Skip to main content
Log in

A Dynamic Identity Based Authentication Scheme Using Chaotic Maps for Telecare Medicine Information Systems

  • Systems-Level Quality Improvement
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

With rapid development of computer technology and wide use of mobile devices, the telecare medicine information system has become universal in the field of medical care. To protect patients’ privacy and medial data’s security, many authentication schemes for the telecare medicine information system have been proposed. Due to its better performance, chaotic maps have been used in the design of authentication schemes for the telecare medicine information system. However, most of them cannot provide user’s anonymity. Recently, Lin proposed a dynamic identity based authentication scheme using chaotic maps for the telecare medicine information system and claimed that their scheme was secure against existential active attacks. In this paper, we will demonstrate that their scheme cannot provide user anonymity and is vulnerable to the impersonation attack. Further, we propose an improved scheme to fix security flaws in Lin’s scheme and demonstrate the proposed scheme could withstand various attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36:1529–1535, 2012.

    Article  Google Scholar 

  2. He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36: 1989–1995, 2012.

    Article  Google Scholar 

  3. Wei, J., Hu, X., and Liu,W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.

  4. Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.

    Article  Google Scholar 

  5. Cao, T., and Zhai, J., Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems, . J. Med. Syst. 37 (2):1–7, 2013.

    Article  MathSciNet  Google Scholar 

  6. Jye, S., A speech encryption using fractional chaotic systems. Nonlinear Dynamics 65: 103-108, 2011.

    Article  MATH  MathSciNet  Google Scholar 

  7. Xiao, D., Shih, F., Liao, X., A chaos-based hash function with both modification detection and localization capabilities. Commun Nonlinear Sci Numer Simulat 15(9): 2254-2261, 2010.

    Article  MATH  MathSciNet  Google Scholar 

  8. Deng, S., Li, Y., Xiao, D., Analysis and improvement of a chaos-based Hash function construction. Commun Nonlinear Sci Numer Simulat 15(5):1338-1347, 2010.

    Article  MATH  MathSciNet  Google Scholar 

  9. Xiao, D., Liao, X., Deng, S., A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4). 1136–1142, 2007.

    Article  MathSciNet  Google Scholar 

  10. Han, S., Security of a key agreement protocol based on chaotic maps. Chaos Solitons Fractals 38(3): 764–768, 2008.

    Article  MATH  MathSciNet  Google Scholar 

  11. Tseng, H., Jan, R., Yang, W., A chaotic maps-based key agreement protocol that preserves user anonymity, In: IEEE Int. Conf. Commun., ICC’09, 1–6, 2009.

  12. Niu, Y., Wang, X., An anonymous key agreement protocol based on chaotic maps, Commun. Nonlinear Sci. Numer. Simul. 16: 1986–1992, 2011.

    Article  MATH  MathSciNet  Google Scholar 

  13. Yoon, E.J., Efficiency and security problems of anonymous key agreement protocol based on chaotic maps, Commun. Nonlinear Sci. Numer. Simul. 17: 2735–2740, 2012.

    Article  MATH  MathSciNet  Google Scholar 

  14. Xue, K.P., Hong, P.L., Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17: 2969–2977, 2012.

    Article  MATH  MathSciNet  Google Scholar 

  15. Tan, Z., A chaotic maps-based authenticated key agreement protocol with strong anonymity. Nonlinear Dyn. 72: 311–320, 2012.

    Article  Google Scholar 

  16. Lee, C., Chen, C., Wu, C., Huang, S., An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2): 79–87, 2012.

    Article  MATH  MathSciNet  Google Scholar 

  17. He, D., Chen, Y., Chen, J., Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69, 1149–1157, 2012.

    Article  MATH  MathSciNet  Google Scholar 

  18. Lin, H., Chaotic map based mobile dynamic ID authenticated key agreement scheme. Wireless Personal Communications, DOI: 10.1007/s11277-014-1829-5, 2014.

    Google Scholar 

  19. Hao, X., Wang, J., Yang, Q., Yan, X., Li, P., A chaotic map-based authentication scheme for telecare medicine information systems., J Med Syst. 37(2):9919, 2013.

    Article  Google Scholar 

  20. He, D. Kumar, N., Khan, M., Lee, J.-H., Anonymous two-factor authentication for consumer roaming service in Global Mobility Networks, IEEE Transactions on Consumer Electronics, 59(4), pp. 811-817, 2013.

    Article  Google Scholar 

  21. He, D., Kumar, N., Chilamkurti, N., Lee, J.-H., Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. Journal of Medical Systems. 38(10), pp. 1-6, 2014.

    Article  Google Scholar 

  22. He, D., Kumar, N., Khan, M., Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks, Multimedia Systems, DOI: 10.1007/s00530-013-0346-9, 2014.

    Google Scholar 

  23. Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem, Journal of Medical Systems, 38(2): 1-7, 2014.

    Article  Google Scholar 

  24. He, D., Wang, D,. Robust biometrics-based authentication scheme for multi-server environment, IEEE Systems Journal, DOI: 10.1109/JSYST.2014.2301517, 2014.

    Google Scholar 

  25. Zhang, Z., Qi, Q., An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography, Journal of Medical Systems 38(5): 1-7, 2014.

    Article  Google Scholar 

  26. He, D., Kumar, Lee, J.-H. Enhanced three-factor security protocol for USB consumer storage devices, IEEE Transactions on Consumer Electronics, 60(1), pp. 30-37, 2014.

    Article  Google Scholar 

Download references

Acknowledgments

The authors thank Prof. Jesse Ehrenfeld and the anonymous reviewers for their valuable comments. The authors thank the editors and the anonymous reviewers for their valuable comments. This research was supported by the National Natural Science Foundation of China (Nos.61202447, 61472074), the Natural Science Foundation of Hebei Province of China (No. F2013501066), the Northeastern University at Qinhuangdao Science and Technology Support Program (No. xnk201307).

Conflict of Interest

The authors declare that he has no conflict of interest.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiheng Wang.

Additional information

This article is part of the Topical Collection on Systems-Level Quality Improvement

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, Z., Huo, Z. & Shi, W. A Dynamic Identity Based Authentication Scheme Using Chaotic Maps for Telecare Medicine Information Systems. J Med Syst 39, 158 (2015). https://doi.org/10.1007/s10916-014-0158-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-014-0158-2

Keywords