An Improved Biometric Based Authentication Scheme with User Anonymity Using Elliptic Curve Cryptosystem

نویسندگان

  • Lidong Han
  • Qi Xie
  • Wenhao Liu
چکیده

Telecare medical information systems (TMIS) provides convenient health care services for patients in order to save the patients’ time and expense. The protection of user’s privacy and data security is significant over public communication. Recently, Lu et al. presented a threefactor based authentication protocol using elliptic curve cryptography. In this paper, we analyze the security of Lu et al.’s scheme. We demonstrate that Lu et al’s scheme can’t protect user anonymity and insecure against impersonation attack. To remedy the mentioned security weakness, we propose a new authentication scheme to improve on Lu et al.’s scheme. In comparison with recent schemes, our scheme can provide stronger security and more efficiency in implementation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks

As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attr...

متن کامل

Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks

Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in a...

متن کامل

A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC

In 2012, Chuang et al. proposed a smart card based anonymous user authentication scheme for roaming service in global mobility networks. In this paper, however, we analyze Chuang et al.’s scheme and show that their scheme is in fact insecure to against server masquerading attack, off-line dictionary attack and user impersonation attack. Moreover, their scheme cannot achieve the claimed user ano...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Practical remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem

Most recently, Yang et al proposed an ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem in journal of Computer and Security. In this paper, we find some disadvantages in their scheme and thereafter propose such an improved scheme that overcomes all those disadvantages existing in their scheme while the merits are left unchanged. Ou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 19  شماره 

صفحات  -

تاریخ انتشار 2017