Literature DB >> 26766384

Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme.

Liping Zhang, Shaohui Zhu, Shanyu Tang.   

Abstract

Telecare medicine information systems (TMIS) provide flexible and convenient e-health care. However, the medical records transmitted in TMIS are exposed to unsecured public networks, so TMIS are more vulnerable to various types of security threats and attacks. To provide privacy protection for TMIS, a secure and efficient authenticated key agreement scheme is urgently needed to protect the sensitive medical data. Recently, Mishra et al. proposed a biometrics-based authenticated key agreement scheme for TMIS by using hash function and nonce, they claimed that their scheme could eliminate the security weaknesses of Yan et al.'s scheme and provide dynamic identity protection and user anonymity. In this paper, however, we demonstrate that Mishra et al.'s scheme suffers from replay attacks, man-in-the-middle attacks and fails to provide perfect forward secrecy. To overcome the weaknesses of Mishra et al.'s scheme, we then propose a three-factor authenticated key agreement scheme to enable the patient to enjoy the remote healthcare services via TMIS with privacy protection. The chaotic map-based cryptography is employed in the proposed scheme to achieve a delicate balance of security and performance. Security analysis demonstrates that the proposed scheme resists various attacks and provides several attractive security properties. Performance evaluation shows that the proposed scheme increases efficiency in comparison with other related schemes.

Entities:  

Mesh:

Year:  2016        PMID: 26766384     DOI: 10.1109/JBHI.2016.2517146

Source DB:  PubMed          Journal:  IEEE J Biomed Health Inform        ISSN: 2168-2194            Impact factor:   5.772


  11 in total

1.  A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications.

Authors:  Arezou Ostad-Sharif; Dariush Abbasinezhad-Mood; Morteza Nikooghadam
Journal:  J Med Syst       Date:  2018-12-01       Impact factor: 4.460

2.  ICASME: An Improved Cloud-Based Authentication Scheme for Medical Environment.

Authors:  Qingfeng Cheng; Xinglong Zhang; Jianfeng Ma
Journal:  J Med Syst       Date:  2017-02-08       Impact factor: 4.460

3.  Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks.

Authors:  Alice May-Kuen Wong; Chien-Lung Hsu; Tuan-Vinh Le; Mei-Chen Hsieh; Tzu-Wei Lin
Journal:  Sensors (Basel)       Date:  2020-04-29       Impact factor: 3.576

4.  Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services : Authorized Access to Healthcare Services.

Authors:  Dharminder Dharminder; Dheerendra Mishra; Xiong Li
Journal:  J Med Syst       Date:  2019-11-27       Impact factor: 4.460

5.  Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems.

Authors:  Hamed Arshad; Abbas Rasoolzadegan
Journal:  J Med Syst       Date:  2016-09-24       Impact factor: 4.460

6.  Analysis of Security Protocols for Mobile Healthcare.

Authors:  Mohammad Wazid; Sherali Zeadally; Ashok Kumar Das; Vanga Odelu
Journal:  J Med Syst       Date:  2016-09-17       Impact factor: 4.460

7.  A construction of a conformal Chebyshev chaotic map based authentication protocol for healthcare telemedicine services.

Authors:  Dharminder Dharminder; Uddeshaya Kumar; Pratik Gupta
Journal:  Complex Intell Systems       Date:  2021-06-19

8.  Privacy-Preserving and Efficient Truly Three-Factor Authentication Scheme for Telecare Medical Information Systems.

Authors:  Dongqing Xu; Jianhua Chen; Shu Zhang; Qin Liu
Journal:  J Med Syst       Date:  2018-10-02       Impact factor: 4.460

Review 9.  Applications Based on Service-Oriented Architecture (SOA) in the Field of Home Healthcare.

Authors:  Karen Avila; Paul Sanmartin; Daladier Jabba; Miguel Jimeno
Journal:  Sensors (Basel)       Date:  2017-07-25       Impact factor: 3.576

10.  Cybersecurity Enterprises Policies: A Comparative Study.

Authors:  Alok Mishra; Yehia Ibrahim Alzoubi; Asif Qumer Gill; Memoona Javeria Anwar
Journal:  Sensors (Basel)       Date:  2022-01-11       Impact factor: 3.576

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.