Construction of a Chaotic Map-Based Authentication Protocol for TMIS

被引:6
|
作者
Dharminder, Dharminder [1 ]
Kundu, Nibedita [2 ]
Mishra, Dheerendra [3 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Math, Chennai, Tamil Nadu, India
[2] LNM Inst Informat Technol, Dept Math, Jaipur, Rajasthan, India
[3] Maulana Azad Natl Inst Technol, Dept Math, Bhopal, India
关键词
Healthcare systems; TMIS; Authentication and key agreement; Security; Anonymity; MUTUAL AUTHENTICATION; SCHEME; MANAGEMENT; EFFICIENT;
D O I
10.1007/s10916-021-01750-7
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Upgraded network technology presents an advanced technological platform for telecare medicine information systems (TMIS) for patients. However, TMIS generally suffers various attacks since the information being shared through the insecure channel. Recently, many authentication techniques have been proposed relying on the chaotic map. However, many of these designs are not secure against the known attacks. In spite of the fact that some of the constructions attain low computation overhead, they cannot establish an anonymous communication and many of them fail to ensure forward secrecy. In this work, our aim is to present authentication and key agreement protocol for TMIS utilizing a chaotic map to achieve both security and efficiency. The underlying security assumptions are chaotic theory assumptions. This scheme supports forward secrecy and a secure session is established with just two messages of exchange. Moreover, we present a comparative analysis of related authentication techniques.
引用
下载
收藏
页数:10
相关论文
共 50 条
  • [41] Periodic and chaotic dynamics in a map-based neuron model
    Trujillo, Frank Llovera
    Signerska-Rynkowska, Justyna
    Bartlomiejczyk, Piotr
    MATHEMATICAL METHODS IN THE APPLIED SCIENCES, 2023, 46 (11) : 11906 - 11931
  • [42] Chaotic map based multi-factor authentication protocol for underwater environment monitoring
    Diksha Rangwani
    Hari Om
    Multimedia Tools and Applications, 2024, 83 (9) : 26871 - 26900
  • [43] Chaotic map based multi-factor authentication protocol for underwater environment monitoring
    Rangwani, Diksha
    Om, Hari
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (09) : 26871 - 26900
  • [44] An efficient privacy-preserved authentication technique based on conformable fractional chaotic map for TMIS under smart homes environments
    Chandrashekhar Meshram
    Mohammad S. Obaidat
    Rabha W. Ibrahim
    Sarita Gajbhiye Meshram
    Arpit Vijay Raikwar
    The Journal of Supercomputing, 2024, 80 : 2514 - 2537
  • [45] Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems
    Qi Jiang
    Jianfeng Ma
    Xiang Lu
    Youliang Tian
    Journal of Medical Systems, 2014, 38
  • [46] Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems
    Jiang, Qi
    Ma, Jianfeng
    Lu, Xiang
    Tian, Youliang
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (02)
  • [47] Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things
    Roy, Sandip
    Chatterjee, Santanu
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumari, Saru
    Jo, Minho
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 2884 - 2895
  • [48] Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
    Yau, Wei-Chuen
    Phan, Raphael C. -W.
    NONLINEAR DYNAMICS, 2015, 79 (02) : 809 - 821
  • [49] Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
    Mohammad Sabzinejad Farash
    Mahmoud Ahmadian Attari
    Nonlinear Dynamics, 2014, 76 : 1203 - 1213
  • [50] Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
    Wei-Chuen Yau
    Raphael C.-W. Phan
    Nonlinear Dynamics, 2015, 79 : 809 - 821