Skip to main content

Advertisement

Log in

Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services

Authorized Access to Healthcare Services

  • Systems-Level Quality Improvement
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

Modern network technology yields new interface for telecare medicine information systems in short TMIS used for patient’s healthcare. This system is used to provide healthcare services to patients at their home. It can be observed, telecare medicine information systems generally suffer several attacks as information being transmitted over a public network. Therefore, various authentication and key agreement schemes are proposed for TMIS to ensure secure and authorized patients communication over given public network. However, most of the schemes fail to achieve essential attributes discussed in this article. Although the key attributes of security and efficiency should be achieved in a common framework. This paper proposes construction of an RSA based authentication scheme for authorized access to healthcare services and achieves desirable key attributes of authentication protocols. Proof of security against polynomial time adversary is given in the random oracle to justify the security of proposed scheme. Communication analysis and computation analysis of proposed scheme indicates that proposed scheme’s performance is comparable and having better security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Cao, T., and Zhai, J., Improved dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):9912, 2013.

    Article  Google Scholar 

  2. Chen, H. B., Lee, W. B., and Chen, T. H., A novel drm scheme for accommodating expectations of personal use. Multimed. Tools Appl. 77(18):23, 099–23, 114, 2018.

    Article  Google Scholar 

  3. Chen, H. M., Lo, J. W., and Yeh, C. K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.

    Article  Google Scholar 

  4. Dolev, D., and Yao, A., On the security of public key protocols. IEEE Trans. Inf. Theory 29(2):198–208, 1983.

    Article  Google Scholar 

  5. Guo, C., and Chang, C. C., Chaotic maps-based password-authenticated key agreement using smart cards. Commun. Nonlinear. Sci. Num. Sim. 18(6):1433–1440, 2013.

    Article  Google Scholar 

  6. Jiang, Q., Ma, J., Lu, X., and Tian, Y., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2):12, 2014.

    Article  Google Scholar 

  7. Lee, T. F., Chang, I. P., Lin, T. H., and Wang, C. C., A secure and efficient password-based user authentication scheme using smart cards for the integrated epr information system. J. Med. Syst. 37(3):9941, 2013.

    Article  Google Scholar 

  8. Li, C. T., Lee, C. C., Weng, C. Y., and Chen, S. J., A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems. J. Med. Syst. 40(11):233, 2016.

    Article  Google Scholar 

  9. Li, X., Liu, S., Wu, F., Kumari, S., and Rodrigues, J. J.: Privacy preserving data aggregation scheme for mobile edge computing assisted iot applications. IEEE Internet of Things Journal , 2018

  10. Lin, H. Y., On the security of a dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):9929, 2013.

    Article  Google Scholar 

  11. Madhusudhan, R., and Nayak, C. S., A robust authentication scheme for telecare medical information systems. Multimed. Tools Appl. 78(11):15, 255–15, 273, 2019.

    Article  Google Scholar 

  12. Mishra, D., On the security flaws in id-based password authentication schemes for telecare medical information systems. J. Med. Syst. 39(1):154, 2015.

    Article  Google Scholar 

  13. Mishra, D., Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems. J. Med. Syst. 39(3):19, 2015. https://doi.org/10.1007/s10916-015-0193-7.

    Article  Google Scholar 

  14. Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M. K., and Chaturvedi, A., Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 38 (5):41, 2014.

    Article  Google Scholar 

  15. Odelu, V., Das, A. K., Wazid, M., and Conti, M., Provably secure authenticated key agreement scheme for smart grid. IEEE T. Smart Grid 9(3):1900–1910, 2016.

    Google Scholar 

  16. Radhakrishnan, N., and Karuppiah, M.: An efficient and secure remote user mutual authentication scheme using smart cards for telecare medical information systems. Informatics in Medicine Unlocked, 2018

  17. Renuka, K., Kumari, S., and Li, X., Design of a secure three-factor authentication scheme for smart healthcare. J. Med. Syst. 43(5):133, 2019.

    Article  Google Scholar 

  18. Rivest, R. L., Shamir, A., and Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2):120–126, 1978.

    Article  Google Scholar 

  19. Srinivas, J., Das, A. K., Wazid, M., and Kumar, N.: Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things. IEEE Transactions on Dependable and Secure Computing, 2018

  20. Srinivas, J., Mishra, D., and Mukhopadhyay, S., A mutual authentication framework for wireless medical sensor networks. J. Med. Syst. 41(5):80, 2017.

    Article  Google Scholar 

  21. Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.

    Article  Google Scholar 

  22. Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.

    Article  Google Scholar 

  23. Xie, Q., Zhang, J., and Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):9911, 2013.

    Article  Google Scholar 

  24. Zhang, L., Zhu, S., and Tang, S., Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE J. Biomed. Health 21(2):465–475, 2017.

    Article  Google Scholar 

  25. Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6): 3833–3838, 2012.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dheerendra Mishra.

Ethics declarations

Conflict of interests

All authors declare that they have no conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed Consent

All the authors have agreed to this submission.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection on Systems-Level Quality Improvement

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dharminder, D., Mishra, D. & Li, X. Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services. J Med Syst 44, 6 (2020). https://doi.org/10.1007/s10916-019-1471-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-019-1471-6

Keywords

Navigation