extended chaotic maps
Recently Published Documents


TOTAL DOCUMENTS

43
(FIVE YEARS 11)

H-INDEX

13
(FIVE YEARS 2)

2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Yanrong Lu ◽  
Dawei Zhao

Telecare medicine information systems (TMISs) provide e-health services such that patients can access medical resources conveniently and doctors can prescribe treatments rapidly. Authentication is an essential security requirement in TMISs. In particular, the growth of password-based remote patient authenticated key exchange combining extended chaotic maps has enhanced the level of secure communications for TMISs. Recently, Lee suggested an improved random-number-based password-authenticated key exchange (PAKE) using extended chaotic maps and synchronized-clock-based PAKE using extended chaotic maps on Guo and Zhang and Xiao et al.’s PAKE. Unfortunately, we found that the nonce-based scheme of Lee is insecure against known session-specific temporary information and server spoofing attacks. To cope with the aforementioned defects, this study aims to provide a new secure PAKE based on extended chaotic maps with more security functionalities for TMISs. Additionally, we show that the proposed scheme for TMISs provides high security along with low communication cost, computational cost, and a variety of security features.


2021 ◽  
Vol 11 (22) ◽  
pp. 10576
Author(s):  
Tian-Fu Lee ◽  
I-Pin Chang ◽  
Ting-Shun Kung

A healthcare information system allows patients and other users to remotely login to medical services to access health data through the Internet. To protect the privacy of patients and security over the public network, secure communication is required. Therefore, the security of data in transmission has been attracting increasing attention. In recent years, blockchain technology has also attracted more attention. Relevant research has been published at a high rate. Most methods of satisfying relevant security-related regulations use modular and exponential calculation. This study proposes a medical care information preservation mechanism that considers the entire process of data storage in devices from wearable devices to mobile devices to medical center servers. The entire process is protected and complies with HIPAA privacy and security regulations. The proposed scheme uses extended chaotic map technology to develop ID-based key negotiation for wearable devices, and thereby reduces the amount of computing that must be carried out by wearable devices and achieve lightness quantify. It also uses the non-tamperability of the blockchain to ensure that the data have not been tampered with, improving data security. The proposed mechanism can resist a variety of attacks and is computationally lighter than the elliptic curve point multiplication that has been used elsewhere, while retaining its security characteristics.


2021 ◽  
Author(s):  
Chandrashekhar Meshram ◽  
Mohammad S. Obaidat ◽  
Kuei-Fang Hsiao ◽  
Agbotiname Lucky Imoize ◽  
Akshaykumar Meshram

2021 ◽  
Author(s):  
Chandrashekhar Meshram ◽  
Rabha W. Ibrahim ◽  
Lunzhi Deng ◽  
Shailendra W. Shende ◽  
Sarita Gajbhiye Meshram ◽  
...  

2020 ◽  
pp. 1-9
Author(s):  
Chandrashekhar Meshram ◽  
Mohammad S. Obaidat ◽  
Jitendra V. Tembhurne ◽  
Shailendra W. Shende ◽  
Kailash W. Kalare ◽  
...  

2019 ◽  
Vol 29 (09) ◽  
pp. 1950118 ◽  
Author(s):  
Yuling Luo ◽  
Yunqi Liu ◽  
Junxiu Liu ◽  
Xue Ouyang ◽  
Yi Cao ◽  
...  

As a basic and crucial security requirement for Wireless Sensor Networks (WSNs), authentication is generally used to prevent various communication attacks such as Denial-of-Service (DoS) attack. A novel broadcast authentication framework is proposed in this paper, where an Identity-Based Signature scheme by using the Extended Chaotic Maps (ECM-IBS) is designed to authenticate all broadcast messages and specifically, a chaos-based hash function is used for message authentication in the WSNs. It is implemented using a WSN hardware device of CC2530 and its performance is analyzed under various methods. Performance analysis and experimental results show that the proposed ECM-IBS scheme has a quick signature generation speed, low energy consumption and short verification delay, and can be applied to WSN applications.


Sign in / Sign up

Export Citation Format

Share Document