Smart City Gnosys

Smart city article details

Title An Efficient Privacy-Preserved Authentication Technique Based On Conformable Fractional Chaotic Map For Tmis Under Smart Homes Environments
ID_Doc 7885
Authors Meshram C.; Obaidat M.S.; Ibrahim R.W.; Meshram S.G.; Raikwar A.V.
Year 2024
Published Journal of Supercomputing, 80, 2
DOI http://dx.doi.org/10.1007/s11227-023-05536-1
Abstract People with special needs can receive health care services in their own homes through the use of smart home systems. In essence, this type of smart home has specialized electronics that allow remote operation of automated remote health care gadgets, enabling patient security and health tracking. These sensors are linked to a local intelligence unit, which examines sensor data, detects emergencies, and serves as the patient’s point of contact with various healthcare professionals such as doctors, paramedics, nurses, and emergency services. Smart homes can improve the patient’s quality of life and security by creatively utilizing cutting-edge technologies. The use of smart homes is being driven by telemedicine and telecare. Telecare Medicine Information Systems (TMIS) were developed 20 years ago and have increased in popularity on a global scale since then as current technology has enabled healthcare to be delivered remotely. Using upgraded network technologies, a new technological platform for TMIS for patients is provided. TMIS, on the other hand, is commonly targeted by various forms of attacks due to data transmission across an insecure channel. Several authentication techniques based on the chaotic map have recently been proposed. Many of these designs, however, are not resistant to the known attacks. Although some of the structures achieve low computation overhead, many of them are unable to guarantee forward secrecy and cannot establish an anonymous conversation. In order to improve security and efficiency, we provide an authentication and key agreement mechanism for TMIS in smart city environments in this study. Fractional chaotic theory assumptions underlie the security assumptions. With just two messages exchanged, a secure session can be started using this approach, which enables forward secrecy. In addition, we compare and contrast related authentication techniques. © 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.
Author Keywords Anonymity; Authentication and key agreement; Conformable fractional chaotic map; Healthcare systems; Security; Smart homes; TMIS


Similar Articles


Id Similarity Authors Title Published
7889 View0.95Meshram C.; Obaidat M.S.; Sadoun B.; Imoize A.L.An Efficient Provably Secure Identity-Based Authentication Technique For Tmis Under A Smart City EnvironmentProceedings of the 2024 IEEE International Conference on Communications, Computing, Cybersecurity and Informatics, CCCI 2024 (2024)
7890 View0.938Yupapin P.; Meshram C.; Barve S.K.; Ibrahim R.W.; Akbar M.A.An Efficient Provably Secure Verifier-Based Authentication Protocol Using Fractional Chaotic Maps In Telecare Medicine Information SystemsSoft Computing, 27, 10 (2023)
13747 View0.903Nofal M.; Elmanfaloty R.A.Chaos-Based Dynamic Authentication For Secure Telehealth In Smart CitiesModelling, 6, 2 (2025)
30157 View0.856Jan A.; Parah S.A.; Malik B.A.Iefhac: Image Encryption Framework Based On Hessenberg Transform And Chaotic Theory For Smart HealthMultimedia Tools and Applications, 81, 13 (2022)
4353 View0.854Meshram, C; Ibrahim, RW; Deng, LZ; Shende, SW; Meshram, SG; Barve, SKA Robust Smart Card And Remote User Password-Based Authentication Protocol Using Extended Chaotic Maps Under Smart Cities EnvironmentSOFT COMPUTING, 25, 15 (2021)