Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A secure chaotic map-based remote authentication scheme for telecare medicine information systems

Authors
Li, XiongWu, FanKhan, Muhammad KhurramXu, LiliShen, JianJo, Minho
Issue Date
7월-2018
Publisher
ELSEVIER SCIENCE BV
Keywords
TMIS; Chaotic maps; Authentication; User anonymity; Bergamo et al.' s attack
Citation
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, v.84, pp.149 - 159
Indexed
SCIE
SCOPUS
Journal Title
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
Volume
84
Start Page
149
End Page
159
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/74872
DOI
10.1016/j.future.2017.08.029
ISSN
0167-739X
Abstract
As a kind of e-health notion, telemedicine employs telecommunication and information technologies to provide remote clinical health care. Telecare medicine information system (TMIS) is a widely used application nowadays. Through the services provided by such e-health systems, doctors can obtain the variation of patients' conditions and make treatments quickly and accordingly. Recently, researchers have employed the Chebyshev chaotic maps in the authentication process of TMISs. Unfortunately, many kinds of security weaknesses such as off-line guessing attack, destitution of user anonymity and session key agreement happen in relative work. To overcome the disadvantages, we propose a secure remote authentication scheme employing the chaotic maps. We use the formal proof under random oracle model, and the famous verification tool Proverif to prove the security of the proposed scheme. Besides, informal analysis including ten security properties and performance comparison are shown to supplement the security properties. From the formal proof, we can see that the attacker has a negligible probability to crack the scheme over the active guessing attack. The formal verification demonstrates that our scheme can resist the attackers simulated by the tool Proverif. Moreover, we compare our scheme with several recent schemes, and the comparison results show that our scheme reaches the level of security requirements and also has suitable cost in performance. Thus, it is more applicable to telecare medicine environments. (C) 2017 Elsevier B.V. All rights reserved.
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer and Information Science > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jo, Min ho photo

Jo, Min ho
컴퓨터정보학과
Read more

Altmetrics

Total Views & Downloads

BROWSE