Affordable Access

Access to the full text

Construction of a Chaotic Map-Based Authentication Protocol for TMIS

Authors
  • Dharminder, Dharminder1
  • Kundu, Nibedita2
  • Mishra, Dheerendra3
  • 1 Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Chennai, India , Chennai (India)
  • 2 The LNM Institute of Information Technology, Jaipur, India , Jaipur (India)
  • 3 Maulana Azad National Institute of Technology, Bhopal, India , Bhopal (India)
Type
Published Article
Journal
Journal of Medical Systems
Publisher
Springer-Verlag
Publication Date
Jul 02, 2021
Volume
45
Issue
8
Identifiers
DOI: 10.1007/s10916-021-01750-7
Source
Springer Nature
Keywords
Disciplines
  • Mobile & Wireless Health
License
Yellow

Abstract

Upgraded network technology presents an advanced technological platform for telecare medicine information systems (TMIS) for patients. However, TMIS generally suffers various attacks since the information being shared through the insecure channel. Recently, many authentication techniques have been proposed relying on the chaotic map. However, many of these designs are not secure against the known attacks. In spite of the fact that some of the constructions attain low computation overhead, they cannot establish an anonymous communication and many of them fail to ensure forward secrecy. In this work, our aim is to present authentication and key agreement protocol for TMIS utilizing a chaotic map to achieve both security and efficiency. The underlying security assumptions are chaotic theory assumptions. This scheme supports forward secrecy and a secure session is established with just two messages of exchange. Moreover, we present a comparative analysis of related authentication techniques.

Report this publication

Statistics

Seen <100 times