Skip to main content
Erschienen in: Journal of Medical Systems 10/2014

01.10.2014 | Mobile Systems

A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems

verfasst von: Dheerendra Mishra, Jangirala Srinivas, Sourav Mukhopadhyay

Erschienen in: Journal of Medical Systems | Ausgabe 10/2014

Einloggen, um Zugang zu erhalten

Abstract

Advancement in network technology provides new ways to utilize telecare medicine information systems (TMIS) for patient care. Although TMIS usually faces various attacks as the services are provided over the public network. Recently, Jiang et al. proposed a chaotic map-based remote user authentication scheme for TMIS. Their scheme has the merits of low cost and session key agreement using Chaos theory. It enhances the security of the system by resisting various attacks. In this paper, we analyze the security of Jiang et al.’s scheme and demonstrate that their scheme is vulnerable to denial of service attack. Moreover, we demonstrate flaws in password change phase of their scheme. Further, our aim is to propose a new chaos map-based anonymous user authentication scheme for TMIS to overcome the weaknesses of Jiang et al.’s scheme, while also retaining the original merits of their scheme. We also show that our scheme is secure against various known attacks including the attacks found in Jiang et al.’s scheme. The proposed scheme is comparable in terms of the communication and computational overheads with Jiang et al.’s scheme and other related existing schemes. Moreover, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.
Literatur
1.
Zurück zum Zitat Cao, T., and Zhai, J., Improved dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–7, 2013.MathSciNetCrossRef Cao, T., and Zhai, J., Improved dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–7, 2013.MathSciNetCrossRef
2.
Zurück zum Zitat Chen, H.M., Lo, J.W., Yeh, C.K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.CrossRef Chen, H.M., Lo, J.W., Yeh, C.K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.CrossRef
3.
Zurück zum Zitat Das, A. K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst. 38(6):1–27, 2014.CrossRef Das, A. K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst. 38(6):1–27, 2014.CrossRef
4.
Zurück zum Zitat He, D., Jianhua, C., Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.CrossRef He, D., Jianhua, C., Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.CrossRef
5.
Zurück zum Zitat Kim, K. W., and Lee, J. D., On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems. J. Med. Syst. 38(5):1–11, 2014.CrossRef Kim, K. W., and Lee, J. D., On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems. J. Med. Syst. 38(5):1–11, 2014.CrossRef
6.
Zurück zum Zitat Lin, H.Y., On the security of a dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–5, 2013.CrossRef Lin, H.Y., On the security of a dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–5, 2013.CrossRef
7.
Zurück zum Zitat Ma, C.G., Wang, D., Zhao, S.D., Security flaws in two improved remote user authentication schemes using smart cards. Int. J. Commun. Syst., 2012. doi: 10.1002/dac.2468. Ma, C.G., Wang, D., Zhao, S.D., Security flaws in two improved remote user authentication schemes using smart cards. Int. J. Commun. Syst., 2012. doi: 10.​1002/​dac.​2468.
8.
Zurück zum Zitat Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M. K., Cryptanalysis and Improvement of Yan et al.s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 38(6):1–12, 2014.CrossRef Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M. K., Cryptanalysis and Improvement of Yan et al.s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 38(6):1–12, 2014.CrossRef
9.
Zurück zum Zitat Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M. K., Chaturvedi, A., Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce. J. Med. Syst. 38(5):1–11, 2014.CrossRef Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M. K., Chaturvedi, A., Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce. J. Med. Syst. 38(5):1–11, 2014.CrossRef
10.
Zurück zum Zitat Tan, Z., A User Anonymity Preserving Three-Factor Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 38(3):1–9, 2014.CrossRef Tan, Z., A User Anonymity Preserving Three-Factor Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 38(3):1–9, 2014.CrossRef
11.
Zurück zum Zitat Wang, D., and Ma, C.g., Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards. The Journal of China Universities of Posts and Telecommunications 19(5):104–114, 2012.CrossRef Wang, D., and Ma, C.g., Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards. The Journal of China Universities of Posts and Telecommunications 19(5):104–114, 2012.CrossRef
13.
Zurück zum Zitat Wang, D., Ma, C.g., Wu, P., Secure password-based remote user authentication scheme with non-tamper resistant smart cards. Proceedings of the 26th Annual IFIP Conference on Data and Applications Security and Privacy (IFIP DBSec 2012), Paris, France, July 13-16, LNCS 7371, pp. 114–121. Springer-Verlag: Berlin, 2012. Wang, D., Ma, C.g., Wu, P., Secure password-based remote user authentication scheme with non-tamper resistant smart cards. Proceedings of the 26th Annual IFIP Conference on Data and Applications Security and Privacy (IFIP DBSec 2012), Paris, France, July 13-16, LNCS 7371, pp. 114–121. Springer-Verlag: Berlin, 2012.
14.
Zurück zum Zitat Wen, F., and Guo, D., An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems. J. Med. Syst. 38(5):1–11, 2014.MathSciNet Wen, F., and Guo, D., An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems. J. Med. Syst. 38(5):1–11, 2014.MathSciNet
15.
Zurück zum Zitat Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.CrossRef Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.CrossRef
16.
Zurück zum Zitat Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.CrossRef Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.CrossRef
17.
Zurück zum Zitat Xie, Q., Zhang, J., Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–8, 2013.CrossRef Xie, Q., Zhang, J., Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–8, 2013.CrossRef
18.
Zurück zum Zitat Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.CrossRef Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.CrossRef
19.
Zurück zum Zitat Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., He, L., A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems. J. Med. Syst. 38(1):1–7, 2014.CrossRef Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., He, L., A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems. J. Med. Syst. 38(1):1–7, 2014.CrossRef
20.
Zurück zum Zitat Jiang, Q., Ma, J., Ma, Z., Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):1–8, 2013.MathSciNetCrossRef Jiang, Q., Ma, J., Ma, Z., Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):1–8, 2013.MathSciNetCrossRef
21.
Zurück zum Zitat Lee, T.F., Chang, I.P., Lin, T.H., Wang, C.C., A Secure and Efficient Password-Based User Authentication Scheme Using Smart Cards for the Integrated EPR Information System. J. Med. Syst. 37(3):1–7, 2013. Lee, T.F., Chang, I.P., Lin, T.H., Wang, C.C., A Secure and Efficient Password-Based User Authentication Scheme Using Smart Cards for the Integrated EPR Information System. J. Med. Syst. 37(3):1–7, 2013.
22.
Zurück zum Zitat Petrlic, R., Sekula, S., Sorge, C., A privacy–friendly architecture for future cloud computing. International Journal of Grid and Utility Computing 4(4):265–277, 2013.CrossRef Petrlic, R., Sekula, S., Sorge, C., A privacy–friendly architecture for future cloud computing. International Journal of Grid and Utility Computing 4(4):265–277, 2013.CrossRef
23.
Zurück zum Zitat Tang, C., and Wu, D.O., Mobile privacy in wireless networks-revisited. IEEE Transactions on Wireless Communications 7(3):1035–1042, 2008.CrossRef Tang, C., and Wu, D.O., Mobile privacy in wireless networks-revisited. IEEE Transactions on Wireless Communications 7(3):1035–1042, 2008.CrossRef
24.
Zurück zum Zitat Guo, C., and Chang, C.C., Chaotic maps-based password-authenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul. 18(6):1433–1440, 2013.MathSciNetCrossRefMATH Guo, C., and Chang, C.C., Chaotic maps-based password-authenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul. 18(6):1433–1440, 2013.MathSciNetCrossRefMATH
25.
Zurück zum Zitat Hao, X., Wang, J., Yang, Q., Yan, X., Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(2):1–7, 2013.CrossRef Hao, X., Wang, J., Yang, Q., Yan, X., Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(2):1–7, 2013.CrossRef
26.
Zurück zum Zitat Jiang, Q., Ma, J., Lu, X., Tian, Y., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2):1–8, 2014.CrossRef Jiang, Q., Ma, J., Lu, X., Tian, Y., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2):1–8, 2014.CrossRef
27.
Zurück zum Zitat Kohda, T., Tsuneda, A., Lawrance, A.J., Correlational properties of chebyshev chaotic sequences. J. Time Ser. Anal. 21(2):181–191, 2000.MathSciNetCrossRefMATH Kohda, T., Tsuneda, A., Lawrance, A.J., Correlational properties of chebyshev chaotic sequences. J. Time Ser. Anal. 21(2):181–191, 2000.MathSciNetCrossRefMATH
28.
Zurück zum Zitat Kohda, T., and Tsuneda, A., Pseudonoise sequences by chaotic nonlinear maps and their correlation properties. IEICE Trans. Commun. 76(8):855–862, 1993. Kohda, T., and Tsuneda, A., Pseudonoise sequences by chaotic nonlinear maps and their correlation properties. IEICE Trans. Commun. 76(8):855–862, 1993.
29.
Zurück zum Zitat Bergamo, P., D’Arco, P., De Santis, A., Kocarev, L., Security of public-key cryptosystems based on chebyshev polynomials. IEEE Transactions on Circuits and Systems 52(7):1382–1393, 2005.MathSciNetCrossRef Bergamo, P., D’Arco, P., De Santis, A., Kocarev, L., Security of public-key cryptosystems based on chebyshev polynomials. IEEE Transactions on Circuits and Systems 52(7):1382–1393, 2005.MathSciNetCrossRef
30.
Zurück zum Zitat Xiao, D., Liao, X., Deng, S., A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4):1136–1142, 2007.MathSciNetCrossRef Xiao, D., Liao, X., Deng, S., A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4):1136–1142, 2007.MathSciNetCrossRef
31.
Zurück zum Zitat Syverson, P., and Cervesato, I., The logic of authentication protocols. In: Foundations of Security Analysis and Design, pp. 63–137: Springer, 2001. Syverson, P., and Cervesato, I., The logic of authentication protocols. In: Foundations of Security Analysis and Design, pp. 63–137: Springer, 2001.
32.
Zurück zum Zitat Burrows, M., Abadi, M., Needham, R.M., A logic of authentication. Proceedings of the Royal Society of London. A. Math. Phys. Sci. 426(1871):233–271, 1989.MathSciNetCrossRefMATH Burrows, M., Abadi, M., Needham, R.M., A logic of authentication. Proceedings of the Royal Society of London. A. Math. Phys. Sci. 426(1871):233–271, 1989.MathSciNetCrossRefMATH
Metadaten
Titel
A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems
verfasst von
Dheerendra Mishra
Jangirala Srinivas
Sourav Mukhopadhyay
Publikationsdatum
01.10.2014
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 10/2014
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-014-0120-3

Weitere Artikel der Ausgabe 10/2014

Journal of Medical Systems 10/2014 Zur Ausgabe