A lightweight biometrics based remote user authentication scheme for IoT services Source: Journal of Information Security and Applications Volume 34, Part 2, June 2017, Pages 255-270 Authors: Parwinder KaurDhillon , SheetalKalra Speaker: Yao-Zhu Zheng Date: 2019/01/10
Outline Introduction Proposed scheme Experimental results Conclusions
Introduction(1/4) IoT Authentication Biometrics
Introduction(2/4) IoT
Introduction(3/4) Authentication
Introduction(4/4) Biometrics Universal Distinctive Persistent Collectable
Proposed scheme (1/7) User registration phase Login phase Authentication phase Password change phase
Proposed scheme (2/7)
Proposed scheme (3/7) User registration phase Select IDi, PWi
Proposed scheme (4/7) User registration phase
Proposed scheme (5/7) Login phase MPi* = H(ri||PWi*) MBi* = h(ri||Bi*)
Proposed scheme (6/7) Authentication phase zi* = fi ⊕ xi* Qi = H(yi*||zi*||Xgu||TS1) ) Vi =H( H((ei ⊕xi)||zi||Xgu||TS1)||TS1||TS2||TS3)
Proposed scheme (7/7) Password change phase
Experimental results(1/3) Th : Cryptographic one-way hash function TD/E : Symmetric key decryption/encryption algorithm
Experimental results (2/3)
Experimental results (3/3) Y An Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards BioMed Res Int, 2012 (2012) L Chen, F Wei, C Ma A secure user authentication scheme against smart-card loss attack for wireless sensor networks using symmetric key techniques Int J Distrib Sensor Netw, 2015 (2015), pp. 63-73 AK Das, A Goswami A robust anonymous biometric-based remote user authentication scheme using smart cards J King Saud Univ-Comput Inf Sci, 27 (2) (2015), pp. 193-210 M Turkanović, B Brumen, M Hölbl A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion Ad Hoc Netw, 20 (2014), pp. 96-112 D He, Y Gao, S Chan, C Chen, J Bu An enhanced two-factor user authentication scheme in wireless sensor networks Ad Hoc Sensor Wireless Netw, 10 (4) (2010), pp. 361-371 K Xue, C Ma, P Hong, R Ding A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks J Netw Comput Appl, 36 (1) (2013), pp. 316-323
Conclusions The proposed protocol is lightweight, making the protocol highly suitable for the resource constrained devices in IoT.