Cryptanalysis and Improvement of Remote User Authentication Schemes in Telecare Medicine Information System
Date
2021
Authors
Nayak, Chaitanya Sadanand.
Journal Title
Journal ISSN
Volume Title
Publisher
National Institute of Technology Karnataka, Surathkal
Abstract
The Internet with its high-speed development is making human jobs more easy and less timeconsuming.
This has enabled us its usage in all the fields, right from school-going kids to
professionals working for Multinational Companies. One can not even imagine a day without
the Internet. When this has become the scenario today, personnel from all the fields are trying
to make the best out of it and medical health people are also a part of this. The traditional
methods of waiting in queues for medical consultancy has been transformed to online consultancy.
A patient sitting at one part of world can consult a physician at the other end using the
Internet. Medical institutes, researchers in the field are able to work with the required data
by obtaining them from the medical servers, where the required information is stored. These
topics constitute the connected health care. This is a model for health care that uses technology
to provide medical assistance remotely. Telecare Medicine Information System (TMIS) is one
such system that supports health care delivery services. The information is stored in a server
and since the Internet is open to all, preserving patient’s identity and information is a very important
and challenging task. In other words, authentication is most important. In past, this was
easy. Two persons would identify each other by visual appearance. But at present, one cannot
’see’ the other in reality. In such case, authentication becomes very complex, specially when
the message to be transmitted is confidential. To fulfill this, many authentication schemes using
smart cards were and are being proposed. However, many schemes are insecure or they have
low efficiency. So, proposing an ideal scheme, which is robust and efficient is the main aim of
this research.
Description
Keywords
Department of Mathematical and Computational Sciences, TMIS, User authentication, Smart card, Chaotic map, Hash function, Biometrics, Session key, BAN logic