Back to Search Start Over

Questioning Key Compromise Attack on Ostad-Sharif et al.’s Authentication and Session key Generation Scheme for Healthcare Applications

Authors :
Chien-Ming Chen
Saru Kumari
Muhammad Khurram Khan
Pradeep Chaudhary
Source :
IEEE Access. 7:39717-39720
Publication Year :
2019
Publisher :
Institute of Electrical and Electronics Engineers (IEEE), 2019.

Abstract

Recently, Ostad-Sharif et al. pointed out the susceptibility of three different authentication schemes themed for telecare medicine/medical information systems to key compromise impersonation attack (KCIA). To further address this issue, they proposed an ECC-based authentication and key generation scheme for healthcare applications. In this paper, we show that Ostad-Sharif et al.'s scheme is not only affected with key compromise impersonation attack but also suffers from a key compromise password guessing attack. Several papers have been published by the researchers by applying KCIA on existing authentication protocols. Before any further move in research in this direction, researchers must contemplate about KCIA. We conclude this article with a rigorous analysis of KCIA along with two questions to ponderon for the research community working in this field.

Details

ISSN :
21693536
Volume :
7
Database :
OpenAIRE
Journal :
IEEE Access
Accession number :
edsair.doi...........598596e14d25f05ac9bcd9820b63d123