Back to Search
Start Over
Construction of a Chaotic Map-Based Authentication Protocol for TMIS.
- Source :
-
Journal of Medical Systems . Aug2021, Vol. 45 Issue 8, p1-10. 10p. 1 Diagram, 5 Charts, 2 Graphs. - Publication Year :
- 2021
-
Abstract
- Upgraded network technology presents an advanced technological platform for telecare medicine information systems (TMIS) for patients. However, TMIS generally suffers various attacks since the information being shared through the insecure channel. Recently, many authentication techniques have been proposed relying on the chaotic map. However, many of these designs are not secure against the known attacks. In spite of the fact that some of the constructions attain low computation overhead, they cannot establish an anonymous communication and many of them fail to ensure forward secrecy. In this work, our aim is to present authentication and key agreement protocol for TMIS utilizing a chaotic map to achieve both security and efficiency. The underlying security assumptions are chaotic theory assumptions. This scheme supports forward secrecy and a secure session is established with just two messages of exchange. Moreover, we present a comparative analysis of related authentication techniques. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 01485598
- Volume :
- 45
- Issue :
- 8
- Database :
- Academic Search Index
- Journal :
- Journal of Medical Systems
- Publication Type :
- Academic Journal
- Accession number :
- 151837881
- Full Text :
- https://doi.org/10.1007/s10916-021-01750-7