Please use this identifier to cite or link to this item:
https://idr.nitk.ac.in/jspui/handle/123456789/17071
Title: | Cryptanalysis and Improvement of Remote User Authentication Schemes in Telecare Medicine Information System |
Authors: | Nayak, Chaitanya Sadanand. |
Supervisors: | Madhusudhan, R. |
Keywords: | Department of Mathematical and Computational Sciences;TMIS;User authentication;Smart card;Chaotic map;Hash function;Biometrics;Session key;BAN logic |
Issue Date: | 2021 |
Publisher: | National Institute of Technology Karnataka, Surathkal |
Abstract: | The Internet with its high-speed development is making human jobs more easy and less timeconsuming. This has enabled us its usage in all the fields, right from school-going kids to professionals working for Multinational Companies. One can not even imagine a day without the Internet. When this has become the scenario today, personnel from all the fields are trying to make the best out of it and medical health people are also a part of this. The traditional methods of waiting in queues for medical consultancy has been transformed to online consultancy. A patient sitting at one part of world can consult a physician at the other end using the Internet. Medical institutes, researchers in the field are able to work with the required data by obtaining them from the medical servers, where the required information is stored. These topics constitute the connected health care. This is a model for health care that uses technology to provide medical assistance remotely. Telecare Medicine Information System (TMIS) is one such system that supports health care delivery services. The information is stored in a server and since the Internet is open to all, preserving patient’s identity and information is a very important and challenging task. In other words, authentication is most important. In past, this was easy. Two persons would identify each other by visual appearance. But at present, one cannot ’see’ the other in reality. In such case, authentication becomes very complex, specially when the message to be transmitted is confidential. To fulfill this, many authentication schemes using smart cards were and are being proposed. However, many schemes are insecure or they have low efficiency. So, proposing an ideal scheme, which is robust and efficient is the main aim of this research. |
URI: | http://idr.nitk.ac.in/jspui/handle/123456789/17071 |
Appears in Collections: | 1. Ph.D Theses |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
CHAITANYA SADANAND NAYAK thesis.pdf | 2.17 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.