Cryptanalysis of a chaotic map-based authentication and key agreement scheme for telecare medicine information systems

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

User authentication and privacy is quite essential in telecare medicine information systems (TMIS) for a secure and efficient access of the healthcare services. Very recently, in 2014, Li et al. proposed an efficient chaotic maps and smart cards based password authentication and key agreement scheme TMIS (Journal of Medical Systems). In this paper, we analyze that though the Li et al. scheme is computationally efficient, it has several security weaknesses. As for example, it has design flaws in both login authentication phase and in password change phase. Moreover, it cannot resist denial-of-service attack and adopts incorrect strategy in design of server status table. As a result, the Li et al. scheme is not suitable for practical applications. Finally, we hint at some possible improvements that can be adopted by their scheme to make it more secured against various possible known attacks.

Cite

CITATION STYLE

APA

Roy, S., & Chatterjee, S. (2016). Cryptanalysis of a chaotic map-based authentication and key agreement scheme for telecare medicine information systems. In Advances in Intelligent Systems and Computing (Vol. 404, pp. 527–537). Springer Verlag. https://doi.org/10.1007/978-81-322-2695-6_44

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free