An efficient two-factor authentication scheme with key agreement for IoT based E-health care application using smart card

被引:28
作者
Karthigaiveni, M. [1 ]
Indrani, B. [2 ]
机构
[1] Yadava Coll, Dept Comp Applicat, Madurai 625014, Tamil Nadu, India
[2] Madurai Kamaraj Univ, Dept Comp Sci, Madurai, Tamil Nadu, India
关键词
Internet of things (IoT); Smart card; Authentication; Password; E-healthcare; Public-key cryptosystem; ECC; Session key; PROTOCOL; SECURE; IMPROVEMENT; CRYPTANALYSIS; ROBUST; ECC;
D O I
10.1007/s12652-019-01513-w
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
IoT plays important role in the field of inter-networked applications, like physical electronic devices, vehicles, automobile applications, software applications, sensors devices, buildings, government offices and defense departments. IoT application provides strong connectivity between inter-connected devices, which shares valuable data through a common channel. Security is one of the most important key issue in any kind of information system. The IoT application is an information process and sharing between large volumes of users. In this situation, we are in the need of an efficient authentication mechanism for providing secure communication between the users. In this chapter, we have proposed a two factor authentication scheme using Elliptic Curve Cryptography with smart card. The proposed authentication is based on two-factor authentication with smart card and password, which provides high security with minimum computational cost. The proposed scheme generates new session key for every new session with fresh time stamp and nonce value. The proposed scheme needs minimum computation cost compared with the related authentication schemes using smart card.
引用
收藏
页数:12
相关论文
共 55 条
[51]   A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems [J].
Xu, Xin ;
Zhu, Ping ;
Wen, Qiaoyan ;
Jin, Zhengping ;
Zhang, Hua ;
He, Lian .
JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (01)
[52]   Security improvement on an anonymous key agreement protocol based on chaotic maps [J].
Xue, Kaiping ;
Hong, Peilin .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2012, 17 (07) :2969-2977
[53]   Robust smart card secured authentication scheme on SIP using Elliptic Curve Cryptography [J].
Yeh, Hsiu-Lien ;
Chen, Tien-Ho ;
Shih, Wei-Kuan .
COMPUTER STANDARDS & INTERFACES, 2014, 36 (02) :397-402
[54]   Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme [J].
Zhang, Liping ;
Zhu, Shaohui ;
Tang, Shanyu .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2017, 21 (02) :465-475
[55]   Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials [J].
Zhao, Fengjun ;
Gong, Peng ;
Li, Shuai ;
Li, Mingguan ;
Li, Ping .
NONLINEAR DYNAMICS, 2013, 74 (1-2) :419-427