An enhanced scheme for mutual authentication for healthcare services

dc.authoridhttps://orcid.org/0000-0002-8984-3199en_US
dc.authoridhttps://orcid.org/0000-0001-7616-0420en_US
dc.authoridhttps://orcid.org/0000-0001-5046-7766en_US
dc.authoridhttps://orcid.org/0000-0003-4929-5383en_US
dc.authoridhttps://orcid.org/0000-0002-9321-6956en_US
dc.authoridhttps://orcid.org/0000-0002-6502-472Xen_US
dc.contributor.authorShamshad, Salman
dc.contributor.authorAyub, Muhammad Faizan
dc.contributor.authorMahmood, Khalid
dc.contributor.authorKumari, Saru
dc.contributor.authorChaudhry, Shehzad Ashraf
dc.contributor.authorChen, Chien-Ming
dc.date.accessioned2023-10-23T10:15:14Z
dc.date.available2023-10-23T10:15:14Z
dc.date.issued2022en_US
dc.departmentMühendislik ve Mimarlık Fakültesien_US
dc.description.abstractWith the advent of state-of-art technologies, the Telecare Medicine Information System (TMIS) now offers fast and convenient healthcare services to patients at their doorsteps. However, this architecture engenders new risks and challenges to patients' and the server's confidentiality, integrity and security. In order to avoid any resource abuse and malicious attack, employing an authentication scheme is widely considered as the most effective approach for the TMIS to verify the legitimacy of patients and the server. Therefore, several authentication protocols have been proposed to this end. Very recently, Chaudhry et al. identified that there are vulnerabilities of impersonation attacks in Islam et al.'s scheme. Therefore, they introduced an improved protocol to mitigate those security flaws. Later, Qiu et al. proved that these schemes are vulnerable to the man-in-the-middle, impersonation and offline password guessing attacks. Thus, they introduced an improved scheme based on the fuzzy verifier techniques, which overcome all the security flaws of Chaudhry et al.'s scheme. However, there are still some security flaws in Qiu et al.'s protocol. In this article, we prove that Qiu et al.'s protocol has an incorrect notion of perfect user anonymity and is vulnerable to user impersonation attacks. Therefore, we introduce an improved protocol for authentication, which reduces all the security flaws of Qiu et al.'s protocol. We also make a comparison of our protocol with related protocols, which shows that our introduced protocol is more secure and efficient than previous protocols.en_US
dc.identifier.doi10.1016/j.dcan.2021.07.002en_US
dc.identifier.endpage161en_US
dc.identifier.issn2352-8648
dc.identifier.issue2en_US
dc.identifier.scopus2-s2.0-85114990244en_US
dc.identifier.scopusqualityQ1en_US
dc.identifier.startpage150en_US
dc.identifier.urihttps://hdl.handle.net/11363/6022
dc.identifier.urihttps://doi.org/
dc.identifier.volume8en_US
dc.identifier.wosWOS:000807248700006en_US
dc.identifier.wosqualityQ1en_US
dc.indekslendigikaynakWeb of Scienceen_US
dc.indekslendigikaynakScopusen_US
dc.institutionauthorChaudhry, Shehzad Ashraf
dc.language.isoenen_US
dc.publisherKEAI PUBLISHING LTD, 16 DONGHUANGCHENGGEN NORTH ST, BEIJING, DONGCHENG DISTRICT 100717, PEOPLES R CHINAen_US
dc.relation.ispartofDigital Communications and Networksen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.subjectAuthentication protocolen_US
dc.subjectSecurity protocolen_US
dc.subjectAnonymous protocolen_US
dc.subjectImpersonation attacken_US
dc.subjectTMISen_US
dc.titleAn enhanced scheme for mutual authentication for healthcare servicesen_US
dc.typeArticleen_US

Dosyalar

Orijinal paket
Listeleniyor 1 - 1 / 1
Yükleniyor...
Küçük Resim
İsim:
1-s2.0-S2352864821000377-main.pdf
Boyut:
1.38 MB
Biçim:
Adobe Portable Document Format
Açıklama:
Makale / Article
Lisans paketi
Listeleniyor 1 - 1 / 1
Küçük Resim Yok
İsim:
license.txt
Boyut:
1.56 KB
Biçim:
Item-specific license agreed upon to submission
Açıklama: