Skip to main content

2019 | OriginalPaper | Buchkapitel

A Biometric-Based IoT Device Identity Authentication Scheme

verfasst von : Qingshui Xue, Xingzhong Ju, Haozhi Zhu, Haojin Zhu, Fengying Li, Xiangwei Zheng

Erschienen in: Artificial Intelligence for Communications and Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

IoT is an important part of the new generation of information technologies and the next big thing in the IT industry after the computer and the internet. The IoT has great development potential and a wide range of possible applications, especially commercial applications. And information security of the IoT is the key to the long-term development of the whole industry. Currently, the two most significant factors in the development of the IoT are user identity authentication and privacy protection. This paper contains an analysis on the current picture of inter-device user identity authentication in the IoT and proposes an inter-device biometric authentication solution for the IoT that’s designed to work with larger devices, addressing the shortcomings of the traditional user identity authentication technologies including security and efficiency problems. A strategy for further solution optimization is also included. This paper elaborates on the specific process of user identity authentication carried out by users on devices and between devices making use of fingerprints. We’ll demonstrate the security of this solution against existing attack methods and in the last part, we enumerate various possible applications of this solution in smart homes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chuankun, W.: An overview on the security techniques and challenges of the Internet of things. J. Cryptologic Res. 2(1), 40–53 (2015) Chuankun, W.: An overview on the security techniques and challenges of the Internet of things. J. Cryptologic Res. 2(1), 40–53 (2015)
2.
Zurück zum Zitat Ke, J., Zhou, P., Jing, X.: Mixed parameters of differential and weighted mel cepstrum used in speaker recognition. Microelectronics Comput. 31(9), 89–91 (2014) Ke, J., Zhou, P., Jing, X.: Mixed parameters of differential and weighted mel cepstrum used in speaker recognition. Microelectronics Comput. 31(9), 89–91 (2014)
3.
Zurück zum Zitat Lin, W., Wang, X.: One-time password authentication protocol based on non-homogeneous linear equations. Comput. Eng. 36(13), 154–155 (2010) Lin, W., Wang, X.: One-time password authentication protocol based on non-homogeneous linear equations. Comput. Eng. 36(13), 154–155 (2010)
4.
Zurück zum Zitat Zhang, M., Ma, Z., Zhang, X., Gao, F.: An identity authentication scheme on IoT. Designing Tech. Posts Telecommun. 19–22 (2017) Zhang, M., Ma, Z., Zhang, X., Gao, F.: An identity authentication scheme on IoT. Designing Tech. Posts Telecommun. 19–22 (2017)
5.
Zurück zum Zitat Wang, A., Guo, Y., Wang, X.: An introduction to identification and authentication technology. Comput. Appl. Softw. (2002) Wang, A., Guo, Y., Wang, X.: An introduction to identification and authentication technology. Comput. Appl. Softw. (2002)
8.
Zurück zum Zitat Chuankun, W.: Security Fundamentals for Internet of Things. Science Press, Beijing (2013) Chuankun, W.: Security Fundamentals for Internet of Things. Science Press, Beijing (2013)
10.
Zurück zum Zitat Lee, S., Ong, I., Lim, H., et al.: Two factor authentication for cloud computing. J. Inf. Commun. Convergence Eng. 8(4), 427–432 (2010)CrossRef Lee, S., Ong, I., Lim, H., et al.: Two factor authentication for cloud computing. J. Inf. Commun. Convergence Eng. 8(4), 427–432 (2010)CrossRef
11.
Zurück zum Zitat Yuan, J., Jiang, C.: A biometric-based user authentication for wireless sensor networks. Wuhan Univ. J. Nat. Sci. 15(3), 272–276 (2010)CrossRef Yuan, J., Jiang, C.: A biometric-based user authentication for wireless sensor networks. Wuhan Univ. J. Nat. Sci. 15(3), 272–276 (2010)CrossRef
12.
Zurück zum Zitat Das, A.K., Chatterjee, S., Sing, J.K.: Formal security verification of a dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Commun. Comput. Inf. Sci. 2(1), 78–102 (2013) Das, A.K., Chatterjee, S., Sing, J.K.: Formal security verification of a dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Commun. Comput. Inf. Sci. 2(1), 78–102 (2013)
13.
Zurück zum Zitat Periaswamy, S.C.G., Thompson, D.R., Di, J.: Fingerprinting RFID tags. IEEE Trans. Dependable and Secure Comput. 8(6), 938–943 (2011)CrossRef Periaswamy, S.C.G., Thompson, D.R., Di, J.: Fingerprinting RFID tags. IEEE Trans. Dependable and Secure Comput. 8(6), 938–943 (2011)CrossRef
14.
Zurück zum Zitat Ai, Y.X., Mei, L.X.: Security characteristic and technology in the Internet of Things. Network Secur. Technol. Appl. 30(4), 20–29 (2013)MathSciNet Ai, Y.X., Mei, L.X.: Security characteristic and technology in the Internet of Things. Network Secur. Technol. Appl. 30(4), 20–29 (2013)MathSciNet
15.
Zurück zum Zitat National Internet Emergency Response Center: China Internet Network Security Report 2016. People’s Posts and Telecommunications Publishing House, Beijing (2017) National Internet Emergency Response Center: China Internet Network Security Report 2016. People’s Posts and Telecommunications Publishing House, Beijing (2017)
16.
Zurück zum Zitat Bertino, E., Islam, N.: Botnets and Internet of Things security. Computer 50(2), 76–79 (2017)CrossRef Bertino, E., Islam, N.: Botnets and Internet of Things security. Computer 50(2), 76–79 (2017)CrossRef
17.
Zurück zum Zitat Zhang, N., Zang, Y.-L., Tian, J.: The integration of biometrics and cryptography—a new solution for secure identity authentication. J. Cryptologic Res. 2, 159–176 (2015) Zhang, N., Zang, Y.-L., Tian, J.: The integration of biometrics and cryptography—a new solution for secure identity authentication. J. Cryptologic Res. 2, 159–176 (2015)
18.
Zurück zum Zitat Long, W., Sun, D.: Research on security and user privacy of biometric authentication solution. Secret Sci. Technol. (2014) Long, W., Sun, D.: Research on security and user privacy of biometric authentication solution. Secret Sci. Technol. (2014)
19.
Zurück zum Zitat Li, C., Xin, Y., Niu, X., et al.: Identity authentication scheme based on biometric certificate. Comput. Eng. 33(20), 165–167 (2007) Li, C., Xin, Y., Niu, X., et al.: Identity authentication scheme based on biometric certificate. Comput. Eng. 33(20), 165–167 (2007)
20.
Zurück zum Zitat Xiao, W.U., Jian-Ping, Z., Chu-Hua, L., et al.: Application of Internet of Things in smart home. Internet Things Technol. (2012) Xiao, W.U., Jian-Ping, Z., Chu-Hua, L., et al.: Application of Internet of Things in smart home. Internet Things Technol. (2012)
Metadaten
Titel
A Biometric-Based IoT Device Identity Authentication Scheme
verfasst von
Qingshui Xue
Xingzhong Ju
Haozhi Zhu
Haojin Zhu
Fengying Li
Xiangwei Zheng
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-22971-9_12