A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems

被引:21
作者
Li, Chun-Ta [1 ]
Lee, Cheng-Chi [2 ,3 ]
Weng, Chi-Yao [4 ]
Chen, Song-Jhih [1 ]
机构
[1] Tainan Univ Technol, Dept Informat Management, Tainan 71002, Taiwan
[2] Fu Jen Catholic Univ, Dept Lib & Informat Sci, New Taipei 24205, Taiwan
[3] Asia Univ, Dept Photo & Commun Engn, Taichung 41354, Taiwan
[4] Natl Pingtung Univ, Dept Comp Sci, Pingtung 90003, Taiwan
关键词
Chaotic maps; e-Healthcare system; Dynamic identity; Session key agreement; User authentication; PROTOCOL; CRYPTANALYSIS;
D O I
10.1007/s10916-016-0586-2
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.
引用
收藏
页数:10
相关论文
共 32 条
[1]   Security of public-key cryptosystems based on Chebyshev polynomials [J].
Bergamo, P ;
D'Arco, P ;
De Santis, A ;
Kocarev, L .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) :1382-1393
[2]  
Chaturvedi A, 2017, J KING SAUD UNIV-COM, V29, P54, DOI 10.1016/j.jksuci.2014.12.007
[3]   An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment [J].
Farash, Mohammad Sabzinejad ;
Turkanovic, Muhamed ;
Kumari, Saru ;
Hoelbi, Marko .
AD HOC NETWORKS, 2016, 36 :152-176
[4]   Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing [J].
Farash, Mohammad Sabzinejad ;
Attari, Mahmoud Ahmadian .
NONLINEAR DYNAMICS, 2014, 76 (02) :1203-1213
[5]   Security of a key agreement protocol based on chaotic maps [J].
Han, Song .
CHAOS SOLITONS & FRACTALS, 2008, 38 (03) :764-768
[6]   A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems [J].
Hao, Xinhong ;
Wang, Jiantao ;
Yang, Qinghai ;
Yan, Xiaopeng ;
Li, Ping .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
[7]   Anonymous Authentication for Wireless Body Area Networks With Provable Security [J].
He, Debiao ;
Zeadally, Sherali ;
Kumar, Neeraj ;
Lee, Jong-Hyouk .
IEEE SYSTEMS JOURNAL, 2017, 11 (04) :2590-2601
[8]   One-to-many authentication for access control in mobile pay-TV systems [J].
He, Debiao ;
Kumar, Neeraj ;
Shen, Han ;
Lee, Jong-Hyouk .
SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (05)
[9]   Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks [J].
He, Debiao ;
Kumar, Neeraj ;
Chen, Jianhua ;
Lee, Cheng-Chi ;
Chilamkurti, Naveen ;
Yeo, Seng-Soo .
MULTIMEDIA SYSTEMS, 2015, 21 (01) :49-60
[10]   Authentication Protocol for an Ambient Assisted Living System [J].
He, Debiao ;
Zeadally, Sherali .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (01) :71-77