Skip to main content

Advertisement

Log in

A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems

  • Original Paper
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

In the field of the Telecare Medicine Information System, recent researches have focused on consummating more convenient and secure healthcare delivery services for patients. In order to protect the sensitive information, various attempts such as access control have been proposed to safeguard patients’ privacy in this system. However, these schemes suffered from some certain security defects and had costly consumption, which were not suitable for the telecare medicine information system. In this paper, based on the elliptic curve cryptography, we propose a secure and efficient two-factor mutual authentication and key agreement scheme to reduce the computational cost. Such a scheme enables to provide the patient anonymity by employing the dynamic identity. Compared with other related protocols, the security analysis and performance evaluation show that our scheme overcomes some well-known attacks and has a better performance in the telecare medicine information system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Li, S. H., Wang, C. Y., Lu, W. H., Lin, Y. Y., and Yen, D. C., Design and implementation of a telecare information platform. J. Med. Syst. 36(3):1629–1650, 2012.

    Article  Google Scholar 

  2. Chen, H. M., Lo, J. W., and Yeh, C. K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.

    Article  Google Scholar 

  3. Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst. 24(4):213–234, 2000.

    Article  Google Scholar 

  4. Fernández-Alemán, J. L., Señor, I. C., Lozoya, P. A. O., and Toval, A., Security and privacy in electronic health records: A systematic literature review. J. Biomed. Inform. 46(3):541–62, 2013.

    Article  Google Scholar 

  5. Li, X., Niu, J. W., Khan, M. K., and Liao, J. G., An enhanced smart card based remote password authentication scheme. J. Netw. Comput. Appl. 36(5):1365–1371, 2013.

    Article  Google Scholar 

  6. Cao, T. J., and Zhai, J. X., Improved dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 37:9912, 2013.

    Article  Google Scholar 

  7. Khan, S. U., Pastrone, C., Lavagno, L., and Spirito, M. A., An authentication and Key establishment scheme for the IP-based wireless sensor networks. Proc. Comput. Sci. 10:1039–1045, 2012.

    Article  Google Scholar 

  8. Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.

    Article  Google Scholar 

  9. He, D., Chen, J., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.

    Article  Google Scholar 

  10. Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.

    Article  Google Scholar 

  11. Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.

    Article  Google Scholar 

  12. Lee, T. F., and Liu, C. M., A secure smart-card based authentication and Key agreement scheme for telecare medicine information systems. J. Med. Syst. 37:9933, 2013.

    Article  Google Scholar 

  13. Khan, M. K., et al., Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme. Comput. Commun. 34(3):305–309, 2010.

    Article  Google Scholar 

  14. Jiang, Q., Ma, J. F., Ma, Z., and Li, G. S., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37:9897, 2013.

    Article  Google Scholar 

  15. Lin, H. Y., On the security of a dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 37:9929, 2013.

    Article  Google Scholar 

  16. Xie, Q., Zhang, J., and Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 37:9911, 2013.

    Article  Google Scholar 

  17. Islam, SK. H., and Biswas, G. P., A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem, J. Syst. Software. 84: 1892-1898, 2011.

    Google Scholar 

  18. Ren, K., Lou, W., Zeng, K., and Moran, P. J., On broadcast authentication in wireless sensor networks. IEEE T. Wirel. Commun. 6(11):4136–4144, 2007.

    Article  Google Scholar 

  19. Guo, R., Wen, Q.Y., Jin, Z.P., Zhang, H., An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks, Sci. World. J. Volume 2013, Article ID 761240, 7 pages.

Download references

Acknowledgments

This work is supported by NSFC (Grant Nos. 61070251, 61272057, 61202434, 61170270, 61100203, 61003286, 61121061), the Fundamental Research Funds for the Central Universities (Grant No. 2012RC0612, 2011YB01) and China Postdoctoral Science Foundation (Grant No. 2013M530561).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xin Xu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Xu, X., Zhu, P., Wen, Q. et al. A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems. J Med Syst 38, 9994 (2014). https://doi.org/10.1007/s10916-013-9994-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-013-9994-8

Keywords

Navigation