TY - JOUR
T1 - A Survey of Authentication Schemes in Telecare Medicine Information Systems
AU - Aslam, Muhammad Umair
AU - Derhab, Abdelouahid
AU - Saleem, Kashif
AU - Abbas, Haider
AU - Orgun, Mehmet
AU - Iqbal, Waseem
AU - Aslam, Baber
N1 - Publisher Copyright:
© 2016, Springer Science+Business Media New York.
PY - 2017/1/1
Y1 - 2017/1/1
N2 - E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.
AB - E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.
KW - Biometric
KW - Password
KW - Smart card
KW - Telecare medicine information system
KW - User anonymity
KW - User interaction
UR - http://www.scopus.com/inward/record.url?scp=84999885066&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84999885066&partnerID=8YFLogxK
U2 - 10.1007/s10916-016-0658-3
DO - 10.1007/s10916-016-0658-3
M3 - Review article
C2 - 27900653
AN - SCOPUS:84999885066
SN - 0148-5598
VL - 41
JO - Journal of Medical Systems
JF - Journal of Medical Systems
IS - 1
M1 - 14
ER -