Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system

被引:8
作者
Bagga, Palak [1 ]
Mitra, Ankush [1 ]
Das, Ashok Kumar [1 ,2 ]
Vijayakumar, Pandi [3 ]
Park, YoungHo [4 ]
Karuppiah, Marimuthu [5 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[2] Old Dominion Univ, Modeling Anal & Simulat Ctr, Suffolk, VA 23435 USA
[3] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Villupuram 604001, India
[4] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
[5] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Delhi NCR Campus, Ghaziabad 201204, India
基金
新加坡国家研究基金会;
关键词
Internet of Things (IoT); Cloud computing; Access control; Key management; Video surveillance; Security; Testbed experiments; AUTHENTICATION; PROTOCOLS; INTERNET;
D O I
10.1016/j.comcom.2022.08.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a new access control mechanism for video surveillance system based on user's biometrics, which allows to access real-time video surveillance data from deployed Internet of Things (IoT) smart devices. For this purpose, mutual authentication is performed between a user and accessed smart devices via the cloud server(s) and the session keys are then established to make secure communication. The proposed scheme allows accessing real time video and older videos that are in cloud servers, and also user's credential update phase. Through the security analysis, it has been shown that the proposed scheme is robust against a variety of potential passive/active attacks. A detailed comparative study shows the efficacy of the proposed scheme as compared to other existing solutions. Finally, the real testbed experiments have been carried out for secure surveillance system using Raspberry PI devices as IoT devices, user's devices and servers to show its practical application.
引用
收藏
页码:27 / 39
页数:13
相关论文
共 31 条
[1]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[2]   A robust authentication and access control protocol for securing wireless healthcare sensor networks [J].
Ali, Zeeshan ;
Ghani, Anwar ;
Khan, Imran ;
Chaudhry, Shehzad Ashraf ;
Islam, S. K. Hafizul ;
Giri, Debasis .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
[3]  
Alsellami Belal M., 2021, Proceedings of the 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), P1359, DOI 10.1109/ICAIS50930.2021.9396007
[4]   On the design of biometric-based user authentication protocol in smart city environment [J].
Bera, Basudeb ;
Das, Ashok Kumar ;
Balzano, Walter ;
Medaglia, Carlo Maria .
PATTERN RECOGNITION LETTERS, 2020, 138 :439-446
[5]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
[6]   An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks [J].
Chatterjee, Santanu ;
Das, Ashok Kumar .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (09) :1752-1771
[7]   A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems [J].
Chaudhry, Shehzad Ashraf ;
Yahya, Khalid ;
Al-Turjman, Fadi ;
Yang, Ming-Hour .
IEEE ACCESS, 2020, 8 :139244-139254
[8]   Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment [J].
Das, Ashok Kumar ;
Wazid, Mohammad ;
Yannam, Animi Reddy ;
Rodrigues, Joel J. P. C. ;
Park, Youngho .
IEEE ACCESS, 2019, 7 :55382-55397
[9]   Taxonomy and analysis of security protocols for Internet of Things [J].
Das, Ashok Kumar ;
Zeadally, Sherali ;
He, Debiao .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 :110-125
[10]   An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System [J].
Das, Ashok Kumar ;
Bruhadeshwar, Bezawada .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (05)