An efficient provably secure verifier-based authentication protocol using fractional chaotic maps in telecare medicine information systems

被引:0
|
作者
Preecha Yupapin
Chandrashekhar Meshram
Sharad Kumar Barve
Rabha W. Ibrahim
Muhammad Azeem Akbar
机构
[1] Institute of Vocational Education Northeastern 2,Department of Electrical Technology, School of Industrial Technology
[2] Jaywanti Haksar Government Post-Graduate College,Department of Post Graduate Studies and Research in Mathematics
[3] College of Chhindwara University,Department of Mathematics
[4] Pandit S. N. Shukla University Shahdol,Department of Computer Science and Mathematics
[5] Lebanese American University,The Software Engineering Department
[6] LUT University,undefined
来源
Soft Computing | 2023年 / 27卷
关键词
TMIS; Fractional chaotic maps; Provable security; Authentication; Data exchange and hash function;
D O I
暂无
中图分类号
学科分类号
摘要
The telecare medicine information systems (TMIS) offer a networking channel across public networks to access remote medical services and enable health care professionals and medical staff to make the best clinical decisions and treatments quickly. The verified-based three-party authentication protocol in TMIS for data exchange, authorizations only two patients/users to accumulation their verifiers in the record of authentication server calculated exhausting own password. The authentication scheme will then verify the verifiers of the patients/users and allow them to exchange electronic medical records securely and easily. In this paper, we provide an effective, provably secure, verified-based three-party authentication protocol for data exchange in TMIS utilising fractional chaotic maps. The authentication protocol provided does not use any public server keys and does not require the number of additional messages and rounds for key validation. The projected protocol is appropriate for TMIS because it has stronger security and cheaper communication costs than the corresponding verified-based approach. The development of smart cities can be accelerated with the proposed protocol.
引用
收藏
页码:6033 / 6047
页数:14
相关论文
共 50 条
  • [21] Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems
    Der-Chyuan Lou
    Tian-Fu Lee
    Tsung-Hung Lin
    Journal of Medical Systems, 2015, 39
  • [22] A New Secure Authentication Protocol for Telecare Medicine Information System and Smart Campus
    Safkhani, Masoumeh
    Vasilakos, Athanasios
    IEEE ACCESS, 2019, 7 : 23514 - 23526
  • [23] Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Yau, Wei-Chuen
    Phan, Raphael C. -W.
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (06)
  • [24] Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Wei-Chuen Yau
    Raphael C.-W. Phan
    Journal of Medical Systems, 2013, 37
  • [25] A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System
    Li, Chun-Ta
    Weng, Chi-Yao
    Lee, Cheng-Chi
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (08)
  • [26] Design of a secure and privacy preserving authentication protocol for telecare medical information systems
    Sumithra, V
    Shashidhara, R.
    Mukhopadhyay, Debajyoti
    SECURITY AND PRIVACY, 2022, 5 (04)
  • [27] Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps
    S. K. Hafizul Islam
    Muhammad Khurram Khan
    Mohammad S. Obaidat
    Fahad T. Bin Muhaya
    Wireless Personal Communications, 2015, 84 : 2013 - 2034
  • [28] A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System
    Chun-Ta Li
    Chi-Yao Weng
    Cheng-Chi Lee
    Journal of Medical Systems, 2015, 39
  • [29] Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps
    Islam, S. K. Hafizul
    Khan, Muhammad Khurram
    Obaidat, Mohammad S.
    Bin Muhaya, Fahad T.
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (03) : 2013 - 2034
  • [30] A Privacy Preserving Secure and Efficient Authentication Scheme for Telecare Medical Information Systems
    Raghavendra Mishra
    Amit Kumar Barnwal
    Journal of Medical Systems, 2015, 39