An efficient two-factor authentication scheme with key agreement for IoT based E-health care application using smart card

被引:28
作者
Karthigaiveni, M. [1 ]
Indrani, B. [2 ]
机构
[1] Yadava Coll, Dept Comp Applicat, Madurai 625014, Tamil Nadu, India
[2] Madurai Kamaraj Univ, Dept Comp Sci, Madurai, Tamil Nadu, India
关键词
Internet of things (IoT); Smart card; Authentication; Password; E-healthcare; Public-key cryptosystem; ECC; Session key; PROTOCOL; SECURE; IMPROVEMENT; CRYPTANALYSIS; ROBUST; ECC;
D O I
10.1007/s12652-019-01513-w
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
IoT plays important role in the field of inter-networked applications, like physical electronic devices, vehicles, automobile applications, software applications, sensors devices, buildings, government offices and defense departments. IoT application provides strong connectivity between inter-connected devices, which shares valuable data through a common channel. Security is one of the most important key issue in any kind of information system. The IoT application is an information process and sharing between large volumes of users. In this situation, we are in the need of an efficient authentication mechanism for providing secure communication between the users. In this chapter, we have proposed a two factor authentication scheme using Elliptic Curve Cryptography with smart card. The proposed authentication is based on two-factor authentication with smart card and password, which provides high security with minimum computational cost. The proposed scheme generates new session key for every new session with fresh time stamp and nonce value. The proposed scheme needs minimum computation cost compared with the related authentication schemes using smart card.
引用
收藏
页数:12
相关论文
共 55 条
[41]  
Secure Hash Standard, 2005, 1801 FIPS PUB NIST U
[42]   Advanced smart card based password authentication protocol [J].
Song, Ronggong .
COMPUTER STANDARDS & INTERFACES, 2010, 32 (5-6) :321-325
[43]   Improvements of Juang et al.'s Pas sword-Authenticated Key Agreement Scheme Using Smart Cards [J].
Sun, Da-Zhi ;
Huai, Jin-Peng ;
Sun, Ji-Zhou ;
Li, Jian-Xin ;
Zhang, Jia-Wan ;
Feng, Zhi-Yong .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2009, 56 (06) :2284-2291
[44]   A provable authenticated group key agreement protocol for mobile environment [J].
Sun, Hung-Min ;
He, Bing-Zhe ;
Chen, Chien-Ming ;
Wu, Tsu-Yang ;
Lin, Chia-Hsien ;
Wang, Huaxiong .
INFORMATION SCIENCES, 2015, 321 :224-237
[45]   Disassembly-oriented assessment methodology for product modularity [J].
Tseng, Hwai-En ;
Chang, Chien-Chen ;
Cheng, Chih-Jen .
INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2010, 48 (14) :4297-4320
[46]  
Vanstone Scott., 1992, Communications of the ACM, V35, P50
[47]  
Vermesan O, 2013, RIVER PUBL SER COMM, P7
[48]   Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS [J].
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumari, Saru ;
Li, Xiong ;
Wu, Fan .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) :1983-2001
[49]   An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System [J].
Wu, Shuhua ;
Chen, Kefei .
JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (04) :2325-2337
[50]   Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card [J].
Xie, Qi ;
Hu, Bin ;
Wu, Ting .
NONLINEAR DYNAMICS, 2015, 79 (04) :2345-2358