Loading [MathJax]/extensions/MathMenu.js
Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment | IEEE Journals & Magazine | IEEE Xplore

Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment


Abstract:

Due to the widespread popularity of Internet-enabled devices, Industrial Internet of Things (IIoT) becomes popular in recent years. However, as the smart devices share th...Show More

Abstract:

Due to the widespread popularity of Internet-enabled devices, Industrial Internet of Things (IIoT) becomes popular in recent years. However, as the smart devices share the information with each other using an open channel, i.e., Internet, so security and privacy of the shared information remains a paramount concern. There exist some solutions in the literature for preserving security and privacy in IIoT environment. However, due to their heavy computation and communication overheads, these solutions may not be applicable to wide category of applications in IIoT environment. Hence, in this paper, we propose a new biometric-based privacy preserving user authentication (BP2UA) scheme for cloud-based IIoT deployment. BP2UA consists of strong authentication between users and smart devices using preestablished key agreement between smart devices and the gateway node. The formal security analysis of BP2UA using the well-known real-or-random model is provided to prove its session key security. Moreover, an informal security analysis of BP2UA is also given to show its robustness against various types of known attacks. The computation and communication costs of BP2UA in comparison to the other existing schemes of its category demonstrate its effectiveness in the IIoT environment. Finally, the practical demonstration of BP2UA is also done using the NS2 simulation.
Published in: IEEE Internet of Things Journal ( Volume: 5, Issue: 6, December 2018)
Page(s): 4900 - 4913
Date of Publication: 24 October 2018

ISSN Information:

Funding Agency:

References is not available for this document.

I. Introduction

Internet of Things (IoT) is defined as a system of physical objects (i.e., smart home appliances) that are interconnected for exchanging and collecting information over the Internet. These smart objects are equipped with processing and communication capabilities, and also consists of a locatable Internet protocol address [1]. Industrial IoT (IIoT) is a specific type of IoT, which encompasses of sensors, actuators, and machinery. The objects in IIoT collect and interpret data, and in turn, the collected and analyzed data is used for the real-time intelligent decisions without human intervention. Specifically, in the manufacturing industries, IIoT optimizes assets and production processes by adding connectivity and intelligence to different tools, conveyor belts and shop-floors, and it provides the connected wearables to the working personnel in the factory [2], [3].

Select All
1.
S. Challa et al., "Secure signature-based authenticated key establishment scheme for future IoT applications", IEEE Access, vol. 5, pp. 3028-3043, 2017.
2.
S. Rao and R. Shorey, "Efficient device-to-device association and data aggregation in industrial IoT systems", Proc. 9th Int. Conf. Commun. Syst. Netw. (COMSNETS), pp. 314-321, 2017.
3.
L. D. Xu, W. He and S. Li, "Internet of Things in industries: A survey", IEEE Trans. Ind. Informat., vol. 10, no. 4, pp. 2233-2243, Nov. 2014.
4.
F. Z. Berrehili and A. Belmekki, "Privacy preservation in the Internet of Things", Proc. Adv. Ubiquitous Netw. (UNet), pp. 163-175, 2017.
5.
T. Song et al., "A privacy preserving communication protocol for IoT applications in smart homes", IEEE Internet Things J., vol. 4, no. 6, pp. 1844-1852, Dec. 2017.
6.
T. H. Szymanski, "Strengthening security and privacy in an ultra-dense green 5G radio access network for the industrial and tactile Internet of Things", Proc. 13th Int. Wireless Commun. Mobile Comput. Conf. (IWCMC), pp. 415-422, 2017.
7.
A. T. B. Jin, D. N. C. Ling and A. Goh, "Biohashing: Two factor authentication featuring fingerprint data and tokenised random number", Pattern Recognit., vol. 37, no. 11, pp. 2245-2255, 2004.
8.
Y. Dodis, L. Reyzin and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data", Proc. Adv. Cryptol. (Eurocrypt), vol. 3027, pp. 523-540, 2004.
9.
I. Bisio, F. Lavagetto, C. Garibotto and A. Sciarrone, "Speaker recognition exploiting D2D communications paradigm: Performance evaluation of multiple observations approaches", Mobile Netw. Appl., vol. 22, no. 6, pp. 1045-1057, 2017.
10.
I. Bisio, C. Garibotto, A. Sciarrone and F. Lavagetto, "Performance analysis of smart audio pre-processing for noise-robust text-independent speaker recognition", Proc. IEEE Glob. Conf. Signal Inf. Process. (GlobalSIP), pp. 848-852, 2017.
11.
I. Bisio, C. Garibotto, A. Grattarola, F. Lavagetto and A. Sciarrone, "Smart and robust speaker recognition for context-aware in-vehicle applications", IEEE Trans. Veh. Technol., vol. 67, no. 9, pp. 8808-8821, Sep. 2018.
12.
K. Xue, P. Hong and C. Ma, "A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture", J. Comput. Syst. Sci., vol. 80, no. 1, pp. 195-206, 2014.
13.
M. Turkanović, B. Brumen and M. Hölbl, "A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks based on the Internet of Things notion", Ad Hoc Netw., vol. 20, pp. 96-112, Sep. 2014.
14.
M. S. Farash, M. Turkanović, S. Kumari and M. Hölbl, "An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment", Ad Hoc Netw., vol. 36, pp. 152-176, Jan. 2016.
15.
R. Amin et al., "Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks", Comput. Netw., vol. 101, pp. 42-62, Jun. 2016.
16.
Q. Jiang, S. Zeadally, J. Ma and D. He, "Lightweight three-factor authentication and key agreement protocol for Internet-integrated wireless sensor networks", IEEE Access, vol. 5, pp. 3376-3392, 2017.
17.
M. O. Rabin, "Digitalized signatures and public-key functions as intractable as factorization", 1979.
18.
R. Amin, N. Kumar, G. P. Biswas, R. Iqbal and V. Chang, "A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment", Future Gener. Comput. Syst., vol. 78, pp. 1005-1019, Jan. 2018.
19.
M. A. Ferrag, L. A. Maglaras, H. Janicke, J. Jiang and L. Shu, "Authentication protocols for Internet of Things: A comprehensive survey", Security Commun. Netw., vol. 2017, 2017.
20.
M. Ma, D. He, N. Kumar, K.-K. R. Choo and J. Chen, "Certificateless searchable public key encryption scheme for industrial Internet of Things", IEEE Trans. Ind. Informat., vol. 14, no. 2, pp. 759-767, Feb. 2018.
21.
M. Bilal and S.-G. Kang, "An authentication protocol for future sensor networks", Sensors, vol. 17, no. 5, pp. 1-29, 2017.
22.
P. C. Kocher, J. Jaffe and B. Jun, "Differential power analysis", Proc. 19th Annu. Int. Cryptol. Conf. (CRYPTO), vol. 1666, pp. 388-397, 1999.
23.
T. S. Messerges, E. A. Dabbish and R. H. Sloan, "Examining smart-card security under the threat of power analysis attacks", IEEE Trans. Comput., vol. 51, no. 5, pp. 541-552, May 2002.
24.
C.-C. Chang and N.-T. Nguyen, "An untraceable biometric-based multi-server authenticated key agreement protocol with revocation", Wireless Pers. Commun., vol. 90, no. 4, pp. 1695-1715, 2016.
25.
V. Odelu, A. K. Das and A. Goswami, "A secure biometrics-based multi-server authentication protocol using smart cards", IEEE Trans. Inf. Forensics Security, vol. 10, no. 9, pp. 1953-1966, Sep. 2015.
26.
M. Wazid, A. K. Das, N. Kumar and J. J. P. C. Rodrigues, "Secure three-factor user authentication scheme for renewable-energy-based smart grid environment", IEEE Trans. Ind. Informat., vol. 13, no. 6, pp. 3144-3153, Dec. 2017.
27.
M. Wazid, A. K. Das, N. Kumar, M. Conti and A. V. Vasilakos, "A novel authentication and key agreement scheme for implantable medical devices deployment", IEEE J. Biomed. Health Inform., vol. 22, no. 4, pp. 1299-1309, Jul. 2018.
28.
S. Roy et al., "Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things", IEEE Internet Things J., vol. 5, no. 4, pp. 2884-2895, Aug. 2018.
29.
D. Dolev and A. C. Yao, "On the security of public key protocols", IEEE Trans. Inf. Theory, vol. IT-29, no. 2, pp. 198-208, Mar. 1983.
30.
M. Abdalla, P. A. Fouque and D. Pointcheval, "Password-based authenticated key exchange in the three-party setting", Proc. 8th Int. Workshop Theory Pract. Public Key Cryptography (PKC), vol. 3386, pp. 65-84, 2005.

Contact IEEE to Subscribe

References

References is not available for this document.