Skip to main content
Top
Published in: Journal of Medical Systems 2/2013

01-04-2013 | Original Paper

A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems

Authors: Xinhong Hao, Jiantao Wang, Qinghai Yang, Xiaopeng Yan, Ping Li

Published in: Journal of Medical Systems | Issue 2/2013

Login to get access

Abstract

With the development of Internet, patients could enjoy health-care delivery services through telecare medicine information systems (TMIS) in their home. To control the access to remote medical servers’ resources, many authentication schemes using smart cards have been proposed. However, the performance of these schemes is not satisfactory since modular exponential operations are used in these schemes. In the paper, we propose a chaotic map-based authentication scheme for telecare medicine information systems. The security and performance analysis shows our scheme is more suitable for TMIS.
Literature
1.
go back to reference Istepanian, R. S. H., Jovanov, E., and Zhang, Y. T., Guest editorial introduction to the special section on M-health: Beyond seamless mobility and global wireless health-care connectivity. IEEE Trans. Inf. Technol. Biomed. 8(4):405–414, 2004.CrossRef Istepanian, R. S. H., Jovanov, E., and Zhang, Y. T., Guest editorial introduction to the special section on M-health: Beyond seamless mobility and global wireless health-care connectivity. IEEE Trans. Inf. Technol. Biomed. 8(4):405–414, 2004.CrossRef
2.
go back to reference Latré, B., Braem, B., Moerman, I., Blondia, C., and Demeester, P., A survey on wireless body area networks. J. Wireless Netw. 17(1). January 2011. Latré, B., Braem, B., Moerman, I., Blondia, C., and Demeester, P., A survey on wireless body area networks. J. Wireless Netw. 17(1). January 2011.
3.
go back to reference Wu, Z.-Y., Lee, Y.-C., Lai, F., Lee, H.-C., and Chung, Y., A secure authentication scheme for Telecare medicine information systems. J. Med. Syst., 2010. doi:10.1007/s10916-010-9614-9. Wu, Z.-Y., Lee, Y.-C., Lai, F., Lee, H.-C., and Chung, Y., A secure authentication scheme for Telecare medicine information systems. J. Med. Syst., 2010. doi:10.​1007/​s10916-010-9614-9.
7.
go back to reference Kocher, P., Jaffe, J., Jun, B., Differential power analysis. Proc. Adv. Cryptology (CRYPTO 99), pp. 388–397, 1999. Kocher, P., Jaffe, J., Jun, B., Differential power analysis. Proc. Adv. Cryptology (CRYPTO 99), pp. 388–397, 1999.
8.
go back to reference Messerges, T., Dabbish, E., and Sloan, R., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.MathSciNetCrossRef Messerges, T., Dabbish, E., and Sloan, R., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.MathSciNetCrossRef
9.
go back to reference Tseng, H., Jan, R., Yang, W., A chaotic maps-based key agreement protocol that preserves user anonymity. IEEE Int. Conf. Commun. (ICC09), 2009; p.1–6. Tseng, H., Jan, R., Yang, W., A chaotic maps-based key agreement protocol that preserves user anonymity. IEEE Int. Conf. Commun. (ICC09), 2009; p.1–6.
10.
go back to reference Yujun, N., and Xingyuan, W., An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear. Sci. Numer. Simulat. 16(4):1986–1992, 2011.MATHCrossRef Yujun, N., and Xingyuan, W., An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear. Sci. Numer. Simulat. 16(4):1986–1992, 2011.MATHCrossRef
13.
go back to reference Wang, X., and Zhao, J., An improved key agreement protocol based on chaos, Communications in Commun. Nonlinear. Sci. Numer. Simulat. 15:4052–4057, 2010.MATHCrossRef Wang, X., and Zhao, J., An improved key agreement protocol based on chaos, Communications in Commun. Nonlinear. Sci. Numer. Simulat. 15:4052–4057, 2010.MATHCrossRef
14.
go back to reference Bergamo, P., Arco, P., Santis, A., and Kocarev, L., Security of public key cryptosystems based on Chebyshev polynomials. IEEE. Trans. Circ. Syst. I 52:1382–1393, 2005.CrossRef Bergamo, P., Arco, P., Santis, A., and Kocarev, L., Security of public key cryptosystems based on Chebyshev polynomials. IEEE. Trans. Circ. Syst. I 52:1382–1393, 2005.CrossRef
15.
go back to reference Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos. Soliton. Fract. 37(3):669–674, 2008.MATHCrossRef Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos. Soliton. Fract. 37(3):669–674, 2008.MATHCrossRef
16.
go back to reference Li, X., Qiu, W., Zheng, D., Chen, K., and Li, J., Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Trans. Ind. Electron. 57(2):793–800, 2010.CrossRef Li, X., Qiu, W., Zheng, D., Chen, K., and Li, J., Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Trans. Ind. Electron. 57(2):793–800, 2010.CrossRef
Metadata
Title
A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
Authors
Xinhong Hao
Jiantao Wang
Qinghai Yang
Xiaopeng Yan
Ping Li
Publication date
01-04-2013
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 2/2013
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-012-9919-y

Other articles of this Issue 2/2013

Journal of Medical Systems 2/2013 Go to the issue