Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2015 Aug;39(8):78.
doi: 10.1007/s10916-015-0258-7. Epub 2015 Jun 26.

A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity

Affiliations

A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity

Ruhul Amin et al. J Med Syst. 2015 Aug.

Abstract

Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.

PubMed Disclaimer

Similar articles

Cited by

References

    1. J Med Syst. 2014 Oct;38(10):135 - PubMed
    1. J Med Syst. 2014 May;38(5):41 - PubMed
    1. J Med Syst. 2013 Oct;37(5):9972 - PubMed
    1. J Med Syst. 2014 Jun;38(6):24 - PubMed
    1. J Med Syst. 2015 May;39(5):49 - PubMed

LinkOut - more resources