An efficient two-factor authentication scheme with key agreement for IoT based E-health care application using smart card

被引:23
|
作者
Karthigaiveni, M. [1 ]
Indrani, B. [2 ]
机构
[1] Yadava Coll, Dept Comp Applicat, Madurai 625014, Tamil Nadu, India
[2] Madurai Kamaraj Univ, Dept Comp Sci, Madurai, Tamil Nadu, India
关键词
Internet of things (IoT); Smart card; Authentication; Password; E-healthcare; Public-key cryptosystem; ECC; Session key; PROTOCOL; SECURE; IMPROVEMENT; CRYPTANALYSIS; ROBUST; ECC;
D O I
10.1007/s12652-019-01513-w
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
IoT plays important role in the field of inter-networked applications, like physical electronic devices, vehicles, automobile applications, software applications, sensors devices, buildings, government offices and defense departments. IoT application provides strong connectivity between inter-connected devices, which shares valuable data through a common channel. Security is one of the most important key issue in any kind of information system. The IoT application is an information process and sharing between large volumes of users. In this situation, we are in the need of an efficient authentication mechanism for providing secure communication between the users. In this chapter, we have proposed a two factor authentication scheme using Elliptic Curve Cryptography with smart card. The proposed authentication is based on two-factor authentication with smart card and password, which provides high security with minimum computational cost. The proposed scheme generates new session key for every new session with fresh time stamp and nonce value. The proposed scheme needs minimum computation cost compared with the related authentication schemes using smart card.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree
    Yin, Xinming
    He, Junhui
    Guo, Yi
    Han, Dezhi
    Li, Kuan-Ching
    Castiglione, Arcangelo
    [J]. SENSORS, 2020, 20 (20) : 1 - 19
  • [32] On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Arshad, Hamed
    Teymoori, Vahid
    Nikooghadam, Morteza
    Abbassi, Hassan
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (08)
  • [33] An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks
    Li, Jiping
    Ding, Yaoming
    Xiong, Zenggang
    Liu, Shouyin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (11): : 5556 - 5573
  • [34] Smart Secure and Energy Efficient Scheme for E-Health Applications using IoT: A Review
    Humayun, Mamoona
    Jhanjhi, N. Z.
    Alamri, Malak Z.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (04): : 55 - 72
  • [35] Privacy-Preserving Fast Three-Factor Authentication and Key Agreement for IoT-Based E-Health Systems
    Zhang, Liping
    Zhu, Yue
    Ren, Wei
    Zhang, Yixin
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (02) : 1324 - 1333
  • [36] Two-factor authentication schemes based smart card and password with user anonymity
    Cao, Tianjie
    Huang, Shi
    [J]. Journal of Computational Information Systems, 2013, 9 (21): : 8831 - 8838
  • [37] An Efficient and Secure Two-Factor Password Authentication Scheme With Card Reader(Terminal) Verification
    Xiong, Wanjun
    Zhou, Fan
    Wang, Ruomei
    Lan, Rushi
    Sun, Xiyan
    Luo, Xiaonan
    [J]. IEEE ACCESS, 2018, 6 : 70707 - 70719
  • [38] A secure three-factor-based authentication with key agreement protocol for e-Health clouds
    Yulei Chen
    Jianhua Chen
    [J]. The Journal of Supercomputing, 2021, 77 : 3359 - 3380
  • [39] A secure three-factor-based authentication with key agreement protocol for e-Health clouds
    Chen, Yulei
    Chen, Jianhua
    [J]. JOURNAL OF SUPERCOMPUTING, 2021, 77 (04): : 3359 - 3380
  • [40] A Lightweight and Secure Authentication Scheme for IoT Based E-Health Applications
    Almulhim, Maria
    Islam, Nazurl
    Zaman, Noor
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (01): : 107 - 120