Skip to main content
Top
Published in: Journal of Medical Systems 6/2015

01-06-2015 | Mobile Systems

Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps

Authors: Yanrong Lu, Lixiang Li, Haipeng Peng, Dong Xie, Yixian Yang

Published in: Journal of Medical Systems | Issue 6/2015

Login to get access

Abstract

The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee’s and Jiang et al.’s scheme. In this study, we show that Li et al.’s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.’s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.
Literature
1.
go back to reference Hsu, C.L., Lee, M.R., Su, C.H, The role of privacy protection in healthcare information systems adoption. J. Med. Syst 37(5):1–12, 2013. Hsu, C.L., Lee, M.R., Su, C.H, The role of privacy protection in healthcare information systems adoption. J. Med. Syst 37(5):1–12, 2013.
2.
go back to reference Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst 24(4):213–234, 2000.CrossRef Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst 24(4):213–234, 2000.CrossRef
3.
go back to reference Chen, H.M., Lo, J.W., Yeh, C.K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst 36(6):3907–3915, 2012.CrossRef Chen, H.M., Lo, J.W., Yeh, C.K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst 36(6):3907–3915, 2012.CrossRef
4.
go back to reference Maitra, T., and Giri, D., An efficient biometric and password-based remote user authentication using smart card for telecare medical information systems in multi-server environment. J. Med. Syst 38(12):1–19, 2014.CrossRef Maitra, T., and Giri, D., An efficient biometric and password-based remote user authentication using smart card for telecare medical information systems in multi-server environment. J. Med. Syst 38(12):1–19, 2014.CrossRef
5.
go back to reference Das, A.K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst 38(6):27, 2014.CrossRef Das, A.K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst 38(6):27, 2014.CrossRef
6.
go back to reference Kim, K.W., and Lee, J.D, On the security of two remote user authentication schemes for telecare medical information systems. J. Med. Syst 38(5):1–11, 2014.CrossRef Kim, K.W., and Lee, J.D, On the security of two remote user authentication schemes for telecare medical information systems. J. Med. Syst 38(5):1–11, 2014.CrossRef
7.
go back to reference Alomair, B., and Poovendran, R., Efficient Authentication for Mobile and Pervasive Computing. IEEE Trans on Mobile. Comput 13(3):469–481, 2014.CrossRef Alomair, B., and Poovendran, R., Efficient Authentication for Mobile and Pervasive Computing. IEEE Trans on Mobile. Comput 13(3):469–481, 2014.CrossRef
8.
go back to reference Sui, Y., Zou, X.K., Du, E.Y., Li, F., Design and analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method. IEEE Trans on Comput 63(4):902–916, 2014.CrossRefMathSciNet Sui, Y., Zou, X.K., Du, E.Y., Li, F., Design and analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method. IEEE Trans on Comput 63(4):902–916, 2014.CrossRefMathSciNet
9.
go back to reference Lu, Y.R., Li, L.X., Peng, H.P., Yang, X., Yang, Y.X.: A lightweight ID based authentication and key agreement protocol for multiserver architecture. Int. J. Distrib. Sens. N. vol. 2015, Article ID 635890, 9 p, 2015. doi:10.1155/2015/635890. Lu, Y.R., Li, L.X., Peng, H.P., Yang, X., Yang, Y.X.: A lightweight ID based authentication and key agreement protocol for multiserver architecture. Int. J. Distrib. Sens. N. vol. 2015, Article ID 635890, 9 p, 2015. doi:10.​1155/​2015/​635890.
10.
go back to reference Lu, Y.R., Li, L.X., Yang, Y.X.: Robust and efficient authentication scheme for session initiation protocol. Math. Probl. Eng. vol. 2015, Article ID 894549, 9 p, 2015. doi:10.1155/2015/894549. Lu, Y.R., Li, L.X., Yang, Y.X.: Robust and efficient authentication scheme for session initiation protocol. Math. Probl. Eng. vol. 2015, Article ID 894549, 9 p, 2015. doi:10.​1155/​2015/​894549.
11.
go back to reference Lu, Y.R., Li, L.X., Peng, H.P., Yang, Y.X.: An enhanced biometricbased authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J. Med. Syst. 39(3):1–8, 2015. Lu, Y.R., Li, L.X., Peng, H.P., Yang, Y.X.: An enhanced biometricbased authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J. Med. Syst. 39(3):1–8, 2015.
12.
go back to reference Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst 36(3):1529–1535, 2012.CrossRef Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst 36(3):1529–1535, 2012.CrossRef
13.
go back to reference He, D.B., Chen, J.H., Zhang, R., A More Secure Authentication Scheme for Telecare Medicine Information Systems. J Med. Syst. 36(3):1989–1995, 2012.CrossRef He, D.B., Chen, J.H., Zhang, R., A More Secure Authentication Scheme for Telecare Medicine Information Systems. J Med. Syst. 36(3):1989–1995, 2012.CrossRef
14.
go back to reference Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.CrossRef Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.CrossRef
15.
go back to reference Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst 36(6): 3833–3838, 2012.CrossRef Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst 36(6): 3833–3838, 2012.CrossRef
16.
go back to reference Özkaynak, F., and Yavuz, S., Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dyn 74(3):551–557, 2013.CrossRef Özkaynak, F., and Yavuz, S., Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dyn 74(3):551–557, 2013.CrossRef
17.
go back to reference Hussain, I., Shah, T., Gondal, M., Mahmood, H., An efficient approach for the construction of LFT S-boxes using chaotic logistic map. Nonlinear Dyn 71:133–140, 2013.CrossRefMathSciNet Hussain, I., Shah, T., Gondal, M., Mahmood, H., An efficient approach for the construction of LFT S-boxes using chaotic logistic map. Nonlinear Dyn 71:133–140, 2013.CrossRefMathSciNet
18.
go back to reference Khan, M., Shah, T., Mahmood, H., Gondal, M., An efficient method for the construction of block cipher with multichaotic systems. Nonlinear Dyn 71:489–492, 2013.CrossRefMathSciNet Khan, M., Shah, T., Mahmood, H., Gondal, M., An efficient method for the construction of block cipher with multichaotic systems. Nonlinear Dyn 71:489–492, 2013.CrossRefMathSciNet
19.
go back to reference Gao, B., Shi, Y.F., Yang, C.L., Li, L.X., Wang, L.C., Yang, Y.X., STP-LWE: A variant of learning with error for a flexible encryption. Math. Probl. Eng 341490:1–7, 2014. Article ID 2014.MathSciNet Gao, B., Shi, Y.F., Yang, C.L., Li, L.X., Wang, L.C., Yang, Y.X., STP-LWE: A variant of learning with error for a flexible encryption. Math. Probl. Eng 341490:1–7, 2014. Article ID 2014.MathSciNet
20.
go back to reference Xiao, D., Liao, X., Wong, K., An efficient entire chaos based scheme for deniable authentication. Chaos Soliton. Fract 23:1327–1331, 2005.CrossRefMATH Xiao, D., Liao, X., Wong, K., An efficient entire chaos based scheme for deniable authentication. Chaos Soliton. Fract 23:1327–1331, 2005.CrossRefMATH
21.
go back to reference Tseng, H., Jan, R., Yang, W., A chaotic maps-based key agreement protocol that preserves user anonymity. IEEE Int. Conf. Commun.,1–6, 2009. ICC09. Tseng, H., Jan, R., Yang, W., A chaotic maps-based key agreement protocol that preserves user anonymity. IEEE Int. Conf. Commun.,1–6, 2009. ICC09.
22.
go back to reference Niu, Y., and Wang, X., An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16(4):1986–1992, 2011.CrossRefMATHMathSciNet Niu, Y., and Wang, X., An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16(4):1986–1992, 2011.CrossRefMATHMathSciNet
23.
go back to reference Xue, K., and Hong, P., Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17:2969–2977, 2012.CrossRefMATHMathSciNet Xue, K., and Hong, P., Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17:2969–2977, 2012.CrossRefMATHMathSciNet
24.
go back to reference Guo, C., and Chang, C.C., Chaotic maps-based passwordauthenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul 18(6):1433–1440, 2013.CrossRefMATHMathSciNet Guo, C., and Chang, C.C., Chaotic maps-based passwordauthenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul 18(6):1433–1440, 2013.CrossRefMATHMathSciNet
25.
go back to reference Hao, X., Wang, J., Yang, Q., Yan, X., Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst 37(2):9919, 2013.CrossRef Hao, X., Wang, J., Yang, Q., Yan, X., Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst 37(2):9919, 2013.CrossRef
27.
go back to reference Jiang, Q., Ma, J., Lu, X., Tian, Y., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2):12, 2014.CrossRef Jiang, Q., Ma, J., Lu, X., Tian, Y., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2):12, 2014.CrossRef
28.
go back to reference Lee, T.F., An eEfficient chaotic map-based authentication and key agreement scheme using smart cards for telecare medicine information systems. J. Med. Syst 37(6):9985, 2013.CrossRef Lee, T.F., An eEfficient chaotic map-based authentication and key agreement scheme using smart cards for telecare medicine information systems. J. Med. Syst 37(6):9985, 2013.CrossRef
29.
go back to reference Li, C.T., Cheng, C.L., Chi, Y.W., A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems, J. Med. Syst. 38(9):1–11, 2014.CrossRefMATH Li, C.T., Cheng, C.L., Chi, Y.W., A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems, J. Med. Syst. 38(9):1–11, 2014.CrossRefMATH
30.
go back to reference Gao, B., Li, L.X., Peng, H.P., Kurths, J., Zhang, W.G., Yang, Y.X., Principle for performing attractor transits with single control in Boolean networks. Phys. Rev. E 88,:062706, 2013.CrossRef Gao, B., Li, L.X., Peng, H.P., Kurths, J., Zhang, W.G., Yang, Y.X., Principle for performing attractor transits with single control in Boolean networks. Phys. Rev. E 88,:062706, 2013.CrossRef
31.
go back to reference Stallings, W., Cryptography and Network Security: Principles and Practices. 3rd edn. Englewood Cliffs: Prentice Hall, 2003. Stallings, W., Cryptography and Network Security: Principles and Practices. 3rd edn. Englewood Cliffs: Prentice Hall, 2003.
32.
go back to reference Li, C.T., Lee, C.C., Weng, C.Y., An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dyn 74:1133–1143, 2013.CrossRefMathSciNet Li, C.T., Lee, C.C., Weng, C.Y., An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dyn 74:1133–1143, 2013.CrossRefMathSciNet
33.
go back to reference Lee, C.C., Lou, D.C., Li, C.T., An extended chaotic maps-based protocol with key agreement for multiserver environments. Nonlinear Dyn 76(1):853–866, 2014.CrossRefMathSciNet Lee, C.C., Lou, D.C., Li, C.T., An extended chaotic maps-based protocol with key agreement for multiserver environments. Nonlinear Dyn 76(1):853–866, 2014.CrossRefMathSciNet
34.
go back to reference Lee, C.C., and Hsu, C.W., A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71:201–211, 2013.CrossRefMathSciNet Lee, C.C., and Hsu, C.W., A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71:201–211, 2013.CrossRefMathSciNet
35.
go back to reference Zhao, D.W., Peng, H.P., Li, L.X., Yang, Y.X., A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure. Comput. Math. Appl 64(4):611–615, 2012.CrossRefMATHMathSciNet Zhao, D.W., Peng, H.P., Li, L.X., Yang, Y.X., A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure. Comput. Math. Appl 64(4):611–615, 2012.CrossRefMATHMathSciNet
36.
go back to reference Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput 51(5):541–552, 2002.CrossRefMathSciNet Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput 51(5):541–552, 2002.CrossRefMathSciNet
37.
go back to reference Hölbl, M., Welzer, T., Brumen, B., An improved two-party identity-based authenticated key agreement protocol using pairings, J. Cmput. Syst 78:142–150, 2012.CrossRefMATH Hölbl, M., Welzer, T., Brumen, B., An improved two-party identity-based authenticated key agreement protocol using pairings, J. Cmput. Syst 78:142–150, 2012.CrossRefMATH
38.
go back to reference Bergamo, P., Arco, P., Santis, A., Kocarev, L., Security of public key cryptosystems based on Chebyshev polynomials. IEEE. Trans. Circ. Syst. I 52:1382–1393, 2005.CrossRef Bergamo, P., Arco, P., Santis, A., Kocarev, L., Security of public key cryptosystems based on Chebyshev polynomials. IEEE. Trans. Circ. Syst. I 52:1382–1393, 2005.CrossRef
39.
go back to reference Lumini, A., and Nanni, L., An improved biohashing for human authentication. Pattern Recognition 40(3):1057–1065, 2007.CrossRefMATH Lumini, A., and Nanni, L., An improved biohashing for human authentication. Pattern Recognition 40(3):1057–1065, 2007.CrossRefMATH
40.
go back to reference Das, A.K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst 38(6):27, 2014.CrossRef Das, A.K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst 38(6):27, 2014.CrossRef
41.
go back to reference Burrow, M., Abadi, M., Needham, R., A logic of authentication. ACM Trans on Compu. Syst. 8:18–36, 1990.CrossRef Burrow, M., Abadi, M., Needham, R., A logic of authentication. ACM Trans on Compu. Syst. 8:18–36, 1990.CrossRef
42.
go back to reference Zhao, D.W., Peng, H.P., Li, L.X., Yang, Y.X., A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Pers. Commun 78:247–269, 2013. doi:10.1007/s11277-014-1750-y.CrossRef Zhao, D.W., Peng, H.P., Li, L.X., Yang, Y.X., A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Pers. Commun 78:247–269, 2013. doi:10.​1007/​s11277-014-1750-y.CrossRef
44.
go back to reference Odelu, V., Das, A.K., Goswami, A., A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Inform Sciences 269(10):270–285, 2014.CrossRefMathSciNet Odelu, V., Das, A.K., Goswami, A., A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Inform Sciences 269(10):270–285, 2014.CrossRefMathSciNet
45.
go back to reference Das, A.K., and Bruhadeshwar, B., An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system, J. Med. Syst 37:9969, 2013.CrossRef Das, A.K., and Bruhadeshwar, B., An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system, J. Med. Syst 37:9969, 2013.CrossRef
Metadata
Title
Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps
Authors
Yanrong Lu
Lixiang Li
Haipeng Peng
Dong Xie
Yixian Yang
Publication date
01-06-2015
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 6/2015
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-015-0229-z

Other articles of this Issue 6/2015

Journal of Medical Systems 6/2015 Go to the issue