Abstract
Telemedicine is an effective way to solve the imbalance in the distribution of medical resources. However, since related medical privacy data needs to be transmitted over the Internet, it will be exposed to the attacker. Therefore, designing a corresponding authentication protocol to protect users’ privacy has practical significance. For the security problems existing in telemedicine systems, an improved telemedicine system authentication protocol is proposed. This authentication protocol has indistinguishability and forward security, it can effectively resist attacks such as retransmission, tracking, eavesdropping, man-in-the-middle and denial of service. The relevant security performance analysis proves that this protocol can have higher efficiency and security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ying, Z.: Design and simulation of authentication scheme for telemedicine system. Zhejiang Gongshang University, Hang Zhou (2015)
Guo, R., Wen, Q., Jin, Z., Zhang, H.: An Efficient and secure certificateless authentication protocol for healthcare system on wireless medical sensor networks. Sci. World J. 2013, 1–7 (2013)
Wu, Z.-Y., Lee, Y.-C., Lai, F., Chung, Y.: A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(4), 2609–2619 (2012)
He, D., Chen, J., Zhang, R.: A More Secure Authentication Scheme for Telecare Medicine Information Systems. Plenum Press, New York (2012)
Wei, J., Hu, X., Liu, W.: An Improved Authentication Scheme for Telecare Medicine Information Systems. Plenum Press, New York (2012)
Jiang, Q., Ma, J., Ma, Z., Li, G.: A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1), 9897 (2013)
Padhy, R.P., Patra, M.R., Satapathy, S.C.: Design and implementation of a cloud based rural healthcare information system model. UNIASCIT 2(1), 149–157 (2012). ISSN 2250-0987
Banerjee, A., Agrawal, P., Rajkumar, R.: Design of a cloud based emergency healthcare service model. Int. J. Appl. Eng. Res. 8(19), 2261–2264 (2013)
Chen, C.-L., Yang, T.-T., Shih, T.-F.: A secure medical data exchange protocol based on cloud environment. J. Med. Syst. 38, 112 (2014). https://doi.org/10.1007/s10916-014-0112-3
Chen, C.-L., Yang, T.-T., Chiang, M.-L., Shih, T.-F.: A privacy authentication scheme based on cloud for medical environment. J. Med. Syst. 38, 143 (2014). https://doi.org/10.1007/s10916-014-0143-9
Deng, Y.: Research on privacy preserving authentication protocol in mobile medical care network. Anhui University, He Fei (2017)
Zheng, L.: Research and design of authentication protocol in identity and location separation network. Beijing Jiaotong University, Beijing (2014)
Acknowledgment
This research was partially supported by Research and practice of higher education teaching reform of Hebei Education Department (No. 2016GJJG112).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Zheng, L., Zhang, Y., Zhang, R., Chen, J., Cui, M., Song, C. (2018). An Improved Authentication Protocol in Telemedicine System. In: Hu, T., Wang, F., Li, H., Wang, Q. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2018. Lecture Notes in Computer Science(), vol 11338. Springer, Cham. https://doi.org/10.1007/978-3-030-05234-8_22
Download citation
DOI: https://doi.org/10.1007/978-3-030-05234-8_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05233-1
Online ISBN: 978-3-030-05234-8
eBook Packages: Computer ScienceComputer Science (R0)