Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things

Authors
Roy, SandipChatterjee, SantanuDas, Ashok KumarChattopadhyay, SamiranKumari, SaruJo, Minho
Issue Date
8월-2018
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Keywords
Biometrics; Burrows-Abadi-Needham (BAN) logic; chaotic map; crowdsourcing; Internet of Things (IoT); ProVerif 1.93; security; user authentication
Citation
IEEE INTERNET OF THINGS JOURNAL, v.5, no.4, pp.2884 - 2895
Indexed
SCIE
SCOPUS
Journal Title
IEEE INTERNET OF THINGS JOURNAL
Volume
5
Number
4
Start Page
2884
End Page
2895
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/74227
DOI
10.1109/JIOT.2017.2714179
ISSN
2327-4662
Abstract
The recent proliferation of mobile devices, such as smartphones and wearable devices has given rise to crowdsourcing Internet of Things (IoT) applications. E-healthcare service is one of the important services for the crowdsourcing IoT applications that facilitates remote access or storage of medical server data to the authorized users (for example, doctors, patients, and nurses) via wireless communication. As wireless communication is susceptible to various kinds of threats and attacks, remote user authentication is highly essential for a hazard-free use of these services. In this paper, we aim to propose a new secure three-factor user remote user authentication protocol based on the extended chaotic maps. The three factors involved in the proposed scheme are: 1) smart card; 2) password; and 3) personal biometrics. As the proposed scheme avoids computationally expensive elliptic curve point multiplication or modular exponentiation operation, it is lightweight and efficient. The formal security verification using the widely-accepted verification tool, called the ProVerif 1.93, shows that the presented scheme is secure. In addition, we present the formal security analysis using the both widely accepted real-or-random model and Burrows-Abadi-Needham logic. With the combination of high security and appreciably low communication and computational overheads, our scheme is very much practical for battery limited devices for the healthcare applications as compared to other existing related schemes.
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer and Information Science > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jo, Min ho photo

Jo, Min ho
컴퓨터정보학과
Read more

Altmetrics

Total Views & Downloads

BROWSE