TY - GEN
T1 - Secured Authentication Scheme for E-Healthcare in SIoT Using ECC and Improved Hash Function
AU - Arpitha, T.
AU - Chouhan, Dharamendra
AU - Shreyas, J.
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024.
PY - 2024
Y1 - 2024
N2 - The convergence of Smart Internet of Things (IoT) and security is a new study topic. In this context, a new IoT trend known as Social IoT (SIoT) was examined for this study. The Social IoT has the advantage of connectivity demonstrated within the network of connected things via the IoT. In Social IoT, a wide range of IoT devices, such as wearables or monitoring sensors, are utilized in e-healthcare applications and the risk of identity theft and impersonation is a significant concern. To address this challenge, we propose a scheme that incorporates multi-factor authentication, elliptic curve cryptography (ECC), and hash functions scheme to provide a robust solution for secure and privacy-preserving authentication. Our system provides privacy protection along with mutual authentication and session key negotiation at a considerably low computational cost (of up to 71.04% compared to other existing techniques).
AB - The convergence of Smart Internet of Things (IoT) and security is a new study topic. In this context, a new IoT trend known as Social IoT (SIoT) was examined for this study. The Social IoT has the advantage of connectivity demonstrated within the network of connected things via the IoT. In Social IoT, a wide range of IoT devices, such as wearables or monitoring sensors, are utilized in e-healthcare applications and the risk of identity theft and impersonation is a significant concern. To address this challenge, we propose a scheme that incorporates multi-factor authentication, elliptic curve cryptography (ECC), and hash functions scheme to provide a robust solution for secure and privacy-preserving authentication. Our system provides privacy protection along with mutual authentication and session key negotiation at a considerably low computational cost (of up to 71.04% compared to other existing techniques).
UR - https://www.scopus.com/pages/publications/85200357045
UR - https://www.scopus.com/pages/publications/85200357045#tab=citedBy
U2 - 10.1007/978-981-97-2614-1_7
DO - 10.1007/978-981-97-2614-1_7
M3 - Conference contribution
AN - SCOPUS:85200357045
SN - 9789819726134
T3 - Lecture Notes in Networks and Systems
SP - 93
EP - 102
BT - Proceedings of 4th International Conference on Frontiers in Computing and Systems - COMSYS 2023
A2 - Kole, Dipak Kumar
A2 - Roy Chowdhury, Shubhajit
A2 - Basu, Subhadip
A2 - Plewczynski, Dariusz
A2 - Bhattacharjee, Debotosh
PB - Springer Science and Business Media Deutschland GmbH
T2 - 4th International Conference on Frontiers in Computing and Systems, COMSYS 2023
Y2 - 16 October 2023 through 17 October 2023
ER -