Abstract
Advancement in network technology provides new ways to utilize telecare medicine information systems (TMIS) for patient care. Although TMIS usually faces various attacks as the services are provided over the public network. Recently, Jiang et al. proposed a chaotic map-based remote user authentication scheme for TMIS. Their scheme has the merits of low cost and session key agreement using Chaos theory. It enhances the security of the system by resisting various attacks. In this paper, we analyze the security of Jiang et al.’s scheme and demonstrate that their scheme is vulnerable to denial of service attack. Moreover, we demonstrate flaws in password change phase of their scheme. Further, our aim is to propose a new chaos map-based anonymous user authentication scheme for TMIS to overcome the weaknesses of Jiang et al.’s scheme, while also retaining the original merits of their scheme. We also show that our scheme is secure against various known attacks including the attacks found in Jiang et al.’s scheme. The proposed scheme is comparable in terms of the communication and computational overheads with Jiang et al.’s scheme and other related existing schemes. Moreover, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.



Similar content being viewed by others
References
Cao, T., and Zhai, J., Improved dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–7, 2013.
Chen, H.M., Lo, J.W., Yeh, C.K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.
Das, A. K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst. 38(6):1–27, 2014.
He, D., Jianhua, C., Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.
Kim, K. W., and Lee, J. D., On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems. J. Med. Syst. 38(5):1–11, 2014.
Lin, H.Y., On the security of a dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–5, 2013.
Ma, C.G., Wang, D., Zhao, S.D., Security flaws in two improved remote user authentication schemes using smart cards. Int. J. Commun. Syst., 2012. doi: 10.1002/dac.2468.
Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M. K., Cryptanalysis and Improvement of Yan et al.s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 38(6):1–12, 2014.
Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M. K., Chaturvedi, A., Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce. J. Med. Syst. 38(5):1–11, 2014.
Tan, Z., A User Anonymity Preserving Three-Factor Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 38(3):1–9, 2014.
Wang, D., and Ma, C.g., Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards. The Journal of China Universities of Posts and Telecommunications 19(5):104–114, 2012.
Wang, D., Ma, C. G., Wang, P., Chen, Z.: Robust Smart Card Based Password Authentication Scheme Against Smart Card Security Breach. Cryptology ePrint Archive, Report 2012/439 (2012). http://eprint.iacr.org/2012/439.pdf
Wang, D., Ma, C.g., Wu, P., Secure password-based remote user authentication scheme with non-tamper resistant smart cards. Proceedings of the 26th Annual IFIP Conference on Data and Applications Security and Privacy (IFIP DBSec 2012), Paris, France, July 13-16, LNCS 7371, pp. 114–121. Springer-Verlag: Berlin, 2012.
Wen, F., and Guo, D., An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems. J. Med. Syst. 38(5):1–11, 2014.
Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.
Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.
Xie, Q., Zhang, J., Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–8, 2013.
Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.
Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., He, L., A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems. J. Med. Syst. 38(1):1–7, 2014.
Jiang, Q., Ma, J., Ma, Z., Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):1–8, 2013.
Lee, T.F., Chang, I.P., Lin, T.H., Wang, C.C., A Secure and Efficient Password-Based User Authentication Scheme Using Smart Cards for the Integrated EPR Information System. J. Med. Syst. 37(3):1–7, 2013.
Petrlic, R., Sekula, S., Sorge, C., A privacy–friendly architecture for future cloud computing. International Journal of Grid and Utility Computing 4(4):265–277, 2013.
Tang, C., and Wu, D.O., Mobile privacy in wireless networks-revisited. IEEE Transactions on Wireless Communications 7(3):1035–1042, 2008.
Guo, C., and Chang, C.C., Chaotic maps-based password-authenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul. 18(6):1433–1440, 2013.
Hao, X., Wang, J., Yang, Q., Yan, X., Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(2):1–7, 2013.
Jiang, Q., Ma, J., Lu, X., Tian, Y., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2):1–8, 2014.
Kohda, T., Tsuneda, A., Lawrance, A.J., Correlational properties of chebyshev chaotic sequences. J. Time Ser. Anal. 21(2):181–191, 2000.
Kohda, T., and Tsuneda, A., Pseudonoise sequences by chaotic nonlinear maps and their correlation properties. IEICE Trans. Commun. 76(8):855–862, 1993.
Bergamo, P., D’Arco, P., De Santis, A., Kocarev, L., Security of public-key cryptosystems based on chebyshev polynomials. IEEE Transactions on Circuits and Systems 52(7):1382–1393, 2005.
Xiao, D., Liao, X., Deng, S., A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4):1136–1142, 2007.
Syverson, P., and Cervesato, I., The logic of authentication protocols. In: Foundations of Security Analysis and Design, pp. 63–137: Springer, 2001.
Burrows, M., Abadi, M., Needham, R.M., A logic of authentication. Proceedings of the Royal Society of London. A. Math. Phys. Sci. 426(1871):233–271, 1989.
Author information
Authors and Affiliations
Corresponding author
Additional information
This article is part of the Topical Collection on Mobile Systems
Rights and permissions
About this article
Cite this article
Mishra, D., Srinivas, J. & Mukhopadhyay, S. A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems. J Med Syst 38, 120 (2014). https://doi.org/10.1007/s10916-014-0120-3
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10916-014-0120-3