An efficient two-factor authentication scheme with key agreement for IoT based E-health care application using smart card

被引:28
作者
Karthigaiveni, M. [1 ]
Indrani, B. [2 ]
机构
[1] Yadava Coll, Dept Comp Applicat, Madurai 625014, Tamil Nadu, India
[2] Madurai Kamaraj Univ, Dept Comp Sci, Madurai, Tamil Nadu, India
关键词
Internet of things (IoT); Smart card; Authentication; Password; E-healthcare; Public-key cryptosystem; ECC; Session key; PROTOCOL; SECURE; IMPROVEMENT; CRYPTANALYSIS; ROBUST; ECC;
D O I
10.1007/s12652-019-01513-w
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
IoT plays important role in the field of inter-networked applications, like physical electronic devices, vehicles, automobile applications, software applications, sensors devices, buildings, government offices and defense departments. IoT application provides strong connectivity between inter-connected devices, which shares valuable data through a common channel. Security is one of the most important key issue in any kind of information system. The IoT application is an information process and sharing between large volumes of users. In this situation, we are in the need of an efficient authentication mechanism for providing secure communication between the users. In this chapter, we have proposed a two factor authentication scheme using Elliptic Curve Cryptography with smart card. The proposed authentication is based on two-factor authentication with smart card and password, which provides high security with minimum computational cost. The proposed scheme generates new session key for every new session with fresh time stamp and nonce value. The proposed scheme needs minimum computation cost compared with the related authentication schemes using smart card.
引用
收藏
页数:12
相关论文
共 55 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]  
[Anonymous], 2015, INT THINGS GLOB STAN
[3]  
[Anonymous], 2016, Who Needs the Internet of Things?
[4]  
[Anonymous], 2016, Harvard Business Review
[5]  
[Anonymous], 2005, SEQUENCES GAMES TOOL
[6]  
Bellare M., 1993, P ANN INT CRYPT C, P232, DOI DOI 10.1007/3-540-48329-2_21
[7]   Generic groups, collision resistance, and ECDSA [J].
Brown, DRL .
DESIGNS CODES AND CRYPTOGRAPHY, 2005, 35 (01) :119-152
[8]   A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks [J].
Chang, Chin-Chen ;
Le, Hai-Duong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :357-366
[9]   Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems [J].
Chaudhry, Shehzad Ashraf ;
Naqvi, Husnain ;
Shon, Taeshik ;
Sher, Muhammad ;
Farash, Mohammad Sabzinejad .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (06)
[10]   Robust smart-card-based remote user password authentication scheme [J].
Chen, Bae-Ling ;
Kuo, Wen-Chung ;
Wuu, Lih-Chyau .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (02) :377-389