Skip to main content

Advertisement

Log in

Privacy Protection for Point-of-Care Using Chaotic Maps-Based Authentication and Key Agreement

  • Mobile & Wireless Health
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

Recently, remote points-of-care as a novel medical model has emerged and received considerable attention due to its convenient medical services such as efficient real-time monitoring and prompt information feedback. Although the points-of-care has more attractive advantages compared with traditional health care systems, some important issues still require a serious consideration such as privacy protection and the security of the transmitted biomedical signals. In this study, we propose a novel authentication and key agreement mechanism that ensures privacy preservation and provides biomedical signals protection during the communication process by negotiating a shared key to encrypt/decrypt sensitive information. Chaotic maps are employed in our design to achieve mutual authentication and key agreement for resource-constrained points-of-care, which also increases the efficiency in comparison with those schemes designed by Elliptic Curve Cryptography or RSA. Furthermore, dynamic identities are adopted in the proposed scheme to achieve user anonymity and user untraceability for the high-privacy-required points-of-care. The security of the proposed scheme is proven via Real-or-Random model. The performance analysis shows that the proposed scheme reduces computational overhead in comparison with the state-of-the-art schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Abuadbba, A., and Khalil, I., Walsh-Hadamard-Based 3-D steganography for protecting sensitive information in point-of-care. IEEE Trans. Biomed. Eng. 64(9):2186–2195, 2017.

    Article  Google Scholar 

  2. Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., and Jamalipour, A., Wireless body area networks: A survey. IEEE Commun. Surv. Tutor. 16(3):1658–1685, 2014.

    Article  Google Scholar 

  3. Chatzigiannakis, I., Vitaletti, A., and Pyrgelis, A., A privacy-preserving smart parking system using an IoT elliptic curve based security platform. Comput. Commun. 89–90:165–177, 2016.

    Article  Google Scholar 

  4. Das, M. L., Two-factor user authentication scheme in wireless sensor networks. IEEE Trans. Wirel. Commun. 8:1086–1090, 2009.

    Article  Google Scholar 

  5. Lee, C. I, and Chien, H. Y., An elliptic curve cryptography-based RFID authentication securing E-health system. Taylor & Francis, Inc. 2015.

  6. Challa, S., et al., An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput. Electr. Eng. 2017.

  7. Lee, Y. S., Alasaarela, E., and Lee, H. J., An efficient encryption scheme using elliptic curve cryptography (ECC) with symmetric algorithm for healthcare system. Int. J. Sec. Appl. 8(3):63–70, 2014.

    Google Scholar 

  8. Hou, J. L., and Yeh, K. H., Novel authentication schemes for IoT based healthcare systems. Int. J. Distrib. Sens. Netw. 2015(4):1–9, 2015.

    Google Scholar 

  9. Li, C. T., Lee, C. C., Weng, C. Y., and Chen, S. J., A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems. J. Med. Syst. 40(11):233, 2016.

    Article  Google Scholar 

  10. Yeh, K. H., A secure iot-based healthcare system with body sensor networks. IEEE Access, 10288–10299, 2016.

    Article  Google Scholar 

  11. He, D., Kumar, N., Chen, J., Lee, C. C., Chilamkurti, N., and Yeo, S. S., Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed. Syst. 21(1):49–60, 2015.

    Article  Google Scholar 

  12. Gope, P., and Hwang, T., BSN-care: A secure IoT-based modern healthcare system using body sensor network. IEEE Sens. J. 16(5):1368–1376, 2016.

    Article  Google Scholar 

  13. Chang, I. P., Lee, T. F., Lin, T. H., and Liu, C. M., Enhanced two-factor authentication and key agreement using dynamic identities in wireless sensor networks. Sensors. 15(12):29841–29854, 2015.

    Article  Google Scholar 

  14. Kocarev, L., and Tasev, Z., Public-key encryption based on Chebyshev maps. Proc. Int. Sym. Circ. Syst. 3: III-28-III-31 2003.

  15. Mason, J. C., and Handscomb, D. C., Chebyshev polynomials. Boca Raton: Chapman & Hall/CRC, 2003.

    Google Scholar 

  16. Bergamo, P., D’Arco, P., Santis, A., and Kocarev, L., Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circ. Syst. 52(7):1382–1393, 2004.

    Article  Google Scholar 

  17. Lee, T., Provably secure anonymous single-sign-on authentication mechanisms using extended Chebyshev chaotic maps for distributed Computer networks. IEEE Syst. J. 1–8, 2015.

  18. Lai, H., Xiao, J., Li, L., and Yang, Y., Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol, Math. Probl. Eng. 2012.

  19. Zhao, F., Gong, P., Li, S., Li, M., and Li, P., Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials. Nonlinear Dyn. 74(1–2):419–427, 2013.

    Article  Google Scholar 

  20. Kumari, S., Li, X., Wu, F., Das, A. K., Arshad, H., and Khan, M. K., A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Gen. Comput. Syst. 63(C):56–75, 2016.

    Article  Google Scholar 

  21. Lee, T. F., Efficient and secure temporal credential-based authenticated key agreement using extended chaotic maps for wireless sensor networks. Sensors. 15(7):14960–14980, 2015.

    Article  Google Scholar 

  22. Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Soliton Fract. 37(3):669–674, 2008.

    Article  Google Scholar 

  23. Bellare, M., Pointcheval, D., and Rogaway, P., Authenticated key exchange secure against dictionary attacks. Lect. Notes Comput. Sci. 1807:139–155, 2000.

    Article  Google Scholar 

  24. Abdalla, M., Fouque, P. A., and Pointcheval, D., Password-based authenticated key exchange in the three-party setting in public key cryptography - PKC. Springer-Verlag Berlin 3386(2005):65–84, 2005.

    Google Scholar 

  25. Shoup, V., Sequences of games: A tool for taming complexity in security proofs, Manuscript, 2004. http://www.shoup.net (Accessed 12 September 2016).

  26. Xiong, H., Tao, J., and Chen, Y., A robust and anonymous two factor authentication and key agreement protocol for telecare medicine information systems. J. Med. Syst. 40(11):228, 2016.

    Article  Google Scholar 

  27. Li, X., Niu, J., Kumari, S., Khan, M. K., Liao, J., and Liang, W., Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol. Nonlinear Dyn. 80(3):1209–1220, 2015.

    Article  Google Scholar 

  28. Lee, C. C., Li, C. T., Chiu, S. T., and Lai, Y. M., A new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn. 79(4):2485–2495, 2014.

    Article  Google Scholar 

  29. Xiao, D., Liao, X., and Deng, S., One-way hash function construction based on the chaotic map with changeable-parameter. Chaos Solitons Fract. 24(1):65–71, 2005.

    Article  CAS  Google Scholar 

  30. Cheng, Z. Y., Liu, Y., Chang, C. C., and Chang, S. C., Authenticated RFID security mechanism based on chaotic maps. Sec. Commun. Netw. 6(2):247–256, 2013.

    Article  Google Scholar 

  31. He, D., Zhang, Y., and Chen, J., Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wirel. Personal Commun. 74(2):229–243, 2014.

    Article  Google Scholar 

Download references

Funding

This work was supported by the National Natural Science Foundation of China [grant numbers 61,303,237].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lanchao Zhao.

Ethics declarations

Conflict of Interests

The authors declare that we have no conflicts of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

This article is part of the Topical Collection on Mobile & Wireless Health

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, L., Luo, H., Zhao, L. et al. Privacy Protection for Point-of-Care Using Chaotic Maps-Based Authentication and Key Agreement. J Med Syst 42, 250 (2018). https://doi.org/10.1007/s10916-018-1099-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-018-1099-y

Keywords

Navigation