Telecare medical information systems (TMIS), with the explosive growth of communication technology and physiological monitoring devices, are applied increasingly to enable and support healthcare delivery services. In order to safeguard patients' privacy and tackle the illegal access, authentication schemes for TMIS have been investigated and designed by many researchers. Many of them are promising for adoption in practice, nevertheless, they still have security flaws. In this paper, we propose a novel remote authentication scheme for TMIS using self-certified public keys, which is formally secure in the ID-mBJM model. Besides, the proposed scheme has better computational efficiency. Compared to the related schemes, our protocol is more practical for telemedicine system.

Download full-text PDF

Source
http://dx.doi.org/10.1007/s10916-015-0245-zDOI Listing

Publication Analysis

Top Keywords

authentication scheme
8
self-certified public
8
public keys
8
telecare medical
8
medical systems
8
novel authentication
4
scheme self-certified
4
keys telecare
4
systems telecare
4
systems tmis
4

Similar Publications

The proliferation of the Internet of Things (IoT) has worsened the challenge of maintaining data and user privacy. IoT end devices, often deployed in unsupervised environments and connected to open networks, are susceptible to physical tampering and various other security attacks. Thus, robust, efficient authentication and key agreement (AKA) protocols are essential to protect data privacy during exchanges between end devices and servers.

View Article and Find Full Text PDF

Internal auditing demands innovative and secure solutions in today's business environment, with increasing competitive pressure and frequent occurrences of risky and illegal behaviours. Blockchain along with secure databases like encryption improves internal audit security through immutability and transparency. Hence integrating blockchain with homomorphic encryption and multi-factor authentication improves privacy and mitigates computational overhead.

View Article and Find Full Text PDF

Demand for user authentication in virtual reality (VR) applications is increasing such as in-app payments, password manager, and access to private data. Traditionally, hand controllers have been widely used for the user authentication in VR environment, with which the users can typewrite a password or draw a pre-registered pattern; however, the conventional approaches are generally inconvenient and time-consuming. In this study, we proposed a new user authentication method based on eye-writing patterns identified using electrooculogram (EOG) recorded from four locations around the eyes in contact with the face-pad of a VR headset.

View Article and Find Full Text PDF

Anticounterfeiting technologies meet challenges in the Internet of Things era due to the rapidly growing volume of objects, their frequent connection with humans, and the accelerated advance of counterfeiting/cracking techniques. Here, we, inspired by biological fingerprints, present a simple anticounterfeiting system based on perovskite quantum dot (PQD) fingerprint physical unclonable function (FPUF) by cooperatively utilizing the spontaneous-phase separation of polymers and selective in situ synthesis PQDs as an entropy source. The FPUFs offer red, green, and blue full-color fingerprint identifiers and random three-dimensional (3D) morphology, which extends binary to multivalued encoding by tuning the perovskite and polymer components, enabling a high encoding capacity (about 10, far surpassing that of biometric fingerprints).

View Article and Find Full Text PDF

The growing prevalence of cybersecurity threats is a significant concern for railway systems, which rely on an extensive network of onboard and trackside sensors. These threats have the potential to compromise the safety of railway operations and the integrity of the railway infrastructure itself. This paper aims to examine the current cybersecurity measures in use, identify the key vulnerabilities that they address, and propose solutions for enhancing the security of railway infrastructures.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!