Hardware based Two-Factor User Authentication for the Internet of Things

被引:0
|
作者
Gurabi, Mehdi Akbari [1 ]
Alfandi, Omar [1 ]
Bochem, Arne [1 ]
Hogrefe, Dieter [1 ]
机构
[1] Univ Goettingen, Inst Comp Sci, Gottingen, Germany
来源
2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC) | 2018年
关键词
Internet of Things; two-factor authentication; embedded security; public key infrastructure; smart card; wire-less sensor networks; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; SECURITY; CRYPTOGRAPHY; CHALLENGES; PROTOCOL; PRIVACY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the distributed Internet of Things (IoT) architecture, sensors collect data from vehicles, home appliances and office equipment and other environments. Various objects contain the sensor which process data, cooperate and exchange information with other embedded devices and end users in a distributed network. It is important to provide end-to-end communication security and an authentication system to guarantee the security and reliability of the data in such a distributed system. Two-factor authentication is a solution to improve the security level of password-based authentication processes and immunized the system against many attacks. At the same time, the computational and storage overhead of an authentication method also needs to be considered in IoT scenarios. For this reason, many cryptographic schemes are designed especially for the IoT; however, we observe a lack of laboratory hardware test beds and modules, and universal authentication hardware modules. This paper proposes a design and analysis for a hardware module in the IoT which allows the use of two-factor authentication based on smart cards, while taking into consideration the limited processing power and energy reserves of nodes, as well as designing the system with scalability in mind.
引用
收藏
页码:1081 / 1086
页数:6
相关论文
共 50 条
  • [21] RSA Based Two-Factor Remote User Authentication Scheme with User Anonymity
    Chandrakar, Preeti
    Om, Hari
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2015, 70 : 318 - 324
  • [22] On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
    Wang, Ding
    Wang, Ping
    COMPUTER NETWORKS, 2014, 73 : 41 - 57
  • [23] FeRHA: Fuzzy-Extractor-Based RF and Hardware Fingerprinting Two-Factor Authentication
    Alkanhal, Mona
    Younis, Mohamed
    Alali, Abdulaziz
    Mehjabin, Suhee Sanjana
    APPLIED SCIENCES-BASEL, 2024, 14 (08):
  • [24] An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    Qi Jiang
    Jianfeng Ma
    Xiang Lu
    Youliang Tian
    Peer-to-Peer Networking and Applications, 2015, 8 : 1070 - 1081
  • [25] A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS
    Li, Chun-Ta
    Lee, Cheng-Chi
    Wang, Lian-Jun
    Liu, Chen-Ju
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (08): : 4821 - 4831
  • [26] Multi Factor User Authentication Mechanism using Internet of things
    Rao, M. Kameswara
    Santhi, S. G.
    Hussain, Md Ali
    PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON ADVANCED INFORMATICS FOR COMPUTING RESEARCH (ICAICR '19), 2019,
  • [27] A Survey of Internet of Things (IoT) Authentication Schemes
    El-hajj, Mohammed
    Fadlallah, Ahmad
    Chamoun, Maroun
    Serhrouchni, Ahmed
    SENSORS, 2019, 19 (05)
  • [28] Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography
    Zhang, Liping
    Tang, Shanyu
    Chen, Jing
    Zhu, Shaohui
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 81 (01) : 53 - 75
  • [29] Two-Factor User Authentication in Wireless Sensor Networks
    Das, Manik Lal
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) : 1086 - 1090
  • [30] On the Usability of Two-Factor Authentication
    Wang, Ding
    Wang, Ping
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 141 - 150