Skip to main content
Log in

A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems

  • Mobile Systems
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

Advancement in network technology provides new ways to utilize telecare medicine information systems (TMIS) for patient care. Although TMIS usually faces various attacks as the services are provided over the public network. Recently, Jiang et al. proposed a chaotic map-based remote user authentication scheme for TMIS. Their scheme has the merits of low cost and session key agreement using Chaos theory. It enhances the security of the system by resisting various attacks. In this paper, we analyze the security of Jiang et al.’s scheme and demonstrate that their scheme is vulnerable to denial of service attack. Moreover, we demonstrate flaws in password change phase of their scheme. Further, our aim is to propose a new chaos map-based anonymous user authentication scheme for TMIS to overcome the weaknesses of Jiang et al.’s scheme, while also retaining the original merits of their scheme. We also show that our scheme is secure against various known attacks including the attacks found in Jiang et al.’s scheme. The proposed scheme is comparable in terms of the communication and computational overheads with Jiang et al.’s scheme and other related existing schemes. Moreover, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Cao, T., and Zhai, J., Improved dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–7, 2013.

    Article  MathSciNet  Google Scholar 

  2. Chen, H.M., Lo, J.W., Yeh, C.K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.

    Article  Google Scholar 

  3. Das, A. K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst. 38(6):1–27, 2014.

    Article  Google Scholar 

  4. He, D., Jianhua, C., Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.

    Article  Google Scholar 

  5. Kim, K. W., and Lee, J. D., On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems. J. Med. Syst. 38(5):1–11, 2014.

    Article  Google Scholar 

  6. Lin, H.Y., On the security of a dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–5, 2013.

    Article  Google Scholar 

  7. Ma, C.G., Wang, D., Zhao, S.D., Security flaws in two improved remote user authentication schemes using smart cards. Int. J. Commun. Syst., 2012. doi: 10.1002/dac.2468.

  8. Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M. K., Cryptanalysis and Improvement of Yan et al.s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 38(6):1–12, 2014.

    Article  Google Scholar 

  9. Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M. K., Chaturvedi, A., Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce. J. Med. Syst. 38(5):1–11, 2014.

    Article  Google Scholar 

  10. Tan, Z., A User Anonymity Preserving Three-Factor Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 38(3):1–9, 2014.

    Article  Google Scholar 

  11. Wang, D., and Ma, C.g., Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards. The Journal of China Universities of Posts and Telecommunications 19(5):104–114, 2012.

    Article  Google Scholar 

  12. Wang, D., Ma, C. G., Wang, P., Chen, Z.: Robust Smart Card Based Password Authentication Scheme Against Smart Card Security Breach. Cryptology ePrint Archive, Report 2012/439 (2012). http://eprint.iacr.org/2012/439.pdf

  13. Wang, D., Ma, C.g., Wu, P., Secure password-based remote user authentication scheme with non-tamper resistant smart cards. Proceedings of the 26th Annual IFIP Conference on Data and Applications Security and Privacy (IFIP DBSec 2012), Paris, France, July 13-16, LNCS 7371, pp. 114–121. Springer-Verlag: Berlin, 2012.

    Google Scholar 

  14. Wen, F., and Guo, D., An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems. J. Med. Syst. 38(5):1–11, 2014.

    MathSciNet  Google Scholar 

  15. Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.

    Article  Google Scholar 

  16. Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.

    Article  Google Scholar 

  17. Xie, Q., Zhang, J., Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–8, 2013.

    Article  Google Scholar 

  18. Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.

    Article  Google Scholar 

  19. Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., He, L., A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems. J. Med. Syst. 38(1):1–7, 2014.

    Article  Google Scholar 

  20. Jiang, Q., Ma, J., Ma, Z., Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):1–8, 2013.

    Article  MathSciNet  Google Scholar 

  21. Lee, T.F., Chang, I.P., Lin, T.H., Wang, C.C., A Secure and Efficient Password-Based User Authentication Scheme Using Smart Cards for the Integrated EPR Information System. J. Med. Syst. 37(3):1–7, 2013.

    Google Scholar 

  22. Petrlic, R., Sekula, S., Sorge, C., A privacy–friendly architecture for future cloud computing. International Journal of Grid and Utility Computing 4(4):265–277, 2013.

    Article  Google Scholar 

  23. Tang, C., and Wu, D.O., Mobile privacy in wireless networks-revisited. IEEE Transactions on Wireless Communications 7(3):1035–1042, 2008.

    Article  Google Scholar 

  24. Guo, C., and Chang, C.C., Chaotic maps-based password-authenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul. 18(6):1433–1440, 2013.

    Article  MathSciNet  MATH  Google Scholar 

  25. Hao, X., Wang, J., Yang, Q., Yan, X., Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(2):1–7, 2013.

    Article  Google Scholar 

  26. Jiang, Q., Ma, J., Lu, X., Tian, Y., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2):1–8, 2014.

    Article  Google Scholar 

  27. Kohda, T., Tsuneda, A., Lawrance, A.J., Correlational properties of chebyshev chaotic sequences. J. Time Ser. Anal. 21(2):181–191, 2000.

    Article  MathSciNet  MATH  Google Scholar 

  28. Kohda, T., and Tsuneda, A., Pseudonoise sequences by chaotic nonlinear maps and their correlation properties. IEICE Trans. Commun. 76(8):855–862, 1993.

    Google Scholar 

  29. Bergamo, P., D’Arco, P., De Santis, A., Kocarev, L., Security of public-key cryptosystems based on chebyshev polynomials. IEEE Transactions on Circuits and Systems 52(7):1382–1393, 2005.

    Article  MathSciNet  Google Scholar 

  30. Xiao, D., Liao, X., Deng, S., A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4):1136–1142, 2007.

    Article  MathSciNet  Google Scholar 

  31. Syverson, P., and Cervesato, I., The logic of authentication protocols. In: Foundations of Security Analysis and Design, pp. 63–137: Springer, 2001.

  32. Burrows, M., Abadi, M., Needham, R.M., A logic of authentication. Proceedings of the Royal Society of London. A. Math. Phys. Sci. 426(1871):233–271, 1989.

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dheerendra Mishra.

Additional information

This article is part of the Topical Collection on Mobile Systems

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mishra, D., Srinivas, J. & Mukhopadhyay, S. A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems. J Med Syst 38, 120 (2014). https://doi.org/10.1007/s10916-014-0120-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-014-0120-3

Keywords

Navigation