Multimedia Tools and Applications

, Volume 76, Issue 8, pp 10741–10759 | Cite as

Mutual authentication scheme for multimedia medical information systems

  • Deebak Bakkiam David


For Multimedia Medical Information System (MMIS), security and privacy are the significant measures. For the guarantee of MMIS significant measures, several authentication schemes have been proposed, though the authentication schemes fail to offer the measurable features, like Repetitive Registration, Verification Table, Mutual Authenticity with Key-Sharing, and Client Anonymity. In addition, the existing authentication schemes fail to provide the reasonable bandwidth utilization and signal congestion to improve the performance of the multimedia information system. Most importantly, the existing schemes fail to withstand against the attacks, like key-impersonation, man-in-the-middle, stolen-verifier and server-spoofing. In this research article, we thus propose and present an efficient Mutual Authentication Scheme (MAS) using bilinear-pairing system to enhance the security features of multimedia information system and it is specially designed and developed for purpose of telecare medicine system. To prove the significance of MAS protocol, this paper is analyzed experimentally the security features comparison, computational cost, execution efficiencies, signal congestion and bandwidth utilization using multimedia medical information system. The examination result is proven that the proposed protocol of MAS achieves better performance comparatively than the existing authentication schemes, such as Wang et al., Chen et al., Choi et al., Wu et al. and Yoon et al.


Multimedia medical information system Security and privacy Authentication scheme Bilinear-pairing Telecare medicine system 


  1. 1.
    Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18–36CrossRefMATHGoogle Scholar
  2. 2.
    Chang X, Yang Y, Hauptmann AG, Xing EP, Yu Y-L(2015) Semantic concept discovery for large-scale zero-shot event detection. In: 2015 Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI) p 2234–2240Google Scholar
  3. 3.
    Chang X, Yang Y, Xing E, Yu Y (2015) Complex event detection using semantic saliency and nearly-isotonic SVM. In: 2015 International Conference on Machine Learning (ICML) p 1348–1357Google Scholar
  4. 4.
    Chang X, Yu Y-L, Yang Y (2015) Searching persuasively: joint event detection and evidence recounting with limited supervision. In: 23rd ACM international conference on multimedia p 581–590Google Scholar
  5. 5.
    Chen L, Cheng Z, Smart NP (2007) Identity-based key agreement protocols from pairings. Int J Inf Secur 6:213–241CrossRefGoogle Scholar
  6. 6.
    Choi KY, Hwang JY, Lee DH, Seo IS (2005) ID-based authenticated key agreement for low-power mobile devices. Proc. ACISP’05 494–505Google Scholar
  7. 7.
    Diffie W, Hellman M (1976) New directions in cryptology. IEEE Trans Inf Theory 22(6):644–654CrossRefMATHGoogle Scholar
  8. 8.
    ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31:469–472MathSciNetCrossRefMATHGoogle Scholar
  9. 9.
    Fang G, Huang G (2006) Improvement of recently proposed remote client authentication protocols, in
  10. 10.
    Galbraith S, Paterson K, Smart NP (2008) Pairings for cryptographers. Discret Appl Math 156:3113–3121MathSciNetCrossRefMATHGoogle Scholar
  11. 11.
    Hao X, Wang J, Yang Q, Yan X, Li P (2013) A chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst 37(2):1–7CrossRefGoogle Scholar
  12. 12.
    He D, Chen J, Hu J An ID-based client authentication with key agreement protocol for mobile Medical Information environment on ECC with provable security. Inform Fusion 13(3): 223–230Google Scholar
  13. 13.
    He DB, Chen JH, Zhang R (2011) A more secure authentication scheme for telecare medicine information systems. J Med Syst 36(3):1989–1995Google Scholar
  14. 14.
    He D, Hu H (2013) Cryptanalysis of a dynamic ID-based remote user authentication scheme with access control for multi-server environment. IEICE Trans Inf Syst E96-D(1):138–140MathSciNetCrossRefGoogle Scholar
  15. 15.
    He D, Wang D, Wu S (2013) Cryptanalysis and improvement of a password-based remote user authentication scheme without smart cards. Inf Technol Control 42(2):170–177Google Scholar
  16. 16.
    Jakobsson M, Pointcheval D (2001) Mutual authentication for low-power mobile devices. Proc. FC’01 178–195Google Scholar
  17. 17.
    Jiang Q, Ma J, Ma Z, Li G (2013) A privacy enhanced authentication scheme for telecare medical information systems. J Med Syst 37(1):9897CrossRefGoogle Scholar
  18. 18.
    Jiang P, Wen Q, Li W, Jin Z, Zhang H (2013) An anonymous user authentication with key agreement scheme without pairings for multiserver architecture using SCPKs. Sci World J 2013:8Google Scholar
  19. 19.
    Kumar P, Lee S, Lee H (2012) E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12:1625–1647CrossRefGoogle Scholar
  20. 20.
    Lambrinoudakis C, Gritzalis S (2000) Managing medical and insurance information through a smart-card-based information system. J Med Syst 24(4):213–234CrossRefGoogle Scholar
  21. 21.
    Lee WB, Lee CD (2008) A cryptographic key management solution for HIPAA privacy/security regulations. IEEE Trans Inf Technol Biomed 12(1):34–41CrossRefGoogle Scholar
  22. 22.
    Liao E, Lee CC, Hwang MS (2006) A password authentication scheme over insecure networks. J Comput Syst Sci 72(4):727–740MathSciNetCrossRefMATHGoogle Scholar
  23. 23.
    Liu JY, Zhou AM, Gao MX (2008) A new mutual authentication scheme based on nonce and smart cards. Comput Commun 31(10):2205–2209CrossRefGoogle Scholar
  24. 24.
    Ma Z, Yang Y, Xu Z, Sebe N, Yan S, Hauptmann A (2015) Event oriented dictionary learning for complex event detection. IEEE Trans Image Process 24(6):1867–1878MathSciNetCrossRefGoogle Scholar
  25. 25.
    Mitsunari S, Sakai R, Kasahara M (2002) A new traitor tracing. IEICE Trans E85-A(2):481–484Google Scholar
  26. 26.
    Nam J, Lee J, Kim S, Won D (2005) DDH-based group key agreement in a mobile environment. J Syst Softw 78:73–83CrossRefGoogle Scholar
  27. 27.
    Nie L, Akbari M, Li T, Chua T-S (2014) A joint local–global approach for medical terminology assignment. In: 2014 ACM SIGIR Conference p 24–27Google Scholar
  28. 28.
    Nie L, Li T, Akbari M, Shen J, Chua T-S (2014) WenZher: comprehensive vertical search for healthcare domain. In: 7th international ACM SIGIR conference on Research & development in information retrieval p 1245–1246Google Scholar
  29. 29.
    Nie L, Wang M, Zhang L, Yan S, Zhang B, Chua T-S (2014) Disease inference from health-related questions via sparse deep learning. IEEE Trans Knowl Data Eng 27(8):2107–2119CrossRefGoogle Scholar
  30. 30.
    Nie L, Zhang L, Yang Y, Wang M, Hong R, Chua T-S (2015) Beyond doctors: future health prediction from multimedia and multimodal observations. In: 23rd ACM international conference on Multimedia p 591–600Google Scholar
  31. 31.
    Nie L, Zhao Y-L, Akbari M, Shen J, Chua T-S (2014) Bridging the vocabulary gap between health seekers and healthcare knowledge. IEEE Trans Knowl Data Eng 27(2):396–409CrossRefGoogle Scholar
  32. 32.
    Rivest R, Shamir A, Adelman L (1978) A method for obtaining digital signature and public key cryptosystem. Commun ACM 21:120–126MathSciNetCrossRefMATHGoogle Scholar
  33. 33.
    Schnorr CP (1991) Efficient signature generation by smart cards. J Cryptol 4(3):161–174CrossRefMATHGoogle Scholar
  34. 34.
    Siddiqui Z, Abdullah AH, Khan MK, Alghamdi AS (2001) Smart environment as a service: three factor cloud based user authentication for telecare medical information system. J Med Syst 64:201–205Google Scholar
  35. 35.
    Tseng YM (2006) GPRS/UMTS-aided authentication protocol for wireless LANs. IEE Proc Commun 153:810–817CrossRefGoogle Scholar
  36. 36.
    Tseng YM (2007) A resource-constrained group key agreement protocol for imbalance wireless networks. J Comput Secur 26:331–337CrossRefGoogle Scholar
  37. 37.
    Tseng YM, Wu TY, Wu JD (2008) A pairing-based user authentication scheme for wireless clients with smart cards. Informatica 19:285–302Google Scholar
  38. 38.
    Wang S, Cao Z, Cao F (2008) Efficient identity-based authenticated key agreement protocol with PKG forward secrecy. Int J Netw Secur 7:181–186Google Scholar
  39. 39.
    Wei J, Hu X, Liu W (2012) An improved authentication scheme for telecare medicine information systems. J Med Syst 36(6):3597–3604CrossRefGoogle Scholar
  40. 40.
    Wong DS, Chan AH (2001) Efficient and mutually authenticated key exchange for low power computing devices. Proc. ASIACRYPT’01 172–289Google Scholar
  41. 41.
    Wu T-Y, Tseng Y-M (2010) An efficient client authentication and key agreement protocol for mobile client–server environment. Comput Netw 54:1520–1530CrossRefMATHGoogle Scholar
  42. 42.
    Xu J, Zhu WT, Feng DG (2009) An improved smart card based password authentication scheme with provable security. Comput Stand Interfaces 31(4):723–728CrossRefGoogle Scholar
  43. 43.
    Yan Y, Liu G, Ricci E, Subramanian R, Liu G, Sebe N (2014) Multi-task linear discriminant analysis for multi-view action recognition. IEEE Trans Image Process 23(12):5599–5611MathSciNetCrossRefGoogle Scholar
  44. 44.
    Yan Y, Ricci E, Subramanian R, Lanz O, Sebe N (2013) No matter where you are: flexible graph-guided multi-task learning for multi-view head pose classification under target motion. In: 2013 I.E. International Conference on Computer Vision (ICCV) p 1177–1184Google Scholar
  45. 45.
    Yang CC, Wang RC, Liu WT (2005) Secure authentication scheme for session initiation protocol. J Comput Secur 24:381–386CrossRefGoogle Scholar
  46. 46.
    Yau W-C, Phan RC-W (2013) Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst 37:993CrossRefGoogle Scholar
  47. 47.
    Yoon E-J, Yoo K-Y (2010) A new efficient ID-based user authentication and key exchange protocol for mobile client–server environment. In: 2010 I.E. International Conference on Wireless Information Technology and Systems (ICWITS) p 1–4Google Scholar
  48. 48.
    Zhao Z (2014) An Efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J Med Syst 38:13CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.Department of Information TechnologyMepco Schlenk Engineering CollegeSivakasiIndia

Personalised recommendations