Skip to main content

2020 | OriginalPaper | Buchkapitel

Service Layer Security Architecture for IOT Using Biometric Authentication and Cryptography Technique

verfasst von : Santosh Kumar Sharma, Bonomali Khuntia

Erschienen in: Intelligent Manufacturing and Energy Sustainability

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Data security and authentication mechanism is a very challenging job for smart devices. And more ever, IOT is suffering with login and verification process. Here, in our paper, we have focused on human characteristics-based security system which cannot be pinched easily such as iris, thumb, palm, DNA and voice-based authentication system. Using biometric authentication theory, we have presented that how biometric systems are the boundless computational resources and prospective of flexibility, reliability and cost reduction along with high-security performance resources. To maintain the security of biometric traits over the Internet channel, end user can apply the cryptography algorithm such as ElGamal, MAC Omura, Cramer–Shoup, RSA. As a final point, this paper is contributed for evidencing the strength of integrating the biometric authentication system with cryptography techniques and its application on Internet-based applications. In order to develop strong security, we have proposed an integrated approach of three mechanisms using biometrics, OTP and cryptography. The work is validated for biometrics through AVISPA (SPAN) security tool which is worldwide acceptable for approving the security architecture.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chikouche, N., Cherif, F., Benmohammed, M.: An authentication protocol based on combined RFID-biometric system. IJACS, 62–67 Chikouche, N., Cherif, F., Benmohammed, M.: An authentication protocol based on combined RFID-biometric system. IJACS, 62–67
2.
Zurück zum Zitat Das, A.K., Goswami, A.: A robust anonymous biometric-based remote user authentication scheme using smart cards, pp. 3–19. Elsevier, Amsterdam (2014) Das, A.K., Goswami, A.: A robust anonymous biometric-based remote user authentication scheme using smart cards, pp. 3–19. Elsevier, Amsterdam (2014)
3.
Zurück zum Zitat Reddy, A.G., Das, A.K., Odelu, V. and Yoo, K.Y.: An enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptical curve cryptography. PLOS ONE, 3–10 (2016) Reddy, A.G., Das, A.K., Odelu, V. and Yoo, K.Y.: An enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptical curve cryptography. PLOS ONE, 3–10 (2016)
4.
Zurück zum Zitat Chaudhry, S.A., Mahmood, K., Naqvi, H.: An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography (2015) Chaudhry, S.A., Mahmood, K., Naqvi, H.: An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography (2015)
5.
Zurück zum Zitat Tyagi, N., Wang, J., Wen, K., Zuo, D.: Honey encryption applications implementation of an encryption scheme resilient to brute-force attacks. In: SPRING, pp. 13–05 (2015) Tyagi, N., Wang, J., Wen, K., Zuo, D.: Honey encryption applications implementation of an encryption scheme resilient to brute-force attacks. In: SPRING, pp. 13–05 (2015)
6.
Zurück zum Zitat Murthy, S., Mulchandani, M.: Improving security of honey encryption in database: implementation. In: ICSESD (2017) Murthy, S., Mulchandani, M.: Improving security of honey encryption in database: implementation. In: ICSESD (2017)
7.
Zurück zum Zitat Yin, W., Indulska, J., Zhou, H.: Protecting private data by honey encryption. In: HINDAWI, pp. 21–11 (2017) Yin, W., Indulska, J., Zhou, H.: Protecting private data by honey encryption. In: HINDAWI, pp. 21–11 (2017)
8.
Zurück zum Zitat Jaeger, J., Ristenpart, T.: Honey encryption beyond message recovery security. In: EUROCRYPT, pp. 23–02 (2016) Jaeger, J., Ristenpart, T.: Honey encryption beyond message recovery security. In: EUROCRYPT, pp. 23–02 (2016)
9.
Zurück zum Zitat Gracy, P.L., Venkatesan, D.: An honey encryption based efficient security mechanism for wireless sensor networks. IJPAM (2018) Gracy, P.L., Venkatesan, D.: An honey encryption based efficient security mechanism for wireless sensor networks. IJPAM (2018)
10.
Zurück zum Zitat Sahu, R., Ansari, M.S.: A secure framework for messaging on android devices with honey encryption. IJECS, 09 (2017) Sahu, R., Ansari, M.S.: A secure framework for messaging on android devices with honey encryption. IJECS, 09 (2017)
11.
Zurück zum Zitat Challa, S., Wazid, M., Das, A.K., Kumar, N.: Secure signature-based authenticated key establishment scheme for future IoT applications. In: IEEE, pp. 1–16 (2016) Challa, S., Wazid, M., Das, A.K., Kumar, N.: Secure signature-based authenticated key establishment scheme for future IoT applications. In: IEEE, pp. 1–16 (2016)
12.
Zurück zum Zitat Sain, M., Kang, Y.J., Lee, H.J.: Survey on security in internet of things: state of the art and challenges. In: ICACT, pp. 1–6 (2017) Sain, M., Kang, Y.J., Lee, H.J.: Survey on security in internet of things: state of the art and challenges. In: ICACT, pp. 1–6 (2017)
13.
Zurück zum Zitat Huh, S., Cho, S., Kim, S.: Managing IoT devices using blockchain platform. In: ICACT, pp. 1–4 (2017) Huh, S., Cho, S., Kim, S.: Managing IoT devices using blockchain platform. In: ICACT, pp. 1–4 (2017)
14.
Zurück zum Zitat Zahra, B.F., Abdelhamid, B.: Risk analysis in Internet of things using EBIOS. In: IEEE, pp. 1–7 (2017) Zahra, B.F., Abdelhamid, B.: Risk analysis in Internet of things using EBIOS. In: IEEE, pp. 1–7 (2017)
15.
Zurück zum Zitat Majeed, A.: Internet of things (IoT): a verification framework. In: IEEE, pp. 1–3 (2017) Majeed, A.: Internet of things (IoT): a verification framework. In: IEEE, pp. 1–3 (2017)
16.
Zurück zum Zitat Abels, T., Khanna, R., Midkiff, K.: Future proof IoT: composable semantics, security, QoS and reliability. In: IEEE, pp. 1–4 (2017) Abels, T., Khanna, R., Midkiff, K.: Future proof IoT: composable semantics, security, QoS and reliability. In: IEEE, pp. 1–4 (2017)
17.
Zurück zum Zitat El-Maliki, T., Seigne, J.M.: Efficient security adaptation framework for internet of things. In: IEEE, pp. 1–6 (2016) El-Maliki, T., Seigne, J.M.: Efficient security adaptation framework for internet of things. In: IEEE, pp. 1–6 (2016)
18.
Zurück zum Zitat Mohsin, M., Anwar, Z.: IoTSAT: a formal framework for security analysis of the internet of things (IoT). In: IEEE, pp. 1–9 (2016) Mohsin, M., Anwar, Z.: IoTSAT: a formal framework for security analysis of the internet of things (IoT). In: IEEE, pp. 1–9 (2016)
19.
Zurück zum Zitat Khan, W.Z., Zangoti, H.M., Aalsalem, M.Y.: Mobile RFID in internet of things: security attacks, privacy risks, and countermeasures. In: IEEE, pp. 1–6 (2016) Khan, W.Z., Zangoti, H.M., Aalsalem, M.Y.: Mobile RFID in internet of things: security attacks, privacy risks, and countermeasures. In: IEEE, pp. 1–6 (2016)
20.
Zurück zum Zitat Baldini, G., Le Gall, F.: Security certification and labelling in internet of things. In: ICT, pp. 1–6 (2015); Nawir, M., Amir, A., Yaakob, N.: Internet of things (IoT): taxonomy of security attacks. In: ICED, pp. 1–6 (2016). (Thailand) Baldini, G., Le Gall, F.: Security certification and labelling in internet of things. In: ICT, pp. 1–6 (2015); Nawir, M., Amir, A., Yaakob, N.: Internet of things (IoT): taxonomy of security attacks. In: ICED, pp. 1–6 (2016). (Thailand)
21.
Zurück zum Zitat Sklavos, N., Zaharakis, I.D.: Cryptography and security in internet of things (IoTs): models, schemes, and implementations. In: IEEE, pp. 1–2 (2016) Sklavos, N., Zaharakis, I.D.: Cryptography and security in internet of things (IoTs): models, schemes, and implementations. In: IEEE, pp. 1–2 (2016)
22.
Zurück zum Zitat Abderrahim, O.B., Elhdhili, M.H.: TMCoI-SIOT: a trust management system based on communities of interest for the social internet of things. In: IEEE, pp. 1–6 (2017) Abderrahim, O.B., Elhdhili, M.H.: TMCoI-SIOT: a trust management system based on communities of interest for the social internet of things. In: IEEE, pp. 1–6 (2017)
23.
Zurück zum Zitat Metongnon, L., Ezin, E.C., Sadre, R.: Efficient probing of heterogeneous IoT networks. In: IFIP, pp. 1–7 (2017) Metongnon, L., Ezin, E.C., Sadre, R.: Efficient probing of heterogeneous IoT networks. In: IFIP, pp. 1–7 (2017)
24.
Zurück zum Zitat Abderrahim, O.B., Elhedhili, M.H.: CTMS-SIOT: A context-based trust management system for the social internet of things. In: IEEE, pp. 1–6 (2017) Abderrahim, O.B., Elhedhili, M.H.: CTMS-SIOT: A context-based trust management system for the social internet of things. In: IEEE, pp. 1–6 (2017)
25.
Zurück zum Zitat Zouari, J., Hamdi, M., Kim, T.H.: A privacy-preserving homomorphic encryption scheme for the internet of things. In: IEEE, pp. 1–6 (2017) Zouari, J., Hamdi, M., Kim, T.H.: A privacy-preserving homomorphic encryption scheme for the internet of things. In: IEEE, pp. 1–6 (2017)
26.
Zurück zum Zitat Midi, D., Rullo, A., Mudgerikar, A., Bertino, E.: Kalis—A system for Knowledge-driven adaptable intrusion detection for the internet of things. In: ICDCS, pp. 1–11 (2017) Midi, D., Rullo, A., Mudgerikar, A., Bertino, E.: Kalis—A system for Knowledge-driven adaptable intrusion detection for the internet of things. In: ICDCS, pp. 1–11 (2017)
27.
Zurück zum Zitat Dorsemaine, B., Gaulier, J.P., Wary, J.P., Kheir, N.: A new threat assessment method for integrating an IoT infrastructure in an information system. In: ICDCSW, pp. 1–8 (2017) Dorsemaine, B., Gaulier, J.P., Wary, J.P., Kheir, N.: A new threat assessment method for integrating an IoT infrastructure in an information system. In: ICDCSW, pp. 1–8 (2017)
28.
Zurück zum Zitat Sicari, S., Grieco, L.A., Coen-Porisini, A.: A secure ICN-IoT architecture. In: IEEE, pp. 1–6 (2017); Massonet, P., Deru, L., Achour, A., Dupont, S., Levin, A.: End-to-end security architecture for federated cloud and IoT Networks. IEEE, pp.1–6 (2017) Sicari, S., Grieco, L.A., Coen-Porisini, A.: A secure ICN-IoT architecture. In: IEEE, pp. 1–6 (2017); Massonet, P., Deru, L., Achour, A., Dupont, S., Levin, A.: End-to-end security architecture for federated cloud and IoT Networks. IEEE, pp.1–6 (2017)
29.
Zurück zum Zitat Batool, S., Saqib, N.A., Khan, M.A.: Internet of things data analytics for user authentication and activity recognition. In: FMEC, pp. 1–5 (2017); Jerald, A.V., Rabara, S.A.: Algorithmic approach to security architecture for integrated IoT smart services environment. In: WCCCT, pp. 1–6 (2016) Batool, S., Saqib, N.A., Khan, M.A.: Internet of things data analytics for user authentication and activity recognition. In: FMEC, pp. 1–5 (2017); Jerald, A.V., Rabara, S.A.: Algorithmic approach to security architecture for integrated IoT smart services environment. In: WCCCT, pp. 1–6 (2016)
30.
Zurück zum Zitat Stergiou, C., Psanni, K.E.: Architecture for security monitoring in IOT environments. In: IEEE, pp. 1–4 (2017) Stergiou, C., Psanni, K.E.: Architecture for security monitoring in IOT environments. In: IEEE, pp. 1–4 (2017)
31.
Zurück zum Zitat Nakagawa, I., Shimojo, S.: IoT agent platform mechanism with transparent cloud computing framework for improving IoT security. In: COMPSAC, pp. 1–6 (2017) Nakagawa, I., Shimojo, S.: IoT agent platform mechanism with transparent cloud computing framework for improving IoT security. In: COMPSAC, pp. 1–6 (2017)
32.
Zurück zum Zitat Praveena, A.: Achaqieving data security in wireless sensor networks using ultra encryption standard version—IV algorithm. In: ICIGEHT, pp. 1–5 (2017) Praveena, A.: Achaqieving data security in wireless sensor networks using ultra encryption standard version—IV algorithm. In: ICIGEHT, pp. 1–5 (2017)
33.
Zurück zum Zitat Tellez, M., El-Tawab, S., Heydari, M.H.: IoT security attacks using reverse engineering methods on WSN applications. In: IEEE, pp. 1–6 (2017) Tellez, M., El-Tawab, S., Heydari, M.H.: IoT security attacks using reverse engineering methods on WSN applications. In: IEEE, pp. 1–6 (2017)
34.
Zurück zum Zitat Ahmed, I., Beheshti, B., Khan, Z.A., Ahmad, I.: Security in the internet of things (IoT). In: ITT, pp. 1–7 (2017). (Dubai) Ahmed, I., Beheshti, B., Khan, Z.A., Ahmad, I.: Security in the internet of things (IoT). In: ITT, pp. 1–7 (2017). (Dubai)
35.
Zurück zum Zitat Sowmya, S.N, Kulkarni, N.: Security threats in the application layer in IOT applications. In: I-SMAC, pp. 1–4 (2017) Sowmya, S.N, Kulkarni, N.: Security threats in the application layer in IOT applications. In: I-SMAC, pp. 1–4 (2017)
36.
Zurück zum Zitat Hu, L., Wang, X.: Cooperative jamming for physical layer security enhancement in internet of things. In: IEEE, pp. 1–10 (2018) Hu, L., Wang, X.: Cooperative jamming for physical layer security enhancement in internet of things. In: IEEE, pp. 1–10 (2018)
37.
Zurück zum Zitat Pechetti, S.V., Jindal, A., Bose, R.: Channel-based mapping diversity for enhancing the physical layer security in the internet of things. In: IEEE, pp. 1–6 (2017) Pechetti, S.V., Jindal, A., Bose, R.: Channel-based mapping diversity for enhancing the physical layer security in the internet of things. In: IEEE, pp. 1–6 (2017)
38.
Zurück zum Zitat Burg, A., Chattopadhyay, A., Lam, K.Y.: Wireless communication and security issues for cyber–physical systems and the internet-of-things. In: IEEE, pp. 1–23 (2018) Burg, A., Chattopadhyay, A., Lam, K.Y.: Wireless communication and security issues for cyber–physical systems and the internet-of-things. In: IEEE, pp. 1–23 (2018)
39.
Zurück zum Zitat Atat, R., Ashdown, J., Yi, Y.: A physical layer security scheme for mobile health cyber-physical systems. In: IEEE, pp. 1–15 (2017) Atat, R., Ashdown, J., Yi, Y.: A physical layer security scheme for mobile health cyber-physical systems. In: IEEE, pp. 1–15 (2017)
40.
Zurück zum Zitat Pechetti, S.V., Jindal, A., Bose, R.: Channel based mapping diversity for enhancing the physical layer security in the internet of things. In: IEEE, pp. 1–15 (2017) Pechetti, S.V., Jindal, A., Bose, R.: Channel based mapping diversity for enhancing the physical layer security in the internet of things. In: IEEE, pp. 1–15 (2017)
Metadaten
Titel
Service Layer Security Architecture for IOT Using Biometric Authentication and Cryptography Technique
verfasst von
Santosh Kumar Sharma
Bonomali Khuntia
Copyright-Jahr
2020
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-1616-0_80

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.