Skip to main content
Erschienen in: Journal of Medical Systems 2/2013

01.04.2013 | Original Paper

A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems

verfasst von: Xinhong Hao, Jiantao Wang, Qinghai Yang, Xiaopeng Yan, Ping Li

Erschienen in: Journal of Medical Systems | Ausgabe 2/2013

Einloggen, um Zugang zu erhalten

Abstract

With the development of Internet, patients could enjoy health-care delivery services through telecare medicine information systems (TMIS) in their home. To control the access to remote medical servers’ resources, many authentication schemes using smart cards have been proposed. However, the performance of these schemes is not satisfactory since modular exponential operations are used in these schemes. In the paper, we propose a chaotic map-based authentication scheme for telecare medicine information systems. The security and performance analysis shows our scheme is more suitable for TMIS.
Literatur
1.
Zurück zum Zitat Istepanian, R. S. H., Jovanov, E., and Zhang, Y. T., Guest editorial introduction to the special section on M-health: Beyond seamless mobility and global wireless health-care connectivity. IEEE Trans. Inf. Technol. Biomed. 8(4):405–414, 2004.CrossRef Istepanian, R. S. H., Jovanov, E., and Zhang, Y. T., Guest editorial introduction to the special section on M-health: Beyond seamless mobility and global wireless health-care connectivity. IEEE Trans. Inf. Technol. Biomed. 8(4):405–414, 2004.CrossRef
2.
Zurück zum Zitat Latré, B., Braem, B., Moerman, I., Blondia, C., and Demeester, P., A survey on wireless body area networks. J. Wireless Netw. 17(1). January 2011. Latré, B., Braem, B., Moerman, I., Blondia, C., and Demeester, P., A survey on wireless body area networks. J. Wireless Netw. 17(1). January 2011.
3.
Zurück zum Zitat Wu, Z.-Y., Lee, Y.-C., Lai, F., Lee, H.-C., and Chung, Y., A secure authentication scheme for Telecare medicine information systems. J. Med. Syst., 2010. doi:10.1007/s10916-010-9614-9. Wu, Z.-Y., Lee, Y.-C., Lai, F., Lee, H.-C., and Chung, Y., A secure authentication scheme for Telecare medicine information systems. J. Med. Syst., 2010. doi:10.​1007/​s10916-010-9614-9.
7.
Zurück zum Zitat Kocher, P., Jaffe, J., Jun, B., Differential power analysis. Proc. Adv. Cryptology (CRYPTO 99), pp. 388–397, 1999. Kocher, P., Jaffe, J., Jun, B., Differential power analysis. Proc. Adv. Cryptology (CRYPTO 99), pp. 388–397, 1999.
8.
Zurück zum Zitat Messerges, T., Dabbish, E., and Sloan, R., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.MathSciNetCrossRef Messerges, T., Dabbish, E., and Sloan, R., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.MathSciNetCrossRef
9.
Zurück zum Zitat Tseng, H., Jan, R., Yang, W., A chaotic maps-based key agreement protocol that preserves user anonymity. IEEE Int. Conf. Commun. (ICC09), 2009; p.1–6. Tseng, H., Jan, R., Yang, W., A chaotic maps-based key agreement protocol that preserves user anonymity. IEEE Int. Conf. Commun. (ICC09), 2009; p.1–6.
10.
Zurück zum Zitat Yujun, N., and Xingyuan, W., An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear. Sci. Numer. Simulat. 16(4):1986–1992, 2011.MATHCrossRef Yujun, N., and Xingyuan, W., An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear. Sci. Numer. Simulat. 16(4):1986–1992, 2011.MATHCrossRef
13.
Zurück zum Zitat Wang, X., and Zhao, J., An improved key agreement protocol based on chaos, Communications in Commun. Nonlinear. Sci. Numer. Simulat. 15:4052–4057, 2010.MATHCrossRef Wang, X., and Zhao, J., An improved key agreement protocol based on chaos, Communications in Commun. Nonlinear. Sci. Numer. Simulat. 15:4052–4057, 2010.MATHCrossRef
14.
Zurück zum Zitat Bergamo, P., Arco, P., Santis, A., and Kocarev, L., Security of public key cryptosystems based on Chebyshev polynomials. IEEE. Trans. Circ. Syst. I 52:1382–1393, 2005.CrossRef Bergamo, P., Arco, P., Santis, A., and Kocarev, L., Security of public key cryptosystems based on Chebyshev polynomials. IEEE. Trans. Circ. Syst. I 52:1382–1393, 2005.CrossRef
15.
Zurück zum Zitat Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos. Soliton. Fract. 37(3):669–674, 2008.MATHCrossRef Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos. Soliton. Fract. 37(3):669–674, 2008.MATHCrossRef
16.
Zurück zum Zitat Li, X., Qiu, W., Zheng, D., Chen, K., and Li, J., Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Trans. Ind. Electron. 57(2):793–800, 2010.CrossRef Li, X., Qiu, W., Zheng, D., Chen, K., and Li, J., Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Trans. Ind. Electron. 57(2):793–800, 2010.CrossRef
Metadaten
Titel
A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
verfasst von
Xinhong Hao
Jiantao Wang
Qinghai Yang
Xiaopeng Yan
Ping Li
Publikationsdatum
01.04.2013
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 2/2013
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-012-9919-y

Weitere Artikel der Ausgabe 2/2013

Journal of Medical Systems 2/2013 Zur Ausgabe