Abstract
With rapid development of computer technology and wide use of mobile devices, the telecare medicine information system has become universal in the field of medical care. To protect patients’ privacy and medial data’s security, many authentication schemes for the telecare medicine information system have been proposed. Due to its better performance, chaotic maps have been used in the design of authentication schemes for the telecare medicine information system. However, most of them cannot provide user’s anonymity. Recently, Lin proposed a dynamic identity based authentication scheme using chaotic maps for the telecare medicine information system and claimed that their scheme was secure against existential active attacks. In this paper, we will demonstrate that their scheme cannot provide user anonymity and is vulnerable to the impersonation attack. Further, we propose an improved scheme to fix security flaws in Lin’s scheme and demonstrate the proposed scheme could withstand various attacks.




Similar content being viewed by others
References
Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36:1529–1535, 2012.
He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36: 1989–1995, 2012.
Wei, J., Hu, X., and Liu,W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.
Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.
Cao, T., and Zhai, J., Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems, . J. Med. Syst. 37 (2):1–7, 2013.
Jye, S., A speech encryption using fractional chaotic systems. Nonlinear Dynamics 65: 103-108, 2011.
Xiao, D., Shih, F., Liao, X., A chaos-based hash function with both modification detection and localization capabilities. Commun Nonlinear Sci Numer Simulat 15(9): 2254-2261, 2010.
Deng, S., Li, Y., Xiao, D., Analysis and improvement of a chaos-based Hash function construction. Commun Nonlinear Sci Numer Simulat 15(5):1338-1347, 2010.
Xiao, D., Liao, X., Deng, S., A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4). 1136–1142, 2007.
Han, S., Security of a key agreement protocol based on chaotic maps. Chaos Solitons Fractals 38(3): 764–768, 2008.
Tseng, H., Jan, R., Yang, W., A chaotic maps-based key agreement protocol that preserves user anonymity, In: IEEE Int. Conf. Commun., ICC’09, 1–6, 2009.
Niu, Y., Wang, X., An anonymous key agreement protocol based on chaotic maps, Commun. Nonlinear Sci. Numer. Simul. 16: 1986–1992, 2011.
Yoon, E.J., Efficiency and security problems of anonymous key agreement protocol based on chaotic maps, Commun. Nonlinear Sci. Numer. Simul. 17: 2735–2740, 2012.
Xue, K.P., Hong, P.L., Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17: 2969–2977, 2012.
Tan, Z., A chaotic maps-based authenticated key agreement protocol with strong anonymity. Nonlinear Dyn. 72: 311–320, 2012.
Lee, C., Chen, C., Wu, C., Huang, S., An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2): 79–87, 2012.
He, D., Chen, Y., Chen, J., Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69, 1149–1157, 2012.
Lin, H., Chaotic map based mobile dynamic ID authenticated key agreement scheme. Wireless Personal Communications, DOI: 10.1007/s11277-014-1829-5, 2014.
Hao, X., Wang, J., Yang, Q., Yan, X., Li, P., A chaotic map-based authentication scheme for telecare medicine information systems., J Med Syst. 37(2):9919, 2013.
He, D. Kumar, N., Khan, M., Lee, J.-H., Anonymous two-factor authentication for consumer roaming service in Global Mobility Networks, IEEE Transactions on Consumer Electronics, 59(4), pp. 811-817, 2013.
He, D., Kumar, N., Chilamkurti, N., Lee, J.-H., Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. Journal of Medical Systems. 38(10), pp. 1-6, 2014.
He, D., Kumar, N., Khan, M., Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks, Multimedia Systems, DOI: 10.1007/s00530-013-0346-9, 2014.
Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem, Journal of Medical Systems, 38(2): 1-7, 2014.
He, D., Wang, D,. Robust biometrics-based authentication scheme for multi-server environment, IEEE Systems Journal, DOI: 10.1109/JSYST.2014.2301517, 2014.
Zhang, Z., Qi, Q., An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography, Journal of Medical Systems 38(5): 1-7, 2014.
He, D., Kumar, Lee, J.-H. Enhanced three-factor security protocol for USB consumer storage devices, IEEE Transactions on Consumer Electronics, 60(1), pp. 30-37, 2014.
Acknowledgments
The authors thank Prof. Jesse Ehrenfeld and the anonymous reviewers for their valuable comments. The authors thank the editors and the anonymous reviewers for their valuable comments. This research was supported by the National Natural Science Foundation of China (Nos.61202447, 61472074), the Natural Science Foundation of Hebei Province of China (No. F2013501066), the Northeastern University at Qinhuangdao Science and Technology Support Program (No. xnk201307).
Conflict of Interest
The authors declare that he has no conflict of interest.
Author information
Authors and Affiliations
Corresponding author
Additional information
This article is part of the Topical Collection on Systems-Level Quality Improvement
Rights and permissions
About this article
Cite this article
Wang, Z., Huo, Z. & Shi, W. A Dynamic Identity Based Authentication Scheme Using Chaotic Maps for Telecare Medicine Information Systems. J Med Syst 39, 158 (2015). https://doi.org/10.1007/s10916-014-0158-2
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10916-014-0158-2