Comments on "Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment"

被引:52
作者
Hussain, Sajid [1 ]
Chaudhry, Shehzad Ashraf [2 ]
机构
[1] Int Islamic Univ, Dept Comp Sci & Software Engn, Islamabad 54000, Pakistan
[2] Istanbul Gelisim Univ, Fac Engn & Architecture, Dept Comp Engn, TR-34310 Istanbul, Turkey
关键词
Industrial Internet of Things (IIoT); insider attack; key establishment; perfect forward secrecy; secret key expose; stolen smart device; stolen verifier attack; POWER ANALYSIS; SECURITY;
D O I
10.1109/JIOT.2019.2934947
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Very recently, Das et al. (IEEE Internet of Things Journal, pp. 4900-4913, 5(6), DOI: 10.1109/JIOT.2018.2877690, 2018) presented a biometric-based solution for security and privacy in Industrial Internet of Things architecture. Das et al. claimed that their protocol is secure against known attacks. However, this comment shows that their protocol is defenseless against stolen verifier, stolen smart device, and traceability attacks. The attacker having access to public parameters and any of the verifier and parameters stored in smart device can easily expose the session key shared among the user and the smart device. Moreover, their protocol fails to provide perfect forward secrecy. Finally, this article also provides some necessary guidelines on attack resilience for the authentication schemes based on merely the symmetric key primitives, which are overlooked by Das et al.
引用
收藏
页码:10936 / 10940
页数:5
相关论文
共 11 条
[1]   Breaking a remote user authentication scheme for multi-server architecture [J].
Cao, Xiang ;
Zhong, Sheng .
IEEE COMMUNICATIONS LETTERS, 2006, 10 (08) :580-581
[2]  
Chen CM, 2002, IEICE T COMMUN, VE85B, P2519
[3]   Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment [J].
Das, Ashok Kumar ;
Wazid, Mohammad ;
Kumar, Neeraj ;
Vasilakos, Athanasios V. ;
Rodrigues, Joel J. P. C. .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (06) :4900-4913
[4]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[5]  
Eisenbarth T, 2008, LECT NOTES COMPUT SC, V5157, P203, DOI 10.1007/978-3-540-85174-5_12
[6]   A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network [J].
He, Debiao ;
Kumar, Neeraj ;
Wang, Huaqun ;
Wang, Lina ;
Choo, Kim-Kwang Raymond ;
Vinel, Alexey .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) :633-645
[7]   Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services [J].
He, Debiao ;
Kumar, Neeraj ;
Khan, Muhammad Khurram ;
Wang, Lina ;
Shen, Jian .
IEEE SYSTEMS JOURNAL, 2018, 12 (02) :1621-1631
[8]  
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[9]   Examining smart-card security under the threat of power analysis attacks [J].
Messerges, TS ;
Dabbish, EA ;
Sloan, RH .
IEEE TRANSACTIONS ON COMPUTERS, 2002, 51 (05) :541-552
[10]   Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound [J].
Wang, Ding ;
Wang, Ping .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) :708-722