Skip to main content
Log in

A ticket-based multi-server biometric authentication scheme using extended chaotic maps for telecare medical information systems

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the development of technology, medical activities have gradually changed from traditional in-hospital diagnostic to telemedicine on the internet. These days, to accommodate security and efficiency in telemedicine, many authentication schemes were proposed for Telemedicine Medical Information Systems. Most of these authentication mechanisms usually rely on an online third party such that many schemes suffered from security vulnerabilities including limited bandwidth, impersonation attack, etc. For example, when the demand for authentication services suddenly increases, the third party bandwidth may overload so that the system broken and fails to serve correctly. Additionally, malicious legal insiders may easily obtain information of other participants, and then perform impersonation attacks. To prevent these weaknesses, this study develops a secure and efficient authentication scheme by using extended chaotic maps. The proposed scheme enables legal participants to directly authenticate and communicate each other without the help of an online trusted third party. It is also suitable for multi-server environment, and patients only register their identities to a center management server once. Then they can get services from all service providers in this system by using a registration ticket issued by the center management server. Accordingly, the limited bandwidth capability problems can be eliminated. Additionally, it has been shown that extended chaotic maps computations are more efficient than modular exponential computations or scalar multiplications on an elliptic curve. The proposed scheme not only provides more security properties, but also is more efficient than related schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Abeele VA, Rompaey VV (2006) Introducing human-centered research to game design: designing game concepts for and with senior citizens, CHI '06 Extended Abstracts on Human Factors in Computing Systems, 22-27, Montréal, Québec, Canada. doi:10.1145/1125451.1125721

  2. Amin R, Islam SH, Biswas G, Khan MK, Kumar N (2015) An efficient and practical smart card based anonymity preserving user authentication scheme for TMIS using elliptic curve cryptography. J Med Syst 39(11):1–18

    Google Scholar 

  3. Bergamo P, D’Arco P, Santis AD, Kocarev L (2005) Security of public-key cryptosystems based on chebyshev polynomials. IEEE Transactions on Circuits and systems 52:1382–1393

    Article  MathSciNet  Google Scholar 

  4. Chaudhry SA, Khan MT, Khan MK (2016) A multiserver biometric authentication scheme for TMIS using elliptic curve cryptography. J Med Syst 40(11):230

    Article  Google Scholar 

  5. Huh JH, Kim TJ (2019) A location-based mobile health care facility search system for senior citizens. J Supercomput 75(4):1831–1848

    Article  Google Scholar 

  6. Huh JH, Seo K (2015) Design and implementation of the basic Ttechnology for solitary senior citizen's lonely death monitoring system using PLC. Journal of Korea Multimedia Society 18(6):742–752

    Article  Google Scholar 

  7. Irshad A, Chaudhry SA, Xie Q, Li X, Farash MS, Kumari S, Wu F (2018) An enhanced and provably secure chaotic map-based authenticated key agreement in multi-server architecture. Arab J Sci Eng 43(2):811–828

    Article  Google Scholar 

  8. Irshad A, Sher M, Chaudhary SA (2016) An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging registration centre. J Supercomput 72(4):1623–1644

    Article  Google Scholar 

  9. Irshad A, Sher M, Chaudhry SA, Xie Q, Kumari S, Wu F (2017) An improved and secure chaotic map based authenticated key agreement in multi-server architecture. Multimed Tools Appl 77(1):1167–1204

    Article  Google Scholar 

  10. Islam SKH (2014) Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps. Nonlinear Dynamics 78(3):2261–2276

    Article  MathSciNet  Google Scholar 

  11. Jiang Q, Wei F, Fu S, Ma J, Li G, Alelaiwi A (2016) Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dynamics 83(4):2085–2101

    Article  MathSciNet  Google Scholar 

  12. Jiang P, Wen Q, Li W, Jin Z, Zhang H (2015) An anonymous and efficient remote biometrics user authentication scheme in a multi-server environment. Frontiers of Computer Science 9(1):142–156

    Article  MathSciNet  Google Scholar 

  13. Kocarev L, Tasev Z (2003) Public-key encryption based on Chebyshev maps. Proceedings of the International Symposium on Circuits and Systems 3:III-28–III-31

    Google Scholar 

  14. Konstantinidis EI, Billis AS, Mouzakidis CA, Zilidou VI, Antoniou PE (2016) Bamidis PD (2016) Design, implementation, and wide pilot deployment of FitForAll: an easy to use exergaming platform improving physical fitness and life quality of senior citizens. IEEE Journal of Biomedical and Health Informatics 20(1):189–200

    Article  Google Scholar 

  15. Lee CC, Hsu CW (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dynamics 71(1–2):201–211

    Article  MathSciNet  Google Scholar 

  16. Li X, Niu JW, Khan MK, Liao JG (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365–1371

    Article  Google Scholar 

  17. Shen H, Gao C, He D, Wu L (2015) New biometrics-based authentication scheme for multi-server environment incritical systems. J Ambient Intell Humaniz Comput 6(6):825–834

    Article  Google Scholar 

  18. Tan Z (2016) A privacy-preserving multi-server authenticated key agreement scheme based on Chebyshev chaotic maps. Security and Communication Networks 9(11):1384–1397

    Article  Google Scholar 

  19. Tsai JL, Lo NW (2015) A chaotic map based anonymous multi-server authenticated key agreement protocol using smart card. Int J Commun Syst 28(13):1955–1963

    Article  Google Scholar 

  20. Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fractals 37:669–674

    Article  MathSciNet  Google Scholar 

  21. Zhu H (2005) A provable one-way authentication key agreement scheme with user anonymity for multi-server environment. KSII Transactions on Internet and Information Systems 9(2):811–829

    Google Scholar 

Download references

Acknowledgements

This work was supported by Tzu Chi Unversity, under Contract No. TCRPP107013.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tian-Fu Lee.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lee, TF., Diao, YY. & Hsieh, YP. A ticket-based multi-server biometric authentication scheme using extended chaotic maps for telecare medical information systems. Multimed Tools Appl 78, 31649–31672 (2019). https://doi.org/10.1007/s11042-019-07949-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-07949-8

Keywords

Navigation