Skip to main content
Top
Published in: Journal of Medical Systems 2/2014

01-02-2014 | Research Article

Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems

Authors: Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian

Published in: Journal of Medical Systems | Issue 2/2014

Login to get access

Abstract

To ensure only authorized access to medical services, several authentication schemes for telecare medicine information systems (TMIS) have been proposed in the literature. Due to its better performance than traditional cryptography, Hao et al. proposed an authentication scheme for TMIS using chaotic map based cryptography. They claimed that their scheme could resist various attacks, including the smart card stolen attack. However, we identify that their scheme is vulnerable to the stolen smart card attack. The reason causing the stolen smart card attack is that the scheme is designed based on the assumption that the scheme itself achieves user untraceability. Then, we propose a robust authentication and key agreement scheme. Compared with the previous schemes, our scheme not only enjoys more security features, but also has better efficiency. Our analysis indicates that designing a two-factor authentication scheme based on the assumption that privacy protection is achieved in the scheme itself may pose potential security risks. The lesson learned is that, we should avoid this situation in the future design of two-factor authentication schemes.
Literature
1.
go back to reference Chen, H. M., Lo, J. W., and Yeh, C. K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.CrossRef Chen, H. M., Lo, J. W., and Yeh, C. K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.CrossRef
2.
3.
go back to reference Kumari, S., Khan, M. K., and Kumar, R., Cryptanalysis and improvement of ‘A privacy enhanced scheme for telecare medical information systems’. J. Med. Syst. 37(4):9952, 2013.CrossRef Kumari, S., Khan, M. K., and Kumar, R., Cryptanalysis and improvement of ‘A privacy enhanced scheme for telecare medical information systems’. J. Med. Syst. 37(4):9952, 2013.CrossRef
10.
12.
go back to reference Lee, T. F., and Liu, C. M., A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 37(3):9933, 2013.CrossRef Lee, T. F., and Liu, C. M., A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 37(3):9933, 2013.CrossRef
13.
go back to reference Das, A. K., and Bruhadeshwar, B., An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. J. Med. Syst. 37(5):9969, 2013. doi:10.1007/s10916-013-9969-9.CrossRef Das, A. K., and Bruhadeshwar, B., An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. J. Med. Syst. 37(5):9969, 2013. doi:10.​1007/​s10916-013-9969-9.CrossRef
14.
go back to reference Ma, C., Wang, D., and Zhao, S., Security flaws in two improved remote user authentication schemes using smart cards. Int. J. Commun. Syst. 2012. doi:10.1002/dac.2468. Ma, C., Wang, D., and Zhao, S., Security flaws in two improved remote user authentication schemes using smart cards. Int. J. Commun. Syst. 2012. doi:10.​1002/​dac.​2468.
15.
go back to reference Tseng, H., Jan, R., and Yang, W., A chaotic maps-based key agreement protocol that preserves user anonymity. IEEE Int. Conf. Commun. (ICC09), 2009; p. 1–6. Tseng, H., Jan, R., and Yang, W., A chaotic maps-based key agreement protocol that preserves user anonymity. IEEE Int. Conf. Commun. (ICC09), 2009; p. 1–6.
16.
go back to reference Wang, X., and Zhao, J., An improved key agreement protocol based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15:4052–4057, 2010.CrossRefMATHMathSciNet Wang, X., and Zhao, J., An improved key agreement protocol based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15:4052–4057, 2010.CrossRefMATHMathSciNet
17.
go back to reference Niu, Y., and Wang, X., An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16(4):1986–1992, 2011.CrossRefMATHMathSciNet Niu, Y., and Wang, X., An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16(4):1986–1992, 2011.CrossRefMATHMathSciNet
21.
go back to reference Bergamo, P., Arco, P., Santis, A., and Kocarev, L., Security of public key cryptosystems based on Chebyshev polynomials. IEEE. Trans. Circ. Syst. I 52:1382–1393, 2005.CrossRef Bergamo, P., Arco, P., Santis, A., and Kocarev, L., Security of public key cryptosystems based on Chebyshev polynomials. IEEE. Trans. Circ. Syst. I 52:1382–1393, 2005.CrossRef
22.
go back to reference Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos. Soliton. Fract. 37(3):669–674, 2008.CrossRefMATH Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos. Soliton. Fract. 37(3):669–674, 2008.CrossRefMATH
23.
go back to reference He, D., Wang, D., and Wu, S., Cryptanalysis and improvement of a password-based remote user authentication scheme without smart cards. Inf. Technol. Control 42(2):105–112, 2013. He, D., Wang, D., and Wu, S., Cryptanalysis and improvement of a password-based remote user authentication scheme without smart cards. Inf. Technol. Control 42(2):105–112, 2013.
24.
go back to reference Jiang, Q., Ma, J., Li, G., et al., An improved password-based remote user authentication Pprotocol without smart cards. Inf. Technol. Control 42(2):113–123, 2013.MathSciNet Jiang, Q., Ma, J., Li, G., et al., An improved password-based remote user authentication Pprotocol without smart cards. Inf. Technol. Control 42(2):113–123, 2013.MathSciNet
25.
go back to reference Arkko, J., Nikander, P., and Näslund, M., Enhancing privacy with shared pseudo random sequences. Security Protocols. Springer Berlin, Heidelberg, pp. 187–196, 2007. Arkko, J., Nikander, P., and Näslund, M., Enhancing privacy with shared pseudo random sequences. Security Protocols. Springer Berlin, Heidelberg, pp. 187–196, 2007.
Metadata
Title
Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems
Authors
Qi Jiang
Jianfeng Ma
Xiang Lu
Youliang Tian
Publication date
01-02-2014
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 2/2014
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-014-0012-6

Other articles of this Issue 2/2014

Journal of Medical Systems 2/2014 Go to the issue