Hardware based Two-Factor User Authentication for the Internet of Things

被引:0
|
作者
Gurabi, Mehdi Akbari [1 ]
Alfandi, Omar [1 ]
Bochem, Arne [1 ]
Hogrefe, Dieter [1 ]
机构
[1] Univ Goettingen, Inst Comp Sci, Gottingen, Germany
来源
2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC) | 2018年
关键词
Internet of Things; two-factor authentication; embedded security; public key infrastructure; smart card; wire-less sensor networks; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; SECURITY; CRYPTOGRAPHY; CHALLENGES; PROTOCOL; PRIVACY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the distributed Internet of Things (IoT) architecture, sensors collect data from vehicles, home appliances and office equipment and other environments. Various objects contain the sensor which process data, cooperate and exchange information with other embedded devices and end users in a distributed network. It is important to provide end-to-end communication security and an authentication system to guarantee the security and reliability of the data in such a distributed system. Two-factor authentication is a solution to improve the security level of password-based authentication processes and immunized the system against many attacks. At the same time, the computational and storage overhead of an authentication method also needs to be considered in IoT scenarios. For this reason, many cryptographic schemes are designed especially for the IoT; however, we observe a lack of laboratory hardware test beds and modules, and universal authentication hardware modules. This paper proposes a design and analysis for a hardware module in the IoT which allows the use of two-factor authentication based on smart cards, while taking into consideration the limited processing power and energy reserves of nodes, as well as designing the system with scalability in mind.
引用
收藏
页码:1081 / 1086
页数:6
相关论文
共 50 条
  • [41] Encryption with User Authentication Model for Internet of Medical Things Environment
    Riya, K. S.
    Surendran, R.
    Romero, Carlos Andres Tavera
    Sendil, M. Sadish
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 35 (01): : 507 - 520
  • [42] Cryptanalysis and Improvement of A Mutual User Authentication Scheme for the Internet of Things
    Limbasiya, Trupil
    Karati, Arijit
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 168 - 173
  • [43] Improvement of a User Authentication Scheme for Wireless Sensor Networks Based on Internet of Things Security
    Jabbari, A.
    Mohasefi, J. B.
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (03) : 2565 - 2591
  • [44] Two-Factor User Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem
    Qu, Juan
    Tan, Xiao-Ling
    JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2014, 2014
  • [45] Two-factor authentication using biometric based quantum operations
    Sharma, Mohit Kr
    Nene, Manisha J.
    SECURITY AND PRIVACY, 2020, 3 (03)
  • [46] Two-Factor Authentication Based on Acoustic Fingerprinting in Modulation Domain
    Ren, Yanzhi
    Yang, Tingyuan
    Zhou, Yufei
    Liu, Hongbo
    Yu, Jiadi
    Yang, Haomiao
    Li, Hongwei
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2025, 24 (05) : 4235 - 4247
  • [47] Two-factor mutual authentication based on smart cards and passwords
    Yang, Guomin
    Wong, Duncan S.
    Wang, Huaxiong
    Deng, Xiaotie
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2008, 74 (07) : 1160 - 1172
  • [48] Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography
    Liping Zhang
    Shanyu Tang
    Jing Chen
    Shaohui Zhu
    Wireless Personal Communications, 2015, 81 : 53 - 75
  • [49] A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2017, 8 (01) : 101 - 116
  • [50] Secure Real-time Data Access Using Two-Factor Authentication Scheme for the Internet of Drones
    Khalid, Haqi
    Hashim, Shaiful Jahari
    Ahamed, Sharifah Mumtazah Syed
    Hashim, Fazirulhisyam
    Chaudhary, Muhammad Akmal
    19TH IEEE STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT (SCORED 2021), 2021, : 168 - 173