Construction of a Chaotic Map-Based Authentication Protocol for TMIS
- 2 July 2021
- journal article
- research article
- Published by Springer Science and Business Media LLC in Journal of Medical Systems
- Vol. 45 (8), 1-10
- https://doi.org/10.1007/s10916-021-01750-7
Abstract
Upgraded network technology presents an advanced technological platform for telecare medicine information systems (TMIS) for patients. However, TMIS generally suffers various attacks since the information being shared through the insecure channel. Recently, many authentication techniques have been proposed relying on the chaotic map. However, many of these designs are not secure against the known attacks. In spite of the fact that some of the constructions attain low computation overhead, they cannot establish an anonymous communication and many of them fail to ensure forward secrecy. In this work, our aim is to present authentication and key agreement protocol for TMIS utilizing a chaotic map to achieve both security and efficiency. The underlying security assumptions are chaotic theory assumptions. This scheme supports forward secrecy and a secure session is established with just two messages of exchange. Moreover, we present a comparative analysis of related authentication techniques.Keywords
This publication has 35 references indexed in Scilit:
- Security analysis and Improvement of a Privacy Authentication Scheme for Telecare Medical Information SystemsJournal of Medical Systems, 2013
- A Chaotic Map-based Authentication Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 2013
- Robust Anonymous Authentication Scheme for Telecare Medical Information SystemsJournal of Medical Systems, 2013
- A Privacy Enhanced Authentication Scheme for Telecare Medical Information SystemsJournal of Medical Systems, 2013
- Using Candida oleophila as a biocontriol agens to prevent foodborne Escherichia coli O157 EHEC infectionsSpringerPlus, 2012
- Chaotic maps-based password-authenticated key agreement using smart cardsCommunications in Nonlinear Science and Numerical Simulation, 2012
- An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information SystemsJournal of Medical Systems, 2012
- An Improved Authentication Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 2012
- Correlational Properties of Chebyshev Chaotic SequencesJournal of Time Series Analysis, 2000
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983