A secure chaotic map-based remote authentication scheme for telecare medicine information systems
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Li, Xiong | - |
dc.contributor.author | Wu, Fan | - |
dc.contributor.author | Khan, Muhammad Khurram | - |
dc.contributor.author | Xu, Lili | - |
dc.contributor.author | Shen, Jian | - |
dc.contributor.author | Jo, Minho | - |
dc.date.accessioned | 2021-09-02T09:55:44Z | - |
dc.date.available | 2021-09-02T09:55:44Z | - |
dc.date.created | 2021-06-16 | - |
dc.date.issued | 2018-07 | - |
dc.identifier.issn | 0167-739X | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/74872 | - |
dc.description.abstract | As a kind of e-health notion, telemedicine employs telecommunication and information technologies to provide remote clinical health care. Telecare medicine information system (TMIS) is a widely used application nowadays. Through the services provided by such e-health systems, doctors can obtain the variation of patients' conditions and make treatments quickly and accordingly. Recently, researchers have employed the Chebyshev chaotic maps in the authentication process of TMISs. Unfortunately, many kinds of security weaknesses such as off-line guessing attack, destitution of user anonymity and session key agreement happen in relative work. To overcome the disadvantages, we propose a secure remote authentication scheme employing the chaotic maps. We use the formal proof under random oracle model, and the famous verification tool Proverif to prove the security of the proposed scheme. Besides, informal analysis including ten security properties and performance comparison are shown to supplement the security properties. From the formal proof, we can see that the attacker has a negligible probability to crack the scheme over the active guessing attack. The formal verification demonstrates that our scheme can resist the attackers simulated by the tool Proverif. Moreover, we compare our scheme with several recent schemes, and the comparison results show that our scheme reaches the level of security requirements and also has suitable cost in performance. Thus, it is more applicable to telecare medicine environments. (C) 2017 Elsevier B.V. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCIENCE BV | - |
dc.subject | SMART CARD | - |
dc.subject | KEY | - |
dc.title | A secure chaotic map-based remote authentication scheme for telecare medicine information systems | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Jo, Minho | - |
dc.identifier.doi | 10.1016/j.future.2017.08.029 | - |
dc.identifier.scopusid | 2-s2.0-85028858690 | - |
dc.identifier.wosid | 000430521600013 | - |
dc.identifier.bibliographicCitation | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, v.84, pp.149 - 159 | - |
dc.relation.isPartOf | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | - |
dc.citation.title | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | - |
dc.citation.volume | 84 | - |
dc.citation.startPage | 149 | - |
dc.citation.endPage | 159 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | SMART CARD | - |
dc.subject.keywordPlus | KEY | - |
dc.subject.keywordAuthor | TMIS | - |
dc.subject.keywordAuthor | Chaotic maps | - |
dc.subject.keywordAuthor | Authentication | - |
dc.subject.keywordAuthor | User anonymity | - |
dc.subject.keywordAuthor | Bergamo et al.&apos | - |
dc.subject.keywordAuthor | s attack | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.