Privacy-Preserving Implicit Authentication Protocol Using Cosine Similarity for Internet of Things

被引:40
作者
Wei, Fushan [1 ,2 ]
Vijayakumar, Pandi [3 ]
Kumar, Neeraj [4 ,5 ,6 ,7 ]
Zhang, Ruijie [1 ,2 ]
Cheng, Qingfeng [1 ,2 ]
机构
[1] Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
[3] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Tindivanam 604001, India
[4] Deemed Univ, Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[5] Univ Petr & Energy Studies, Sch Comp Sci, Dehra Dun 248007, Uttarakhand, India
[6] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[7] King Abdulaziz Univ, Dept Comp & Informat, Jeddah, Saudi Arabia
基金
中国国家自然科学基金;
关键词
Authentication; Protocols; Servers; Privacy; Internet of Things; Biometrics (access control); Additive homomorphic encryption scheme; behavior features; implicit authentication; privacy protection;
D O I
10.1109/JIOT.2020.3031486
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things provides complicated value-added services to mobile intelligent terminal users. Different sensors collect various data from the users and transmit the data to the mobile intelligent terminal for storage. Consequently, a great amount of personal and sensitive information related to these rich and colorful applications is stored in the mobile intelligent terminal. Mobile intelligent terminals have become the prominent target of network attackers. Security breach and privacy leakage severely thread the application development of the Internet of Things. We present a privacy-preserving implicit authentication framework using users' behavior features sensed by the mobile intelligent terminal based on the artificial intelligence methodology. More precisely, we first summarize the security and privacy requirements for the security authentication of the mobile intelligent terminal. Then, we present a privacy-preserving implicit authentication framework using the cosine similarity and partial homomorphic public-key encryption scheme. Finally, a performance evaluation of the proposed protocol is conducted. The result shows that the communication and computation efficiency of our protocol is more efficient than other related protocols.
引用
收藏
页码:5599 / 5606
页数:8
相关论文
共 26 条
  • [1] [Anonymous], 2018, TECHNIQUE REPORT TAL
  • [2] The impact of application context on privacy and performance of keystroke authentication systems
    Balagani, Kiran S.
    Gasti, Paolo
    Elliott, Aaron
    Richardson, Azriel
    O'Neal, Mike
    [J]. JOURNAL OF COMPUTER SECURITY, 2018, 26 (04) : 543 - 556
  • [3] Improving Accuracy, Applicability and Usability of Keystroke Biometrics on Mobile Touchscreen Devices
    Buschek, Daniel
    De Luca, Alexander
    Alt, Florian
    [J]. CHI 2015: PROCEEDINGS OF THE 33RD ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2015, : 1393 - 1402
  • [4] A novel online incremental and decremental learning algorithm based on variable support vector machine
    Chen, Yuantao
    Xiong, Jie
    Xu, Weihong
    Zuo, Jingwen
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S7435 - S7445
  • [5] Chun H., 2014, P 9 ACM S INFORM COM, P401, DOI DOI 10.1145/2590296.2590343
  • [6] Flexible and Robust Privacy-Preserving Implicit Authentication
    Domingo-Ferrer, Josep
    Wu, Qianhong
    Blanco-Justicia, Alberto
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 18 - 34
  • [7] Govindarajan Sathya., 2013, Biometrics: Theory, Applications and Systems (BTAS), 2013 IEEE Sixth International Conference on, P1
  • [8] Location Data Record Privacy Protection Based on Differential Privacy Mechanism
    Gu, Ke
    Yang, Lihao
    Yin, Bo
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (04): : 639 - 654
  • [9] PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones
    Gunasinghe, Hasini
    Bertino, Elisa
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (04) : 1042 - 1057
  • [10] Mobile Cloud Sensing, Big Data, and 5G Networks Make an Intelligent and Smart World
    Han, Qilong
    Liang, Shuang
    Zhang, Hongli
    [J]. IEEE NETWORK, 2015, 29 (02): : 40 - 45