Cryptanalysis of Khatoon et al.'s ECC-based Authentication Protocol for Healthcare Systems

06/20/2019
by   Mahdi Nikooghadam, et al.
0

Telecare medical information systems are gaining rapid popularity in terms of providing the delivery of online health-related services such as online remote health profile access for patients and doctors. Due to being installed entirely on Internet, these systems are exposed to various security and privacy threats. Hence, establishing a secure key agreement and authentication process between the patients and the medical servers is an important challenge. Recently, Khatoon et.al proposed an ECC-based unlink-able authentication and key agreement method for healthcare related application in smart city. In this article, we provide a descriptive analysis on their proposed scheme and prove that Khatoon et al.'s scheme is vulnerable to known-session-specific temporary information attack and is not able to provide perfect forward secrecy.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/13/2023

Cryptanalysis on Secure ECC based Mutual Authentication Protocol for Cloud-Assisted TMIS

The creation of TMIS (Telecare Medical Information System) makes it simp...
research
09/25/2018

Enhanced Session Initiation Protocols for Emergency Healthcare Applications

In medical emergencies, an instant and secure messaging is an important ...
research
04/16/2020

A Secure and Improved Multi Server Authentication Protocol Using Fuzzy Commitment

Very recently, Barman et al. proposed a multi-server authentication prot...
research
10/13/2021

Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System

The usage of different technologies and smart devices helps people to ge...
research
11/11/2021

An End-to-End Authentication Mechanism for Wireless Body Area Networks

Wireless Body Area Network (WBAN) ensures high-quality healthcare servic...
research
01/10/2019

A Scalable Model for Secure Multiparty Authentication

Distributed system architectures such as cloud computing or the emergent...
research
08/28/2018

Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems (Full text)

For many years, the pay-TV system has attracted a lot of users. Users ha...

Please sign up or login with your details

Forgot password? Click here to reset