Back to Search
Start Over
An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System
- Source :
- PLoS ONE, Vol 12, Iss 1, p e0169414 (2017), PLoS ONE, PLOS ONE(12): 1
- Publication Year :
- 2017
- Publisher :
- Public Library of Science (PLoS), 2017.
-
Abstract
- Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.
- Subjects :
- Zero-knowledge password proof
020205 medical informatics
Computer science
Health Care Providers
Social Sciences
lcsh:Medicine
02 engineering and technology
computer.software_genre
Password strength
Sociology
Medicine and Health Sciences
0202 electrical engineering, electronic engineering, information engineering
Electronic Health Records
lcsh:Science
Security level
Data Management
Password
Password policy
Multidisciplinary
Communication
Social Communication
Hospitals
Telemedicine
Biometrics
Biometric Identification
Physical Sciences
Algorithms
Confidentiality
Network Analysis
Information Systems
Research Article
Computer and Information Sciences
Spoofing attack
Salt (cryptography)
Research and Analysis Methods
Computer security
One-time password
S/KEY
Fuzzy Logic
Computational Techniques
Ontologies
Humans
Computer Simulation
Computer Security
Authentication
lcsh:R
Password cracking
020206 networking & telecommunications
Communications
Signaling Networks
Health Care
Authentication protocol
Cryptography
lcsh:Q
Electronics
Wireless Sensor Networks
Challenge–response authentication
computer
Software
Mathematics
Subjects
Details
- ISSN :
- 19326203
- Volume :
- 12
- Database :
- OpenAIRE
- Journal :
- PLOS ONE
- Accession number :
- edsair.doi.dedup.....bf58e33cde6d7f361d392de71f84e438