2022
DOI: 10.1155/2022/9273662
|View full text |Cite|
|
Sign up to set email alerts
|

Dependable and Provable Secure Two-Factor Mutual Authentication Scheme Using ECC for IoT-Based Telecare Medical Information System

Abstract: With the recent tremendous growth in technology, the Internet of Things (IoT) Telecare Medicine Information System (TMIS) is the most widely used medical information system with prominent achievements. Authentication schemes, which use Smart cards, offer the best solution for TMIS applications that in turn provide efficiency and security. Furthermore, authentication schemes that combine passwords and smart cards are considered to be an effective solution for the two-factor authentication scheme. Such schemes c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 52 publications
0
12
0
Order By: Relevance
“…Often it comprises two separate components; namely, a smart card and a card reader, where the former includes an integrated secure chipset while the former includes a keypad and a screen. Since its introduction in [8], there have been numerous protocols for smart card-based 2FA (e.g., in [14,33,27]) along with a few works that identify vulnerabilities of existing solutions, e.g., in [31,32,10]. However, the existing smart card-based solutions (e.g., in [14,33,27]) are often based on public-key cryptography which imposes a high computation cost and makes the card reader's battery run out relatively fast; also some solutions (e.g., in [19]) rely on tamper-proof secure chipsets embedded in the card which would ultimately increase the device's cost.…”
Section: Variants Of Otp Hardware Tokensmentioning
confidence: 99%
“…Often it comprises two separate components; namely, a smart card and a card reader, where the former includes an integrated secure chipset while the former includes a keypad and a screen. Since its introduction in [8], there have been numerous protocols for smart card-based 2FA (e.g., in [14,33,27]) along with a few works that identify vulnerabilities of existing solutions, e.g., in [31,32,10]. However, the existing smart card-based solutions (e.g., in [14,33,27]) are often based on public-key cryptography which imposes a high computation cost and makes the card reader's battery run out relatively fast; also some solutions (e.g., in [19]) rely on tamper-proof secure chipsets embedded in the card which would ultimately increase the device's cost.…”
Section: Variants Of Otp Hardware Tokensmentioning
confidence: 99%
“…Xie et al [ 10 ] presented a novel authentication protocol for TMIS in 2014, which is considered to be pragmatic and secure. Radhakrishnan and Muniyandi [ 11 ] submitted a two-factor key agreement for TMIS based on elliptic curve cryptography (ECC). In 2015, Wang and Zhang [ 12 ] solved the anonymity of authentication in WBAN using bilinear pairs, and their scheme could defend against known-key attacks and man-in-middle attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Karthigaiveni and Indrani [20] proposed a 2FA scheme with key agreement using elliptic curve cryptography (ECC) with a smart card and password. Radhakrishnan and Muniyandi [21] show that Karthigaiveni and Indrani [20] scheme has security flaws such as offline password guessing attack and user anonymity. They proposed a 2FA scheme that uses ECC with smart cards, effective, secure, and overcomes security vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%