Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

A two-factor key verification system focused on remote user for medical applications

A two-factor key verification system focused on remote user for medical applications Doctors can provide healthcare related treatments to users by using telecare medicine information systems (TMISs). To safeguard these systems, an appropriate security scheme for authentication plus key agreement is required conclusively. Recently in 2015, Arshad et al. (2015) revealed some flaws in Bin Muhaya's authentication and key agreement scheme and proposed an enhanced system on the same. However, we demonstrate that Arshad et al.'s (2015) scheme is susceptible to session key disclosure as well as user impersonation attacks. Moreover, in pursuance of better security, we introduce a new two-factor authentication and key agreement scheme. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png International Journal of Critical Infrastructures Inderscience Publishers

A two-factor key verification system focused on remote user for medical applications

Loading next page...
 
/lp/inderscience-publishers/a-two-factor-key-verification-system-focused-on-remote-user-for-IOi0gFB4Kv
Publisher
Inderscience Publishers
Copyright
Copyright © Inderscience Enterprises Ltd
ISSN
1475-3219
eISSN
1741-8038
DOI
10.1504/IJCIS.2017.088232
Publisher site
See Article on Publisher Site

Abstract

Doctors can provide healthcare related treatments to users by using telecare medicine information systems (TMISs). To safeguard these systems, an appropriate security scheme for authentication plus key agreement is required conclusively. Recently in 2015, Arshad et al. (2015) revealed some flaws in Bin Muhaya's authentication and key agreement scheme and proposed an enhanced system on the same. However, we demonstrate that Arshad et al.'s (2015) scheme is susceptible to session key disclosure as well as user impersonation attacks. Moreover, in pursuance of better security, we introduce a new two-factor authentication and key agreement scheme.

Journal

International Journal of Critical InfrastructuresInderscience Publishers

Published: Jan 1, 2017

There are no references for this article.