Skip to main content
Erschienen in: Journal of Medical Systems 5/2014

01.05.2014 | MOBILE SYSTEMS

A More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System

verfasst von: Fengtong Wen

Erschienen in: Journal of Medical Systems | Ausgabe 5/2014

Einloggen, um Zugang zu erhalten

Abstract

Secure and efficient user mutual authentication is an essential task for integrated electronic patient record (EPR) information system. Recently, several authentication schemes have been proposed to meet this requirement. In a recent paper, Lee et al. proposed an efficient and secure password-based authentication scheme used smart cards for the integrated EPR information system. This scheme is believed to have many abilities to resist a range of network attacks. Especially, they claimed that their scheme could resist lost smart card attack. However, we reanalyze the security of Lee et al.’s scheme, and show that it fails to protect off-line password guessing attack if the secret information stored in the smart card is compromised. This also renders that their scheme is insecure against user impersonation attacks. Then, we propose a new user authentication scheme for integrated EPR information systems based on the quadratic residues. The new scheme not only resists a range of network attacks but also provides user anonymity. We show that our proposed scheme can provide stronger security.
Literatur
1.
Zurück zum Zitat Chang, Y.F., Lin, S.C., Chang, P.Y., A location-privacy-protected RFID authentication scheme. In: IEEE International Conference on Communications, pp. 1–4, 2011. Chang, Y.F., Lin, S.C., Chang, P.Y., A location-privacy-protected RFID authentication scheme. In: IEEE International Conference on Communications, pp. 1–4, 2011.
2.
Zurück zum Zitat Chen, H.M., Lo, J.W., Yeh, C.K., An efficient and secure dynamic ID-based authentication scheme for Telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.CrossRef Chen, H.M., Lo, J.W., Yeh, C.K., An efficient and secure dynamic ID-based authentication scheme for Telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.CrossRef
3.
Zurück zum Zitat Chen, Y., Chou, J., Sun, H., A novel mutual-authentication scheme based on quadratic residues for RFID systems. Comput. Netw. 52(12):2373–2380, 2008.CrossRefMATH Chen, Y., Chou, J., Sun, H., A novel mutual-authentication scheme based on quadratic residues for RFID systems. Comput. Netw. 52(12):2373–2380, 2008.CrossRefMATH
4.
Zurück zum Zitat Cheng, Z.Y., Liu, Y., Chang, C.C., Liu, C.X., A novel biometric-based remote user authentication scheme using quadratic residues. Int. J. Inf. Electron. Eng. 3(4):419–422, 2013. Cheng, Z.Y., Liu, Y., Chang, C.C., Liu, C.X., A novel biometric-based remote user authentication scheme using quadratic residues. Int. J. Inf. Electron. Eng. 3(4):419–422, 2013.
5.
Zurück zum Zitat He, D.B., Chen, J.H., Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.CrossRef He, D.B., Chen, J.H., Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.CrossRef
6.
Zurück zum Zitat Kumar, M., A new secure remote user authentication scheme with smart cards. Int. J. Netw. Secur. 11(2):88–93, 2010. Kumar, M., A new secure remote user authentication scheme with smart cards. Int. J. Netw. Secur. 11(2):88–93, 2010.
7.
Zurück zum Zitat Kocher, P.C., Jaffe, J., Jun, B., Differential power analysis. In: Proceedings of 19th International Advances in Cryptology, pp. 388-397, Santa Barbara, 1999. Kocher, P.C., Jaffe, J., Jun, B., Differential power analysis. In: Proceedings of 19th International Advances in Cryptology, pp. 388-397, Santa Barbara, 1999.
8.
Zurück zum Zitat Lee, N.Y., and Chiu, Y.C., Improved remote authentication scheme with smart card. Comput. Stand. Interfaces 27(2):177–180, 2005.CrossRef Lee, N.Y., and Chiu, Y.C., Improved remote authentication scheme with smart card. Comput. Stand. Interfaces 27(2):177–180, 2005.CrossRef
9.
Zurück zum Zitat Lee, S.W., Kim, H.S., Yoo, K.Y., Improvement of Chien et al.s remote user authentication scheme using smart cards. Comput. Stand. Interfaces 27(2):181–183, 2005.CrossRef Lee, S.W., Kim, H.S., Yoo, K.Y., Improvement of Chien et al.s remote user authentication scheme using smart cards. Comput. Stand. Interfaces 27(2):181–183, 2005.CrossRef
10.
Zurück zum Zitat Lee, T.F., Chang, I.P., Lin, T.H., Wang, C.C., A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system. J. Med. Syst. 37(3):9941, 2013. doi:10.1007/s10916-013-9941-8.CrossRef Lee, T.F., Chang, I.P., Lin, T.H., Wang, C.C., A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system. J. Med. Syst. 37(3):9941, 2013. doi:10.​1007/​s10916-013-9941-8.CrossRef
11.
12.
Zurück zum Zitat Li, X., Qiu, W., Zheng, D., Chen, K., Li, J., Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Trans. Ind. Electron. 57(2):793–800, 2010.CrossRef Li, X., Qiu, W., Zheng, D., Chen, K., Li, J., Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Trans. Ind. Electron. 57(2):793–800, 2010.CrossRef
13.
Zurück zum Zitat Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.CrossRefMathSciNet Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.CrossRefMathSciNet
14.
Zurück zum Zitat Rosen, K., Elementary number theory and its applications. Reading.MA: Addison-Wesley, 1988.MATH Rosen, K., Elementary number theory and its applications. Reading.MA: Addison-Wesley, 1988.MATH
15.
Zurück zum Zitat Takeda, H., Matsumura, Y., Kuwata, S., Architecture for networked electronic patient record systems. Int. J. Med. Inform. 60(2):161–167, 2000.CrossRef Takeda, H., Matsumura, Y., Kuwata, S., Architecture for networked electronic patient record systems. Int. J. Med. Inform. 60(2):161–167, 2000.CrossRef
16.
Zurück zum Zitat Wang, B., and Li, Z.Q., A forward-secure user authentication scheme with smart cards. Int. J. Netw. Secur. 3(2):116–119, 2006. Wang, B., and Li, Z.Q., A forward-secure user authentication scheme with smart cards. Int. J. Netw. Secur. 3(2):116–119, 2006.
17.
Zurück zum Zitat Wei, J., Hu, X., Liu, W.: An improved authentication scheme for telecare medicine information systems. In: Journal of Medical System, 36(6):3597–3604, 2012.CrossRef Wei, J., Hu, X., Liu, W.: An improved authentication scheme for telecare medicine information systems. In: Journal of Medical System, 36(6):3597–3604, 2012.CrossRef
18.
Zurück zum Zitat Wen, F.T., Susilo, W., Yang, G.M., A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. In: Wireless personal communicationx, 73(3):993–1004, 2013.CrossRef Wen, F.T., Susilo, W., Yang, G.M., A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. In: Wireless personal communicationx, 73(3):993–1004, 2013.CrossRef
19.
Zurück zum Zitat Wen, F.T., A robust uniqueness and anonymity preserving remote user authentication scheme for connected health care. J. Med. Syst. 37(6):9980, 2013.CrossRef Wen, F.T., A robust uniqueness and anonymity preserving remote user authentication scheme for connected health care. J. Med. Syst. 37(6):9980, 2013.CrossRef
20.
Zurück zum Zitat Wen, F.T., Susilo, W., Yang, G.M., A robust smart card-based anonymous user authentication protocol for wireless communications. In: Security and Communication Networks, 2013. doi:10.1002/sec.816. Wen, F.T., Susilo, W., Yang, G.M., A robust smart card-based anonymous user authentication protocol for wireless communications. In: Security and Communication Networks, 2013. doi:10.​1002/​sec.​816.
21.
Zurück zum Zitat Wu, Z.P., Chung, Y., Lai, F., Chen, T.S., A password-based user authentication scheme for the integrated EPR information system. J. Med. Syst. 36(2):631–638, 2012.CrossRef Wu, Z.P., Chung, Y., Lai, F., Chen, T.S., A password-based user authentication scheme for the integrated EPR information system. J. Med. Syst. 36(2):631–638, 2012.CrossRef
22.
Zurück zum Zitat Wu, S., Zhu, Y., Pu, Q., Robust smart-cards-based user authentication scheme with user anonymity. Secur. Commun. Netw. 5(2):236–248, 2012.CrossRef Wu, S., Zhu, Y., Pu, Q., Robust smart-cards-based user authentication scheme with user anonymity. Secur. Commun. Netw. 5(2):236–248, 2012.CrossRef
23.
Zurück zum Zitat Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.CrossRef Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.CrossRef
24.
Zurück zum Zitat Xu, J., Zhu, W.T., Feng, D.G., An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4):723–728, 2009.CrossRef Xu, J., Zhu, W.T., Feng, D.G., An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4):723–728, 2009.CrossRef
25.
Zurück zum Zitat Yang, G., Wong, D., Wang, H., Deng, X., Two-factor mutual authentication based on smart cards and passwords. J. Comput. Syst. Sci. 74(7):1160–172, 2008.CrossRefMATHMathSciNet Yang, G., Wong, D., Wang, H., Deng, X., Two-factor mutual authentication based on smart cards and passwords. J. Comput. Syst. Sci. 74(7):1160–172, 2008.CrossRefMATHMathSciNet
26.
27.
Zurück zum Zitat Yeh, T.C., Wu, C.H., Tseng, Y.M., Improvement of the RFID authentication scheme based on quadratic residues. Comput. Commun. 34:337–341, 2011.CrossRef Yeh, T.C., Wu, C.H., Tseng, Y.M., Improvement of the RFID authentication scheme based on quadratic residues. Comput. Commun. 34:337–341, 2011.CrossRef
28.
Zurück zum Zitat Youn, T., Park, Y., Lim, J., Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Commun. Lett. 13(7):471–473, 2009.CrossRef Youn, T., Park, Y., Lim, J., Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Commun. Lett. 13(7):471–473, 2009.CrossRef
29.
Zurück zum Zitat Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.CrossRef Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.CrossRef
Metadaten
Titel
A More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System
verfasst von
Fengtong Wen
Publikationsdatum
01.05.2014
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 5/2014
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-014-0042-0

Weitere Artikel der Ausgabe 5/2014

Journal of Medical Systems 5/2014 Zur Ausgabe