Three Factor Authenticated Key Agreement Scheme for Telecare Medicine Information System Using Chebyshev Chaotic Maps
نویسنده
چکیده
Telecare Medicine Information System (TMIS) is an effective technology in which patients can remain at their home and can get suggestions for medical treatment through the internet. One of the challenges faced by this system is security of medical data. Hence mutual authentication and session key establishment on a medical server between doctor and a patient are required for enhancing security of TMIS. Password authentication schemes have been widely used as a security scheme in TMIS. Most of the Password authentication schemes are associated with chaotic map. However, they are vulnerable to various attacks such as offline password guessing attack, man-inthe-middle attack, stolen smart card attack etc. The Objective of this work is to provide medical data security, privacy and user access authentication. It shows that, the biometrics based password authentication scheme using extended chaotic maps had been used, which secured TMIS from vulnerable attacks such as outsider attack, impersonation attack and replay attack in the existing system. Though it provides user anonymity, forward secrecy and session key security, it does not consider about privacy protection. The proposed system introduces three factor (password, smart card and biometrics) authenticated key agreement scheme using chebyshev chaotic map to provide privacy protection. The proposed system enhances the security of TMIS against vulnerable attacks such as man-inmiddle attack, replay attack and provides various features such as user anonymity, perfect forward secrecy, efficient login and password updating.
منابع مشابه
The Cryptanalysis of Lee's Chaotic Maps-Based Authentication and Key Agreement Scheme using Smart card for Telecare Medicine Information Systems
The Telecare medicine information system (TMIS) is developed to provide Telecare services to the remote user. A user can access remote medical servers using internet without moving from his place. Although remote user and server exchange their messages/data via public networks. An adversary is considered to be enough powerful that he may have full control over the public network. This makes the...
متن کاملProvably Secure and Repeatable Authenticated Privacy-Protection Scheme Using Chaotic Maps with Distributed Architecture
Nowadays, the distributed password-authenticated key agreement schemes become more and more popular. Compare with the three traditional architectures (client/server, two clients/server and multi-server), the distributed architecture can solve problems of single-point of security, single-point of efficiency and single-point of failure. Moreover, it has the characteristics of scalability, flexibi...
متن کاملSecure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving
Nowadays chaos theory related to cryptography has been addressed widely, so there is an intuitive connection between group key agreement and chaotic maps. Such a connector may lead to a novel way to construct authenticated and efficient group key agreement protocols. Many chaotic maps based two-party/three-party password authenticated key agreement (2PAKA/3PAKA) schemes have been proposed. Howe...
متن کاملAttacks on Lin's Mobile Dynamic Identity-based Authenticated Key Agreement Scheme using Chebyshev Chaotic Maps
In 2014, Lin proposed an authentication system with dynamic identity of the user for low-power mobile devices using Chebyshev chaotic map. The scheme is proposed to provide mutual authentication and session key agreement between a remote server and its legitimate user. The scheme provides user anonymity and untracibility, and resilience from many cryptographic attacks. However, the author of th...
متن کاملPassword-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New Architecture in Standard Model
Nowadays, the overwhelming majority of password-authenticated key agreement protocols using chaotic maps are based on three architectures (client/server, two clients/server and multi-server) and four security models (heuristic security, random oracle, ideal cipher and standard model). However, with rapid changes in the modern communication environment such as wireless mesh networks and cloud st...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017