Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A secure chaotic map-based remote authentication scheme for telecare medicine information systems

Full metadata record
DC Field Value Language
dc.contributor.authorLi, Xiong-
dc.contributor.authorWu, Fan-
dc.contributor.authorKhan, Muhammad Khurram-
dc.contributor.authorXu, Lili-
dc.contributor.authorShen, Jian-
dc.contributor.authorJo, Minho-
dc.date.accessioned2021-09-02T09:55:44Z-
dc.date.available2021-09-02T09:55:44Z-
dc.date.created2021-06-16-
dc.date.issued2018-07-
dc.identifier.issn0167-739X-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/74872-
dc.description.abstractAs a kind of e-health notion, telemedicine employs telecommunication and information technologies to provide remote clinical health care. Telecare medicine information system (TMIS) is a widely used application nowadays. Through the services provided by such e-health systems, doctors can obtain the variation of patients' conditions and make treatments quickly and accordingly. Recently, researchers have employed the Chebyshev chaotic maps in the authentication process of TMISs. Unfortunately, many kinds of security weaknesses such as off-line guessing attack, destitution of user anonymity and session key agreement happen in relative work. To overcome the disadvantages, we propose a secure remote authentication scheme employing the chaotic maps. We use the formal proof under random oracle model, and the famous verification tool Proverif to prove the security of the proposed scheme. Besides, informal analysis including ten security properties and performance comparison are shown to supplement the security properties. From the formal proof, we can see that the attacker has a negligible probability to crack the scheme over the active guessing attack. The formal verification demonstrates that our scheme can resist the attackers simulated by the tool Proverif. Moreover, we compare our scheme with several recent schemes, and the comparison results show that our scheme reaches the level of security requirements and also has suitable cost in performance. Thus, it is more applicable to telecare medicine environments. (C) 2017 Elsevier B.V. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherELSEVIER SCIENCE BV-
dc.subjectSMART CARD-
dc.subjectKEY-
dc.titleA secure chaotic map-based remote authentication scheme for telecare medicine information systems-
dc.typeArticle-
dc.contributor.affiliatedAuthorJo, Minho-
dc.identifier.doi10.1016/j.future.2017.08.029-
dc.identifier.scopusid2-s2.0-85028858690-
dc.identifier.wosid000430521600013-
dc.identifier.bibliographicCitationFUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, v.84, pp.149 - 159-
dc.relation.isPartOfFUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE-
dc.citation.titleFUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE-
dc.citation.volume84-
dc.citation.startPage149-
dc.citation.endPage159-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordPlusSMART CARD-
dc.subject.keywordPlusKEY-
dc.subject.keywordAuthorTMIS-
dc.subject.keywordAuthorChaotic maps-
dc.subject.keywordAuthorAuthentication-
dc.subject.keywordAuthorUser anonymity-
dc.subject.keywordAuthorBergamo et al.&apos-
dc.subject.keywordAuthors attack-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer and Information Science > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jo, Min ho photo

Jo, Min ho
컴퓨터정보학과
Read more

Altmetrics

Total Views & Downloads

BROWSE