dc.contributor.author | Shamshad, Salman | |
dc.contributor.author | Ayub, Muhammad Faizan | |
dc.contributor.author | Mahmood, Khalid | |
dc.contributor.author | Kumari, Saru | |
dc.contributor.author | Chaudhry, Shehzad Ashraf | |
dc.contributor.author | Chen, Chien-Ming | |
dc.date.accessioned | 2023-10-23T10:15:14Z | |
dc.date.available | 2023-10-23T10:15:14Z | |
dc.date.issued | 2022 | en_US |
dc.identifier.issn | 2352-8648 | |
dc.identifier.uri | https://hdl.handle.net/11363/6022 | |
dc.description.abstract | With the advent of state-of-art technologies, the Telecare Medicine Information System (TMIS) now offers fast and
convenient healthcare services to patients at their doorsteps. However, this architecture engenders new risks and
challenges to patients' and the server's confidentiality, integrity and security. In order to avoid any resource abuse
and malicious attack, employing an authentication scheme is widely considered as the most effective approach for
the TMIS to verify the legitimacy of patients and the server. Therefore, several authentication protocols have been
proposed to this end. Very recently, Chaudhry et al. identified that there are vulnerabilities of impersonation
attacks in Islam et al.'s scheme. Therefore, they introduced an improved protocol to mitigate those security flaws.
Later, Qiu et al. proved that these schemes are vulnerable to the man-in-the-middle, impersonation and offline
password guessing attacks. Thus, they introduced an improved scheme based on the fuzzy verifier techniques,
which overcome all the security flaws of Chaudhry et al.'s scheme. However, there are still some security flaws in
Qiu et al.'s protocol. In this article, we prove that Qiu et al.'s protocol has an incorrect notion of perfect user
anonymity and is vulnerable to user impersonation attacks. Therefore, we introduce an improved protocol for
authentication, which reduces all the security flaws of Qiu et al.'s protocol. We also make a comparison of our
protocol with related protocols, which shows that our introduced protocol is more secure and efficient than
previous protocols. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | KEAI PUBLISHING LTD, 16 DONGHUANGCHENGGEN NORTH ST, BEIJING, DONGCHENG DISTRICT 100717, PEOPLES R CHINA | en_US |
dc.relation.isversionof | 10.1016/j.dcan.2021.07.002 | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | Authentication protocol | en_US |
dc.subject | Security protocol | en_US |
dc.subject | Anonymous protocol | en_US |
dc.subject | Impersonation attack | en_US |
dc.subject | TMIS | en_US |
dc.title | An enhanced scheme for mutual authentication for healthcare services | en_US |
dc.type | article | en_US |
dc.relation.ispartof | Digital Communications and Networks | en_US |
dc.department | Mühendislik ve Mimarlık Fakültesi | en_US |
dc.authorid | https://orcid.org/0000-0002-8984-3199 | en_US |
dc.authorid | https://orcid.org/0000-0001-7616-0420 | en_US |
dc.authorid | https://orcid.org/0000-0001-5046-7766 | en_US |
dc.authorid | https://orcid.org/0000-0003-4929-5383 | en_US |
dc.authorid | https://orcid.org/0000-0002-9321-6956 | en_US |
dc.authorid | https://orcid.org/0000-0002-6502-472X | en_US |
dc.identifier.volume | 8 | en_US |
dc.identifier.issue | 2 | en_US |
dc.identifier.startpage | 150 | en_US |
dc.identifier.endpage | 161 | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.institutionauthor | Chaudhry, Shehzad Ashraf | |