Construction of a Chaotic Map-Based Authentication Protocol for TMIS

被引:6
|
作者
Dharminder, Dharminder [1 ]
Kundu, Nibedita [2 ]
Mishra, Dheerendra [3 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Math, Chennai, Tamil Nadu, India
[2] LNM Inst Informat Technol, Dept Math, Jaipur, Rajasthan, India
[3] Maulana Azad Natl Inst Technol, Dept Math, Bhopal, India
关键词
Healthcare systems; TMIS; Authentication and key agreement; Security; Anonymity; MUTUAL AUTHENTICATION; SCHEME; MANAGEMENT; EFFICIENT;
D O I
10.1007/s10916-021-01750-7
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Upgraded network technology presents an advanced technological platform for telecare medicine information systems (TMIS) for patients. However, TMIS generally suffers various attacks since the information being shared through the insecure channel. Recently, many authentication techniques have been proposed relying on the chaotic map. However, many of these designs are not secure against the known attacks. In spite of the fact that some of the constructions attain low computation overhead, they cannot establish an anonymous communication and many of them fail to ensure forward secrecy. In this work, our aim is to present authentication and key agreement protocol for TMIS utilizing a chaotic map to achieve both security and efficiency. The underlying security assumptions are chaotic theory assumptions. This scheme supports forward secrecy and a secure session is established with just two messages of exchange. Moreover, we present a comparative analysis of related authentication techniques.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Construction of a Chaotic Map-Based Authentication Protocol for TMIS
    Dharminder Dharminder
    Nibedita Kundu
    Dheerendra Mishra
    [J]. Journal of Medical Systems, 2021, 45
  • [2] Attacks and improvements to chaotic map-based RFID authentication protocol
    Akgun, Mete
    Bayrak, Ali Osman
    Caglayan, Mehmet Ufuk
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4028 - 4040
  • [3] Improvement on a Chaotic Map-based Mutual Anonymous Authentication Protocol
    Chen, Chien-Ming
    Fang, Weicheng
    Liu, Shuai
    Wu, Tsu-Yang
    Pan, Jeng-Shyang
    Wang, King-Hang
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (02) : 371 - 390
  • [4] Chaotic Map-Based Authentication Protocol for Multiple Servers Architecture
    Wang, Huawei
    Guo, Dianli
    Wen, Qiaoyan
    Hua, Zhang
    [J]. IEEE ACCESS, 2019, 7 : 161340 - 161349
  • [5] PUF and Chaotic Map-Based Authentication Protocol for Underwater Acoustic Networks
    Xie, Qi
    Yao, Ye
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (13):
  • [6] An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map
    Sureshkumar, Venkatasamy
    Amin, Ruhul
    Obaidat, Mohammad S.
    Karthikeyan, Isswarya
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53
  • [7] CMAP-IoT: Chaotic Map-Based Authentication Protocol for Crowdsourcing Internet of Things
    Muhammad Tanveer
    Muhammad Nasir Mumtaz Bhutta
    Bander A. Alzahrani
    Aiiad Albeshri
    Khalid Alsubhi
    Shehzad Ashraf Chaudhry
    [J]. Arabian Journal for Science and Engineering, 2024, 49 : 3453 - 3466
  • [8] CMAP-IoT: Chaotic Map-Based Authentication Protocol for Crowdsourcing Internet of Things
    Tanveer, Muhammad
    Bhutta, Muhammad Nasir Mumtaz
    Alzahrani, Bander A.
    Albeshri, Aiiad
    Alsubhi, Khalid
    Chaudhry, Shehzad Ashraf
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (03) : 3453 - 3466
  • [9] Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem
    Wang, Guojun
    Liu, Qi
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (03): : 4471 - 4488
  • [10] C2MP: Chebyshev chaotic map-based authentication protocol for RFID applications
    Zhang, Zhihua
    Wang, Huanwen
    Gao, Yanghua
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2015, 19 (07) : 1053 - 1061