Hardware based Two-Factor User Authentication for the Internet of Things

被引:0
|
作者
Gurabi, Mehdi Akbari [1 ]
Alfandi, Omar [1 ]
Bochem, Arne [1 ]
Hogrefe, Dieter [1 ]
机构
[1] Univ Goettingen, Inst Comp Sci, Gottingen, Germany
来源
2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC) | 2018年
关键词
Internet of Things; two-factor authentication; embedded security; public key infrastructure; smart card; wire-less sensor networks; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; SECURITY; CRYPTOGRAPHY; CHALLENGES; PROTOCOL; PRIVACY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the distributed Internet of Things (IoT) architecture, sensors collect data from vehicles, home appliances and office equipment and other environments. Various objects contain the sensor which process data, cooperate and exchange information with other embedded devices and end users in a distributed network. It is important to provide end-to-end communication security and an authentication system to guarantee the security and reliability of the data in such a distributed system. Two-factor authentication is a solution to improve the security level of password-based authentication processes and immunized the system against many attacks. At the same time, the computational and storage overhead of an authentication method also needs to be considered in IoT scenarios. For this reason, many cryptographic schemes are designed especially for the IoT; however, we observe a lack of laboratory hardware test beds and modules, and universal authentication hardware modules. This paper proposes a design and analysis for a hardware module in the IoT which allows the use of two-factor authentication based on smart cards, while taking into consideration the limited processing power and energy reserves of nodes, as well as designing the system with scalability in mind.
引用
收藏
页码:1081 / 1086
页数:6
相关论文
共 50 条
  • [31] DoS-resisting two-factor remote authentication and key exchange scheme with user anonymity for mobile communication
    Li, Rengang
    Zhao, Yaqian
    Li, Xuelei
    Li, Ruyang
    Zhang, Chuang
    Yin, Yunfeng
    INTERNATIONAL SYMPOSIUM ON ARTIFICIAL INTELLIGENCE AND ROBOTICS 2021, 2021, 11884
  • [32] A Two-factor based Remote User Authentication Scheme using ElGamal Cryptosystem
    Soni, Preeti
    Ali, Rifaqat
    Pal, Arup Kumar
    IOTSEC'17: PROCEEDINGS OF THE ACM WORKSHOP ON INTERNET OF THINGS (IOT) SECURITY: ISSUES AND INNOVATIONS, 2017,
  • [33] Two-Factor Dynamic ID-Based Remote User Authentication Scheme
    Huang, Renjun
    Su, Fengfu
    Chen, Yangyi
    PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 373 - 377
  • [34] An anonymous two-factor authentication protocol for IoT-based applications
    Sadri, Mohammad Javad
    Asaar, Maryam Rajabzadeh
    COMPUTER NETWORKS, 2021, 199 (199)
  • [35] A Systematic Security Assessment and Review of Internet of Things in the Context of Authentication
    Saqib, Manasha
    Moon, Ayaz Hassan
    COMPUTERS & SECURITY, 2023, 125
  • [36] A comprehensive survey of authentication methods in Internet-of-Things and its
    Kumar, Ashish
    Saha, Rahul
    Conti, Mauro
    Kumar, Gulshan
    Buchanan, William J.
    Kim, Tai Hoon
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 204
  • [37] Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    SENSORS, 2010, 10 (03) : 2450 - 2459
  • [38] Two-Factor User Authentication in Multi-Server Networks
    Li, Chun-Ta
    Weng, Chi-Yao
    Fang, Chun-I
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 261 - 268
  • [39] Improved Two-factor User Authentication in Wireless Sensor Networks
    Vaidya, Binod
    Makrakis, Dimitrios
    Mouftah, Hussein T.
    2010 IEEE 6TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2010, : 600 - 606
  • [40] User Perceptions of Security and Usability of Mobile-Based Single Password Authentication and Two-Factor Authentication
    Isler, Devris
    Kupcu, Alptekin
    Coskun, Aykut
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2019, 11737 : 99 - 117