACM 44(9):89–94, 2001.CrossRef
21.
Zurück zum Zitat ElGamal, T., A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory IT-31(4):469–472, 1985.MathSciNetCrossRef ElGamal, T., A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory IT-31(4):469–472, 1985.MathSciNetCrossRef
Metadaten
Titel
A Secure Authentication Scheme for Telecare Medicine Information Systems
verfasst von
Zhen-Yu Wu
Yueh-Chun Lee
Feipei Lai
Hung-Chang Lee
Yufang Chung
Publikationsdatum
01.06.2012
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 3/2012
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-010-9614-9

Weitere Artikel der Ausgabe 3/2012

Journal of Medical Systems 3/2012 Zur Ausgabe