Cryptanalysis on Secure ECC based Mutual Authentication Protocol for Cloud-Assisted TMIS

06/13/2023
by   Diksha, et al.
0

The creation of TMIS (Telecare Medical Information System) makes it simpler for patients to receive healthcare services and opens up options for seeking medical attention and storing medical records with access control. With Wireless Medical Sensor Network and cloud-based architecture, TMIS gives the chance to patients to collect their physical health information from medical sensors and also upload this information to the cloud through their mobile devices. The communication is held through internet connectivity, therefore security and privacy are the main motive aspects of a secure cloud-assisted TMIS. However, because very sensitive data is transmitted between patients and doctors through the cloud server, thus security protection is important for this system. Recently, Kumar et al designed a mutual authentication protocol for cloud-assisted TMIS based on ECC [2]. In this paper, we revisited this scheme and traced out that their scheme has some significant pitfalls like health report revelation attack, and report confidentiality. In this study, we will provide the cryptanalysis of the scheme developed by Kumar et al.

READ FULL TEXT
research
06/20/2019

Cryptanalysis of Khatoon et al.'s ECC-based Authentication Protocol for Healthcare Systems

Telecare medical information systems are gaining rapid popularity in ter...
research
07/27/2020

A Proposed Access Control-Based Privacy Preservation Model to Share Healthcare Data in Cloud

Healthcare data in cloud computing facilitates the treatment of patients...
research
07/05/2021

A Review-based Taxonomy for Secure Health Care Monitoring: Wireless Smart Cameras

Health records data security is one of the main challenges in e-health s...
research
01/10/2019

A Scalable Model for Secure Multiparty Authentication

Distributed system architectures such as cloud computing or the emergent...
research
03/27/2018

POKs Based Low Energy Authentication Scheme for Implantable Medical Devices

Implantable medical devices (IMDs), including pacemakers, implanted card...
research
09/25/2018

Enhanced Session Initiation Protocols for Emergency Healthcare Applications

In medical emergencies, an instant and secure messaging is an important ...
research
08/28/2018

Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems (Full text)

For many years, the pay-TV system has attracted a lot of users. Users ha...

Please sign up or login with your details

Forgot password? Click here to reset