Abstract
Recently, remote points-of-care as a novel medical model has emerged and received considerable attention due to its convenient medical services such as efficient real-time monitoring and prompt information feedback. Although the points-of-care has more attractive advantages compared with traditional health care systems, some important issues still require a serious consideration such as privacy protection and the security of the transmitted biomedical signals. In this study, we propose a novel authentication and key agreement mechanism that ensures privacy preservation and provides biomedical signals protection during the communication process by negotiating a shared key to encrypt/decrypt sensitive information. Chaotic maps are employed in our design to achieve mutual authentication and key agreement for resource-constrained points-of-care, which also increases the efficiency in comparison with those schemes designed by Elliptic Curve Cryptography or RSA. Furthermore, dynamic identities are adopted in the proposed scheme to achieve user anonymity and user untraceability for the high-privacy-required points-of-care. The security of the proposed scheme is proven via Real-or-Random model. The performance analysis shows that the proposed scheme reduces computational overhead in comparison with the state-of-the-art schemes.
Similar content being viewed by others
References
Abuadbba, A., and Khalil, I., Walsh-Hadamard-Based 3-D steganography for protecting sensitive information in point-of-care. IEEE Trans. Biomed. Eng. 64(9):2186–2195, 2017.
Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., and Jamalipour, A., Wireless body area networks: A survey. IEEE Commun. Surv. Tutor. 16(3):1658–1685, 2014.
Chatzigiannakis, I., Vitaletti, A., and Pyrgelis, A., A privacy-preserving smart parking system using an IoT elliptic curve based security platform. Comput. Commun. 89–90:165–177, 2016.
Das, M. L., Two-factor user authentication scheme in wireless sensor networks. IEEE Trans. Wirel. Commun. 8:1086–1090, 2009.
Lee, C. I, and Chien, H. Y., An elliptic curve cryptography-based RFID authentication securing E-health system. Taylor & Francis, Inc. 2015.
Challa, S., et al., An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput. Electr. Eng. 2017.
Lee, Y. S., Alasaarela, E., and Lee, H. J., An efficient encryption scheme using elliptic curve cryptography (ECC) with symmetric algorithm for healthcare system. Int. J. Sec. Appl. 8(3):63–70, 2014.
Hou, J. L., and Yeh, K. H., Novel authentication schemes for IoT based healthcare systems. Int. J. Distrib. Sens. Netw. 2015(4):1–9, 2015.
Li, C. T., Lee, C. C., Weng, C. Y., and Chen, S. J., A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems. J. Med. Syst. 40(11):233, 2016.
Yeh, K. H., A secure iot-based healthcare system with body sensor networks. IEEE Access, 10288–10299, 2016.
He, D., Kumar, N., Chen, J., Lee, C. C., Chilamkurti, N., and Yeo, S. S., Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed. Syst. 21(1):49–60, 2015.
Gope, P., and Hwang, T., BSN-care: A secure IoT-based modern healthcare system using body sensor network. IEEE Sens. J. 16(5):1368–1376, 2016.
Chang, I. P., Lee, T. F., Lin, T. H., and Liu, C. M., Enhanced two-factor authentication and key agreement using dynamic identities in wireless sensor networks. Sensors. 15(12):29841–29854, 2015.
Kocarev, L., and Tasev, Z., Public-key encryption based on Chebyshev maps. Proc. Int. Sym. Circ. Syst. 3: III-28-III-31 2003.
Mason, J. C., and Handscomb, D. C., Chebyshev polynomials. Boca Raton: Chapman & Hall/CRC, 2003.
Bergamo, P., D’Arco, P., Santis, A., and Kocarev, L., Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circ. Syst. 52(7):1382–1393, 2004.
Lee, T., Provably secure anonymous single-sign-on authentication mechanisms using extended Chebyshev chaotic maps for distributed Computer networks. IEEE Syst. J. 1–8, 2015.
Lai, H., Xiao, J., Li, L., and Yang, Y., Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol, Math. Probl. Eng. 2012.
Zhao, F., Gong, P., Li, S., Li, M., and Li, P., Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials. Nonlinear Dyn. 74(1–2):419–427, 2013.
Kumari, S., Li, X., Wu, F., Das, A. K., Arshad, H., and Khan, M. K., A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Gen. Comput. Syst. 63(C):56–75, 2016.
Lee, T. F., Efficient and secure temporal credential-based authenticated key agreement using extended chaotic maps for wireless sensor networks. Sensors. 15(7):14960–14980, 2015.
Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Soliton Fract. 37(3):669–674, 2008.
Bellare, M., Pointcheval, D., and Rogaway, P., Authenticated key exchange secure against dictionary attacks. Lect. Notes Comput. Sci. 1807:139–155, 2000.
Abdalla, M., Fouque, P. A., and Pointcheval, D., Password-based authenticated key exchange in the three-party setting in public key cryptography - PKC. Springer-Verlag Berlin 3386(2005):65–84, 2005.
Shoup, V., Sequences of games: A tool for taming complexity in security proofs, Manuscript, 2004. http://www.shoup.net (Accessed 12 September 2016).
Xiong, H., Tao, J., and Chen, Y., A robust and anonymous two factor authentication and key agreement protocol for telecare medicine information systems. J. Med. Syst. 40(11):228, 2016.
Li, X., Niu, J., Kumari, S., Khan, M. K., Liao, J., and Liang, W., Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol. Nonlinear Dyn. 80(3):1209–1220, 2015.
Lee, C. C., Li, C. T., Chiu, S. T., and Lai, Y. M., A new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn. 79(4):2485–2495, 2014.
Xiao, D., Liao, X., and Deng, S., One-way hash function construction based on the chaotic map with changeable-parameter. Chaos Solitons Fract. 24(1):65–71, 2005.
Cheng, Z. Y., Liu, Y., Chang, C. C., and Chang, S. C., Authenticated RFID security mechanism based on chaotic maps. Sec. Commun. Netw. 6(2):247–256, 2013.
He, D., Zhang, Y., and Chen, J., Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wirel. Personal Commun. 74(2):229–243, 2014.
Funding
This work was supported by the National Natural Science Foundation of China [grant numbers 61,303,237].
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interests
The authors declare that we have no conflicts of interest.
Ethical Approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
This article is part of the Topical Collection on Mobile & Wireless Health
Rights and permissions
About this article
Cite this article
Zhang, L., Luo, H., Zhao, L. et al. Privacy Protection for Point-of-Care Using Chaotic Maps-Based Authentication and Key Agreement. J Med Syst 42, 250 (2018). https://doi.org/10.1007/s10916-018-1099-y
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10916-018-1099-y