Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2015 Mar;39(3):33.
doi: 10.1007/s10916-015-0217-3. Epub 2015 Feb 15.

A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS

Affiliations

A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS

Ruhul Amin et al. J Med Syst. 2015 Mar.

Abstract

Telecare Medical Information System (TMIS) makes an efficient and convenient connection between patient(s)/user(s) at home and doctor(s) at a clinical center. To ensure secure connection between the two entities (patient(s)/user(s), doctor(s)), user authentication is enormously important for the medical server. In this regard, many authentication protocols have been proposed in the literature only for accessing single medical server. In order to fix the drawbacks of the single medical server, we have primarily developed a novel architecture for accessing several medical services of the multi-medical server, where a user can directly communicate with the doctor of the medical server securely. Thereafter, we have developed a smart card based user authentication and key agreement security protocol usable for TMIS system using cryptographic one-way hash function. We have analyzed the security of our proposed authentication scheme through both formal and informal security analysis. Furthermore, we have simulated the proposed scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and showed that the scheme is secure against the replay and man-in-the-middle attacks. The informal security analysis is also presented which confirms that the protocol has well security protection on the relevant security attacks. The security and performance comparison analysis confirm that the proposed protocol not only provides security protection on the above mentioned attacks, but it also achieves better complexities along with efficient login and password change phase.

PubMed Disclaimer

Similar articles

Cited by

References

    1. J Med Syst. 2014 Feb;38(2):12 - PubMed
    1. J Med Syst. 2013 Oct;37(5):9972 - PubMed
    1. J Med Syst. 2014 Dec;38(12):142 - PubMed
    1. J Med Syst. 2014 Jun;38(6):24 - PubMed
    1. J Med Syst. 2012 Dec;36(6):3833-8 - PubMed

MeSH terms

LinkOut - more resources