Download presentation
Presentation is loading. Please wait.
Published byἸωσήφ Παπαϊωάννου Modified over 5 years ago
1
A lightweight biometrics based remote user authentication scheme for IoT services
Source: Journal of Information Security and Applications Volume 34, Part 2, June 2017, Pages Authors: Parwinder KaurDhillon , SheetalKalra Speaker: Yao-Zhu Zheng Date: 2019/01/10
2
Outline Introduction Proposed scheme Experimental results Conclusions
3
Introduction(1/4) IoT Authentication Biometrics
4
Introduction(2/4) IoT
5
Introduction(3/4) Authentication
6
Introduction(4/4) Biometrics Universal Distinctive Persistent
Collectable
7
Proposed scheme (1/7) User registration phase Login phase
Authentication phase Password change phase
8
Proposed scheme (2/7)
9
Proposed scheme (3/7) User registration phase
Select IDi, PWi
10
Proposed scheme (4/7) User registration phase
11
Proposed scheme (5/7) Login phase
MPi* = H(ri||PWi*) MBi* = h(ri||Bi*)
12
Proposed scheme (6/7) Authentication phase
zi* = fi ⊕ xi* Qi = H(yi*||zi*||Xgu||TS1) ) Vi =H( H((ei ⊕xi)||zi||Xgu||TS1)||TS1||TS2||TS3)
13
Proposed scheme (7/7) Password change phase
14
Experimental results(1/3)
Th : Cryptographic one-way hash function TD/E : Symmetric key decryption/encryption algorithm
15
Experimental results (2/3)
16
Experimental results (3/3)
Y An Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards BioMed Res Int, 2012 (2012) L Chen, F Wei, C Ma A secure user authentication scheme against smart-card loss attack for wireless sensor networks using symmetric key techniques Int J Distrib Sensor Netw, 2015 (2015), pp. 63-73 AK Das, A Goswami A robust anonymous biometric-based remote user authentication scheme using smart cards J King Saud Univ-Comput Inf Sci, 27 (2) (2015), pp. M Turkanović, B Brumen, M Hölbl A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion Ad Hoc Netw, 20 (2014), pp. 96-112 D He, Y Gao, S Chan, C Chen, J Bu An enhanced two-factor user authentication scheme in wireless sensor networks Ad Hoc Sensor Wireless Netw, 10 (4) (2010), pp. K Xue, C Ma, P Hong, R Ding A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks J Netw Comput Appl, 36 (1) (2013), pp.
17
Conclusions The proposed protocol is lightweight, making the protocol highly suitable for the resource constrained devices in IoT.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.