Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2013 (2013), Article ID 761240, 7 pages
http://dx.doi.org/10.1155/2013/761240
Research Article

An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks

State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China

Received 21 February 2013; Accepted 2 April 2013

Academic Editors: Z. Cao, R. Lu, Q. Shi, and Q. Wu

Copyright © 2013 Rui Guo et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. S. H. Istepanian, E. Jovanov, and Y. T. Zhang, “Introduction to the special section on m-Health: beyond seamless mobility and global wireless health-care connectivity,” IEEE Transactions on Information Technology in Biomedicine, vol. 8, no. 4, pp. 405–414, 2004. View at Publisher · View at Google Scholar · View at Scopus
  2. F. Bellifemine, G. Fortino, R. Giannantonio, R. Gravina, A. Guerrieri, and M. Sgroi, “SPINE: a domain-specific framework for rapid prototyping of WBSN applications,” Software, Practice and Experience, vol. 41, no. 3, pp. 237–265, 2011. View at Publisher · View at Google Scholar · View at Scopus
  3. Q. Pu, J. Wang, and R. Y. Zhao, “Strong authentication scheme for telecare medicine information systems,” Journal of Medical Systems, vol. 36, no. 4, pp. 2609–2619, 2012. View at Google Scholar
  4. Z.-Y. Wu, Y.-C. Lee, F. Lai, H.-C. Lee, and Y. Chung, “A secure authentication scheme for telecare medicine information systems,” Journal of Medical Systems, vol. 36, no. 3, pp. 1529–1535, 2012. View at Google Scholar
  5. D. B. He, J. H. Chen, and R. Zhang, “A more secure authentication scheme for telecaremedicine information systems,” Journal of Medical Systems, vol. 36, no. 3, pp. 1989–1995, 2012. View at Google Scholar
  6. J. H. Wei, X. X. Hu, and W. F. Liu, “An improved authentication scheme for telecare medicine information systems,” Journal of Medical Systems, vol. 36, no. 6, pp. 3597–3604, 2012. View at Google Scholar
  7. Z. A. Zhu, “An efficient authentication scheme for telecare medicine information systems,” Journal of Medical Systems, vol. 36, no. 6, pp. 3833–3838, 2012. View at Google Scholar
  8. A. Shamir, “Identity-based cryptosystems and signature schemes,” in Proceedings of the Advances in Cryptology (CRYPTO ’85), pp. 47–53, 1985.
  9. M. L. Das, A. Saxena, and V. P. Gulati, “A dynamic ID-based remote user authentication scheme,” IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 629–631, 2004. View at Publisher · View at Google Scholar · View at Scopus
  10. H. Y. Chien and C. H. Chen, “A remote authentication scheme preserving user anonymity,” in Proceedings of the International Conference on AINA, vol. 2, 2005.
  11. W. C. Ku and S. T. Chang, “Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards,” IEICE Transactions on Communications, vol. E88-B, no. 5, pp. 2165–2167, 2005. View at Publisher · View at Google Scholar · View at Scopus
  12. H. Xiong, Z. Chen, and F. G. Li, “Provably secure and efficient certificateless authenticated tripartite key agreement protocol,” Mathematical and Computer Modelling, vol. 55, no. 3-4, pp. 1213–1221, 2012. View at Google Scholar
  13. L. Zhang, F. Zhang, Q. Wu, and J. Domingo-Ferrer, “Simulatable certificateless two-party authenticated key agreement protocol,” Information Sciences, vol. 180, no. 6, pp. 1020–1030, 2010. View at Publisher · View at Google Scholar · View at Scopus
  14. L. Chen, Z. Cheng, and N. P. Smart, “Identity-based key agreement protocols from pairings,” International Journal of Information Security, vol. 6, no. 4, pp. 213–241, 2007. View at Publisher · View at Google Scholar · View at Scopus
  15. S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,” in Proceedings of the Advances in Cryptology (ASIACRYRT ’03), pp. 452–473, 2003.
  16. M. Girualt, “Self-certified public keys,” in Proceedings of the Advances in Cryptology (EUROCRYPTO ’91), pp. 490–497.
  17. M. Scott, “Miracl library,” http://certivox.com/.
  18. A. Miyaji, M. Nakabayashi, and S. Takano, “New explicit conditions of elliptic curve traces for FR-reduction,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 84, no. 5, pp. 1234–1243, 2001. View at Google Scholar · View at Scopus
  19. The Certicom Corporation, SEC2: Recommended elliptic curve domain parameters, 2000.
  20. K. Ren, W. Lou, K. Zeng, and P. J. Moran, “On broadcast authentication in wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 6, no. 11, pp. 4136–4144, 2007. View at Publisher · View at Google Scholar · View at Scopus