Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services
- 26 Downloads
Modern network technology yields new interface for telecare medicine information systems in short TMIS used for patient’s healthcare. This system is used to provide healthcare services to patients at their home. It can be observed, telecare medicine information systems generally suffer several attacks as information being transmitted over a public network. Therefore, various authentication and key agreement schemes are proposed for TMIS to ensure secure and authorized patients communication over given public network. However, most of the schemes fail to achieve essential attributes discussed in this article. Although the key attributes of security and efficiency should be achieved in a common framework. This paper proposes construction of an RSA based authentication scheme for authorized access to healthcare services and achieves desirable key attributes of authentication protocols. Proof of security against polynomial time adversary is given in the random oracle to justify the security of proposed scheme. Communication analysis and computation analysis of proposed scheme indicates that proposed scheme’s performance is comparable and having better security.
KeywordsHealthcare Telecare medicine information systems Authentication Privacy
Compliance with Ethical Standards
Conflict of interests
All authors declare that they have no conflict of interest.
This article does not contain any studies with human participants or animals performed by any of the authors.
All the authors have agreed to this submission.
- 9.Li, X., Liu, S., Wu, F., Kumari, S., and Rodrigues, J. J.: Privacy preserving data aggregation scheme for mobile edge computing assisted iot applications. IEEE Internet of Things Journal , 2018Google Scholar
- 15.Odelu, V., Das, A. K., Wazid, M., and Conti, M., Provably secure authenticated key agreement scheme for smart grid. IEEE T. Smart Grid 9(3):1900–1910, 2016.Google Scholar
- 16.Radhakrishnan, N., and Karuppiah, M.: An efficient and secure remote user mutual authentication scheme using smart cards for telecare medical information systems. Informatics in Medicine Unlocked, 2018Google Scholar
- 19.Srinivas, J., Das, A. K., Wazid, M., and Kumar, N.: Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things. IEEE Transactions on Dependable and Secure Computing, 2018Google Scholar