Construction of a chaotic map-based authentication protocol for online telemedicine services
Downloads
DOI:
https://doi.org/10.26637/MJM0804/0137Abstract
Upgraded network technology yields a new interface ````"telecare medicine information systems” in short TMIS, between patient and server. But, it can be observed that these services generally insecure as the information being transmitted over a public channel. Chaotic map plays highly important role in designing an authentication protocol, and a good candidate to ensure the efficiency. Although few of the protocols needs low computation cost, but they cannot establish an anonymous communication. Keeping these facts in mind, one needs to construct a chaotic map based authentication scheme for a TMIS. Moreover, we have done performance analysis of related schemes to show the advantage of our work.
Keywords:
Finite Field, Privacy, Chaotic-Mapping, Authentication, SecurityMathematics Subject Classification:
Mathematics- Pages: 2127-2136
- Date Published: 01-10-2020
- Vol. 8 No. 04 (2020): Malaya Journal of Matematik (MJM)
Li, Xiong and Wu, Fan and Khan, Muhammad Khurram and $mathrm{Xu}$, Lili and Shen, Jian and Jo, Minho: A secure chaotic map-based remote authentication scheme for telecare medicine information systems Future Generation Computer Systems 840 (2018) 149-159.
Cao, T., Zhai, J.: Improved dynamic id-based authentication scheme for telecare medical information systems. Journal of Medical Systems 37(2) (2013) 1-7.
Chen, H.M., Lo, J.W., Yeh, C.K.: An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. Journal of Medical Systems 36(6) (2012) 3907-3915.
Avoine, Gildas Adversarial Model for Radio Frequency Identification IACR Cryptology ePrint Archive Citeseer (2005) $1-49$.
Kocarev, Ljupco and Lian, Shiguo Chaos-based cryptography: theory, algorithms and applications Springer Science and Business Media Springer (2011) 330-354.
Lin, H.Y.: On the security of a dynamic id-based authen-tication scheme for telecare medical information systems. Journal of Medical Systems 37(2) (2013) 1-5
Dolev, Danny and Yao, Andrew On the security of public key protocols IEEE Transactions on information theory IEEE (1983) 198-208.
Wei, J., Hu, X., Liu, W.: An improved authentication scheme for telecare medicine information systems. Journal of Medical Systems 36(6) (2012) 3597-3604
Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y.: A secure authentication scheme for telecare medicine information systems. Journal of Medical Systems 36(3) (2012) 1529-1535
Xie, Q., Zhang, J., Dong, N.: Robust anonymous authentication scheme for telecare medical information systems. Journal of Medical Systems 37(2) (2013) 1-8
Zhu, Z.: An efficient authentication scheme for telecare medicine information systems. Journal of Medical Systems 36(6) (2012) 3833-3838
Jiang, Q., Ma, J., Ma, Z., Li, G.: A privacy enhanced authentication scheme for telecare medical information systems. Journal of Medical Systems, 37(1) (2013) 1-8
Guo, C., Chang, C.C.: Chaotic maps-based passwordauthenticated key agreement using smart cards. Communications in Nonlinear Science and Numerical Simulation 18(6) (2013) 1433-1440.
Hao, X., Wang, J., Yang, Q., Yan, X., Li, P.: A chaotic map-based authentication scheme for telecare medicine information systems. Journal of Medical Systems 37(2) (2013) 1-7.
Jiang, Q., Ma, J., Lu, X., Tian, Y.: Robust chaotic mapbased authentication and key agreement scheme with strong anonymity for telecare medicine information systems. Journal of Medical Systems 38(2) (2014) 1-8.
Kohda, T., Tsuneda, A., Lawrance, A.J.: Correlational properties of chebyshev chaotic sequences. Journal of time series analysis $mathbf{2 1}(2)$ (2000) 181-191.
Kohda, T., Tsuneda, A.: Pseudonoise sequences by chaotic nonlinear maps and their correlation properties. IEICE Transactions on Communications 76(8) (1993) $855-862$.
Radhakrishnan, Niranchana and Karuppiah, Marimuthu An efficient and secure remote user mutual authentication scheme using smart cards for Telecare medical information systems Informatics in Medicine Unlocked year Elsevier (2018) 1-38.
Madhusudhan, R and Nayak, Chaitanya S.: A robust authentication scheme for telecare medical information systems. Multimedia Tools and Applications. Springer (2018) 1-19.
Li, Chun-Ta and Lee, Cheng-Chi and Weng, Chi-Yao and Chen, Song-Jhih A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems. Journal of medical systems. Springer (2016) 11-233.
Liu, Yu and Xue, Kaiping An improved secure and effi-cient password and chaos-based two-party key agreement protocol Nonlinear Dynamics Springer (2016) 549-557.
Li, Chun-Ta and Lee, Cheng-Chi and Weng, Chi-Yao A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems Journal of Medical Systems Springer (2014) 9-86.
Lee, T.F.: An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems. Journal of medical systems 37(6), 1-9 (2013)
Zhang, Liping and Zhu, Shaohui and Tang, Shanyu Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme IEEE journal of biomedical and health informatics IEEE (2017) 465-475
Amin, Ruhul and Biswas, GP : An improved rsa based user authentication and session key agreement protocol usable in tmis. Journal of Medical Systems. Springer (2015) 8-87.
Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences 426(1871) (1989) 233-271.
Jiang, Qi and Chen, Zhiren and Li, Bingyan and Shen, Jian and Yang, Li and Ma, Jianfeng Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. Journal of Ambient Intelligence and Humanized Computing Springer (2018) 1061-1073.
Wu, Fan and Xu, Lili and Kumari, Saru and Li, Xiong and Das, Ashok Kumar and Shen, Jian A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications
Journal of Ambient Intelligence and Humanized Computing Springer (2018) 919-930.
Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., He, L.: A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems. Journal of Medical Systems 38(1) (2014) 1-7
Wu, F., Xu, L.: Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. Journal of Medical Systems 37(4), 1-9 (2013).
Lee, T.F., Chang, I.P., Lin, T.H., Wang, C.C. A Secure and Efficient Password-Based User Authentication Scheme Using Smart Cards for the Integrated EPR Information System Journal of Medical Systems, 37(3) (2013) 1-7.
Bergamo, Pina and D'Arco, Paolo and De Santis, Alfredo and Kocarev, Ljupco Security of public-key cryptosystems based on Chebyshev polynomials IEEE Transactions on Circuits and Systems, 52(7) (2005) 1382-1393.
Dharminder, Dharminder and Mishra, Dheerendra and Li, Xiong Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services
Journal of medical systems, $mathbf{4 4}$ (1) (2020) 1-6.
Dharminder, Dharminder and Gupta, Pratik Security analysis and application of Chebyshev Chaotic map in the authentication protocols International Journal of Computers and Applications, $mathbf{0}(0)$ (2019) 1-9.
- NA
Metrics
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 MJM
This work is licensed under a Creative Commons Attribution 4.0 International License.