Skip to main content
Top
Published in: Journal of Medical Systems 10/2014

01-10-2014 | Mobile Systems

A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems

Authors: Dheerendra Mishra, Jangirala Srinivas, Sourav Mukhopadhyay

Published in: Journal of Medical Systems | Issue 10/2014

Login to get access

Abstract

Advancement in network technology provides new ways to utilize telecare medicine information systems (TMIS) for patient care. Although TMIS usually faces various attacks as the services are provided over the public network. Recently, Jiang et al. proposed a chaotic map-based remote user authentication scheme for TMIS. Their scheme has the merits of low cost and session key agreement using Chaos theory. It enhances the security of the system by resisting various attacks. In this paper, we analyze the security of Jiang et al.’s scheme and demonstrate that their scheme is vulnerable to denial of service attack. Moreover, we demonstrate flaws in password change phase of their scheme. Further, our aim is to propose a new chaos map-based anonymous user authentication scheme for TMIS to overcome the weaknesses of Jiang et al.’s scheme, while also retaining the original merits of their scheme. We also show that our scheme is secure against various known attacks including the attacks found in Jiang et al.’s scheme. The proposed scheme is comparable in terms of the communication and computational overheads with Jiang et al.’s scheme and other related existing schemes. Moreover, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.
Literature
1.
go back to reference Cao, T., and Zhai, J., Improved dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–7, 2013.MathSciNetCrossRef Cao, T., and Zhai, J., Improved dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–7, 2013.MathSciNetCrossRef
2.
go back to reference Chen, H.M., Lo, J.W., Yeh, C.K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.CrossRef Chen, H.M., Lo, J.W., Yeh, C.K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.CrossRef
3.
go back to reference Das, A. K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst. 38(6):1–27, 2014.CrossRef Das, A. K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst. 38(6):1–27, 2014.CrossRef
4.
go back to reference He, D., Jianhua, C., Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.CrossRef He, D., Jianhua, C., Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.CrossRef
5.
go back to reference Kim, K. W., and Lee, J. D., On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems. J. Med. Syst. 38(5):1–11, 2014.CrossRef Kim, K. W., and Lee, J. D., On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems. J. Med. Syst. 38(5):1–11, 2014.CrossRef
6.
go back to reference Lin, H.Y., On the security of a dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–5, 2013.CrossRef Lin, H.Y., On the security of a dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–5, 2013.CrossRef
7.
go back to reference Ma, C.G., Wang, D., Zhao, S.D., Security flaws in two improved remote user authentication schemes using smart cards. Int. J. Commun. Syst., 2012. doi: 10.1002/dac.2468. Ma, C.G., Wang, D., Zhao, S.D., Security flaws in two improved remote user authentication schemes using smart cards. Int. J. Commun. Syst., 2012. doi: 10.​1002/​dac.​2468.
8.
go back to reference Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M. K., Cryptanalysis and Improvement of Yan et al.s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 38(6):1–12, 2014.CrossRef Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M. K., Cryptanalysis and Improvement of Yan et al.s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 38(6):1–12, 2014.CrossRef
9.
go back to reference Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M. K., Chaturvedi, A., Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce. J. Med. Syst. 38(5):1–11, 2014.CrossRef Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M. K., Chaturvedi, A., Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce. J. Med. Syst. 38(5):1–11, 2014.CrossRef
10.
go back to reference Tan, Z., A User Anonymity Preserving Three-Factor Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 38(3):1–9, 2014.CrossRef Tan, Z., A User Anonymity Preserving Three-Factor Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 38(3):1–9, 2014.CrossRef
11.
go back to reference Wang, D., and Ma, C.g., Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards. The Journal of China Universities of Posts and Telecommunications 19(5):104–114, 2012.CrossRef Wang, D., and Ma, C.g., Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards. The Journal of China Universities of Posts and Telecommunications 19(5):104–114, 2012.CrossRef
13.
go back to reference Wang, D., Ma, C.g., Wu, P., Secure password-based remote user authentication scheme with non-tamper resistant smart cards. Proceedings of the 26th Annual IFIP Conference on Data and Applications Security and Privacy (IFIP DBSec 2012), Paris, France, July 13-16, LNCS 7371, pp. 114–121. Springer-Verlag: Berlin, 2012. Wang, D., Ma, C.g., Wu, P., Secure password-based remote user authentication scheme with non-tamper resistant smart cards. Proceedings of the 26th Annual IFIP Conference on Data and Applications Security and Privacy (IFIP DBSec 2012), Paris, France, July 13-16, LNCS 7371, pp. 114–121. Springer-Verlag: Berlin, 2012.
14.
go back to reference Wen, F., and Guo, D., An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems. J. Med. Syst. 38(5):1–11, 2014.MathSciNet Wen, F., and Guo, D., An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems. J. Med. Syst. 38(5):1–11, 2014.MathSciNet
15.
go back to reference Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.CrossRef Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.CrossRef
16.
go back to reference Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.CrossRef Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.CrossRef
17.
go back to reference Xie, Q., Zhang, J., Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–8, 2013.CrossRef Xie, Q., Zhang, J., Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–8, 2013.CrossRef
18.
go back to reference Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.CrossRef Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.CrossRef
19.
go back to reference Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., He, L., A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems. J. Med. Syst. 38(1):1–7, 2014.CrossRef Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., He, L., A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems. J. Med. Syst. 38(1):1–7, 2014.CrossRef
20.
go back to reference Jiang, Q., Ma, J., Ma, Z., Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):1–8, 2013.MathSciNetCrossRef Jiang, Q., Ma, J., Ma, Z., Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):1–8, 2013.MathSciNetCrossRef
21.
go back to reference Lee, T.F., Chang, I.P., Lin, T.H., Wang, C.C., A Secure and Efficient Password-Based User Authentication Scheme Using Smart Cards for the Integrated EPR Information System. J. Med. Syst. 37(3):1–7, 2013. Lee, T.F., Chang, I.P., Lin, T.H., Wang, C.C., A Secure and Efficient Password-Based User Authentication Scheme Using Smart Cards for the Integrated EPR Information System. J. Med. Syst. 37(3):1–7, 2013.
22.
go back to reference Petrlic, R., Sekula, S., Sorge, C., A privacy–friendly architecture for future cloud computing. International Journal of Grid and Utility Computing 4(4):265–277, 2013.CrossRef Petrlic, R., Sekula, S., Sorge, C., A privacy–friendly architecture for future cloud computing. International Journal of Grid and Utility Computing 4(4):265–277, 2013.CrossRef
23.
go back to reference Tang, C., and Wu, D.O., Mobile privacy in wireless networks-revisited. IEEE Transactions on Wireless Communications 7(3):1035–1042, 2008.CrossRef Tang, C., and Wu, D.O., Mobile privacy in wireless networks-revisited. IEEE Transactions on Wireless Communications 7(3):1035–1042, 2008.CrossRef
24.
go back to reference Guo, C., and Chang, C.C., Chaotic maps-based password-authenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul. 18(6):1433–1440, 2013.MathSciNetCrossRefMATH Guo, C., and Chang, C.C., Chaotic maps-based password-authenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul. 18(6):1433–1440, 2013.MathSciNetCrossRefMATH
25.
go back to reference Hao, X., Wang, J., Yang, Q., Yan, X., Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(2):1–7, 2013.CrossRef Hao, X., Wang, J., Yang, Q., Yan, X., Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(2):1–7, 2013.CrossRef
26.
go back to reference Jiang, Q., Ma, J., Lu, X., Tian, Y., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2):1–8, 2014.CrossRef Jiang, Q., Ma, J., Lu, X., Tian, Y., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2):1–8, 2014.CrossRef
27.
go back to reference Kohda, T., Tsuneda, A., Lawrance, A.J., Correlational properties of chebyshev chaotic sequences. J. Time Ser. Anal. 21(2):181–191, 2000.MathSciNetCrossRefMATH Kohda, T., Tsuneda, A., Lawrance, A.J., Correlational properties of chebyshev chaotic sequences. J. Time Ser. Anal. 21(2):181–191, 2000.MathSciNetCrossRefMATH
28.
go back to reference Kohda, T., and Tsuneda, A., Pseudonoise sequences by chaotic nonlinear maps and their correlation properties. IEICE Trans. Commun. 76(8):855–862, 1993. Kohda, T., and Tsuneda, A., Pseudonoise sequences by chaotic nonlinear maps and their correlation properties. IEICE Trans. Commun. 76(8):855–862, 1993.
29.
go back to reference Bergamo, P., D’Arco, P., De Santis, A., Kocarev, L., Security of public-key cryptosystems based on chebyshev polynomials. IEEE Transactions on Circuits and Systems 52(7):1382–1393, 2005.MathSciNetCrossRef Bergamo, P., D’Arco, P., De Santis, A., Kocarev, L., Security of public-key cryptosystems based on chebyshev polynomials. IEEE Transactions on Circuits and Systems 52(7):1382–1393, 2005.MathSciNetCrossRef
30.
go back to reference Xiao, D., Liao, X., Deng, S., A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4):1136–1142, 2007.MathSciNetCrossRef Xiao, D., Liao, X., Deng, S., A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4):1136–1142, 2007.MathSciNetCrossRef
31.
go back to reference Syverson, P., and Cervesato, I., The logic of authentication protocols. In: Foundations of Security Analysis and Design, pp. 63–137: Springer, 2001. Syverson, P., and Cervesato, I., The logic of authentication protocols. In: Foundations of Security Analysis and Design, pp. 63–137: Springer, 2001.
32.
go back to reference Burrows, M., Abadi, M., Needham, R.M., A logic of authentication. Proceedings of the Royal Society of London. A. Math. Phys. Sci. 426(1871):233–271, 1989.MathSciNetCrossRefMATH Burrows, M., Abadi, M., Needham, R.M., A logic of authentication. Proceedings of the Royal Society of London. A. Math. Phys. Sci. 426(1871):233–271, 1989.MathSciNetCrossRefMATH
Metadata
Title
A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems
Authors
Dheerendra Mishra
Jangirala Srinivas
Sourav Mukhopadhyay
Publication date
01-10-2014
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 10/2014
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-014-0120-3

Other articles of this Issue 10/2014

Journal of Medical Systems 10/2014 Go to the issue