Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme

Zhang, Liping, Zhu, Shaohui and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2017) Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE Journal of Biomedical and Health Informatics, 21 (2). pp. 465-475. ISSN 2168-2194

[thumbnail of Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme.pdf]
Preview
PDF
Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme.pdf - Accepted Version

Download (268kB) | Preview

Abstract

Telecare Medicine Information Systems (TMIS) provides flexible and convenient e-health care. However the medical records transmitted in TMIS are exposed to unsecured public networks, so TMIS are more vulnerable to various types of security threats and attacks. To provide privacy protection for TMIS, a secure and efficient authenticated key agreement scheme is urgently needed to protect the sensitive medical data. Recently, Mishra et al. proposed a biometrics-based authenticated key agreement scheme for TMIS by using hash function and nonce, they claimed that their scheme could eliminate the security weaknesses of Yan et al.’s scheme and provide dynamic identity protection and user anonymity. In this paper, however, we demonstrate that Mishra et al.’s scheme suffers from replay attacks, man-in-the-middle attacks and fails to provide perfect forward secrecy. To overcome the weaknesses of Mishra et al.’s scheme, we then propose a three-factor authenticated key agreement scheme to enable the patient enjoy the remote healthcare services via TMIS with privacy protection. The chaotic map-based cryptography is employed in the proposed scheme to achieve a delicate balance of security and performance. Security analysis demonstrates that the proposed scheme resists various attacks and provides several attractive security properties. Performance evaluation shows that the proposed scheme increases efficiency in comparison with other related schemes.

Item Type: Article
Identifier: 10.1109/JBHI.2016.2517146
Additional Information: © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Keywords: Authenticated key agreement, chaotic maps, privacy protection, security, telecare medicine information systems.
Subjects: Computing > Information security > Cyber security
Computing > Information security
Depositing User: Shanyu Tang
Date Deposited: 26 Sep 2017 22:56
Last Modified: 06 Feb 2024 15:54
URI: https://repository.uwl.ac.uk/id/eprint/3941

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu