A secure chaotic map-based remote authentication scheme for telecare medicine information systems
- Authors
- Li, Xiong; Wu, Fan; Khan, Muhammad Khurram; Xu, Lili; Shen, Jian; Jo, Minho
- Issue Date
- 7월-2018
- Publisher
- ELSEVIER SCIENCE BV
- Keywords
- TMIS; Chaotic maps; Authentication; User anonymity; Bergamo et al.' s attack
- Citation
- FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, v.84, pp.149 - 159
- Indexed
- SCIE
SCOPUS
- Journal Title
- FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
- Volume
- 84
- Start Page
- 149
- End Page
- 159
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/74872
- DOI
- 10.1016/j.future.2017.08.029
- ISSN
- 0167-739X
- Abstract
- As a kind of e-health notion, telemedicine employs telecommunication and information technologies to provide remote clinical health care. Telecare medicine information system (TMIS) is a widely used application nowadays. Through the services provided by such e-health systems, doctors can obtain the variation of patients' conditions and make treatments quickly and accordingly. Recently, researchers have employed the Chebyshev chaotic maps in the authentication process of TMISs. Unfortunately, many kinds of security weaknesses such as off-line guessing attack, destitution of user anonymity and session key agreement happen in relative work. To overcome the disadvantages, we propose a secure remote authentication scheme employing the chaotic maps. We use the formal proof under random oracle model, and the famous verification tool Proverif to prove the security of the proposed scheme. Besides, informal analysis including ten security properties and performance comparison are shown to supplement the security properties. From the formal proof, we can see that the attacker has a negligible probability to crack the scheme over the active guessing attack. The formal verification demonstrates that our scheme can resist the attackers simulated by the tool Proverif. Moreover, we compare our scheme with several recent schemes, and the comparison results show that our scheme reaches the level of security requirements and also has suitable cost in performance. Thus, it is more applicable to telecare medicine environments. (C) 2017 Elsevier B.V. All rights reserved.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - Graduate School > Department of Computer and Information Science > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.