The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021
DOI: 10.1007/s40747-021-00441-7
|View full text |Cite
|
Sign up to set email alerts
|

A construction of a conformal Chebyshev chaotic map based authentication protocol for healthcare telemedicine services

Abstract: The outbreak of coronavirus has caused widespread global havoc, and the implementation of lockdown to contain the spread of the virus has caused increased levels of online healthcare services. Upgraded network technology gives birth to a new interface “telecare medicine information systems” in short TMIS. In this system, a user from a remote area and a server located at the hospital can establish a connection to share the necessary information between them. But, it is very clear that all the information is alw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 40 publications
(41 reference statements)
0
11
0
Order By: Relevance
“…The study of chaotic structures and their potential cryptographic designs has sparked much research interest in recent years [1]- [3]. The behaviours of certain cryptographic primitives are fundamentally similar to that of chaotic frameworks, which are represented by their sensitive reliance on random operations and initial situations in the vicinity [4]- [6]. Information security is essential in modern wireless communication systems to protect critical information/data since most people communicate over a public network [7], [8].…”
Section: Introductionmentioning
confidence: 99%
“…The study of chaotic structures and their potential cryptographic designs has sparked much research interest in recent years [1]- [3]. The behaviours of certain cryptographic primitives are fundamentally similar to that of chaotic frameworks, which are represented by their sensitive reliance on random operations and initial situations in the vicinity [4]- [6]. Information security is essential in modern wireless communication systems to protect critical information/data since most people communicate over a public network [7], [8].…”
Section: Introductionmentioning
confidence: 99%
“…We compare the proposed scheme with other related schemes in terms of different security attacks and parameters in Table 3. Zhang et al's [29] scheme cannot provide several security features such as fail to resist the stolen verifier attack [34]. Qu et al's [30] scheme focuses on preventing the impersonation attack but suffers from the off-line guessing attack and reply attack.…”
Section: Performance Comparisonmentioning
confidence: 99%
“…Based on chaotic maps, secure remote access control methods are introduced in [81] and [82]. However, chaotic map based protocols are susceptible to stolen smartcard, impersonation, identity and password guessing attacks [27]. In addition, the approach in [81] cannot withstand side-channel attacks, while the technique in [82] is vulnerable to offline password guessing and impersonation attacks [83].…”
Section: Related Workmentioning
confidence: 99%
“…These attacks can lead to malicious access, data loss and intellectual property infringement [25]. During the development and implementation of TMIS and HIS, privacy and security should be incorporated in early stages [26], [27]. In addition, interoperability between healthcare systems should be assured so that there is efficient exchange of health records between providers [28].…”
Section: Introductionmentioning
confidence: 99%