Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2013 Aug;37(4):9954.
doi: 10.1007/s10916-013-9954-3. Epub 2013 Jul 5.

An authentication scheme for secure access to healthcare services

Affiliations

An authentication scheme for secure access to healthcare services

Muhammad Khurram Khan et al. J Med Syst. 2013 Aug.

Abstract

Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

PubMed Disclaimer

References

    1. J Med Syst. 2000 Aug;24(4):213-34 - PubMed
    1. J Med Syst. 2012 Dec;36(6):3907-15 - PubMed
    1. J Med Syst. 2012 Dec;36(6):3597-604 - PubMed
    1. Int J Med Inform. 2001 Dec;64(2-3):201-5 - PubMed
    1. Comput Biol Med. 1998 Sep;28(5):567-79 - PubMed

Publication types

LinkOut - more resources