An efficient two-factor authentication scheme with key agreement for IoT based E-health care application using smart card

被引:23
|
作者
Karthigaiveni, M. [1 ]
Indrani, B. [2 ]
机构
[1] Yadava Coll, Dept Comp Applicat, Madurai 625014, Tamil Nadu, India
[2] Madurai Kamaraj Univ, Dept Comp Sci, Madurai, Tamil Nadu, India
关键词
Internet of things (IoT); Smart card; Authentication; Password; E-healthcare; Public-key cryptosystem; ECC; Session key; PROTOCOL; SECURE; IMPROVEMENT; CRYPTANALYSIS; ROBUST; ECC;
D O I
10.1007/s12652-019-01513-w
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
IoT plays important role in the field of inter-networked applications, like physical electronic devices, vehicles, automobile applications, software applications, sensors devices, buildings, government offices and defense departments. IoT application provides strong connectivity between inter-connected devices, which shares valuable data through a common channel. Security is one of the most important key issue in any kind of information system. The IoT application is an information process and sharing between large volumes of users. In this situation, we are in the need of an efficient authentication mechanism for providing secure communication between the users. In this chapter, we have proposed a two factor authentication scheme using Elliptic Curve Cryptography with smart card. The proposed authentication is based on two-factor authentication with smart card and password, which provides high security with minimum computational cost. The proposed scheme generates new session key for every new session with fresh time stamp and nonce value. The proposed scheme needs minimum computation cost compared with the related authentication schemes using smart card.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications
    Xiong Li
    Jianwei Niu
    Marimuthu Karuppiah
    Saru Kumari
    Fan Wu
    [J]. Journal of Medical Systems, 2016, 40
  • [2] Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications
    Li, Xiong
    Niu, Jianwei
    Karuppiah, Marimuthu
    Kumari, Saru
    Wu, Fan
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (12)
  • [3] A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card
    Ziauddin, Sheikh
    [J]. SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 209 - 216
  • [4] Efficient Two-Factor Authentication Protocol Using Password and Smart Card
    Liu, Fenghua
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (12) : 3257 - 3263
  • [5] A Smart Card-Based Two-Factor Mutual Authentication Scheme for Efficient Deployment of an IoT-Based Telecare Medical Information System
    Khan, Muhammad Asghar
    Alhakami, Hosam
    Alhakami, Wajdi
    Shvetsov, Alexey V.
    Ullah, Insaf
    [J]. SENSORS, 2023, 23 (12)
  • [6] Efficient password mutual authentication scheme with session key agreement using smart card
    Shohaimay, Fairuz
    Ismail, Eddie Shahril
    [J]. 6TH IEEE INTERNATIONAL CONFERENCE ON RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2021,
  • [7] An Efficient Two-Factor Remote User Authentication and Session Key Agreement Scheme Using Rabin Cryptosystem
    Chandrakar, Preeti
    Om, Hari
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (02) : 661 - 673
  • [8] An Efficient Two-Factor Remote User Authentication and Session Key Agreement Scheme Using Rabin Cryptosystem
    Preeti Chandrakar
    Hari Om
    [J]. Arabian Journal for Science and Engineering, 2018, 43 : 661 - 673
  • [9] Design of a lightweight two-factor authentication scheme with smart card revocation
    Mishra, Dheerendra
    Chaturvedi, Ankita
    Mukhopadhyay, Sourav
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 23 : 44 - 53
  • [10] An efficient authentication and key agreement scheme for e-health applications in the context of internet of things
    Khemissa H.
    Tandjaoui D.
    Bouzefrane S.
    [J]. International Journal of Information and Computer Security, 2019, 11 (4-5) : 355 - 390