Comments on "Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment"

被引:49
|
作者
Hussain, Sajid [1 ]
Chaudhry, Shehzad Ashraf [2 ]
机构
[1] Int Islamic Univ, Dept Comp Sci & Software Engn, Islamabad 54000, Pakistan
[2] Istanbul Gelisim Univ, Fac Engn & Architecture, Dept Comp Engn, TR-34310 Istanbul, Turkey
来源
IEEE INTERNET OF THINGS JOURNAL | 2019年 / 6卷 / 06期
关键词
Industrial Internet of Things (IIoT); insider attack; key establishment; perfect forward secrecy; secret key expose; stolen smart device; stolen verifier attack; POWER ANALYSIS; SECURITY;
D O I
10.1109/JIOT.2019.2934947
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Very recently, Das et al. (IEEE Internet of Things Journal, pp. 4900-4913, 5(6), DOI: 10.1109/JIOT.2018.2877690, 2018) presented a biometric-based solution for security and privacy in Industrial Internet of Things architecture. Das et al. claimed that their protocol is secure against known attacks. However, this comment shows that their protocol is defenseless against stolen verifier, stolen smart device, and traceability attacks. The attacker having access to public parameters and any of the verifier and parameters stored in smart device can easily expose the session key shared among the user and the smart device. Moreover, their protocol fails to provide perfect forward secrecy. Finally, this article also provides some necessary guidelines on attack resilience for the authentication schemes based on merely the symmetric key primitives, which are overlooked by Das et al.
引用
收藏
页码:10936 / 10940
页数:5
相关论文
共 50 条
  • [1] Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment
    Das, Ashok Kumar
    Wazid, Mohammad
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    Rodrigues, Joel J. P. C.
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (06): : 4900 - 4913
  • [2] Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
    Gunasinghe, Hasini
    Bertino, Elisa
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 389 - 408
  • [3] Cloud-based Biometrics Processing for Privacy-Preserving Identification
    Hahn, Changhee
    Shin, Hyungjune
    Hur, Junbeom
    2017 NINTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2017), 2017, : 595 - 600
  • [4] An Efficient RLWE-Based Privacy-Preserving Authentication Scheme Based on Edge Computing in Industrial Internet of Things
    Huang, Yongfei
    Xu, Guangxia
    Song, Xiaoling
    Xu, Yuqing
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (05) : 2012 - 2026
  • [5] A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2017, 8 (01) : 101 - 116
  • [6] A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
    Fan Wu
    Lili Xu
    Saru Kumari
    Xiong Li
    Journal of Ambient Intelligence and Humanized Computing, 2017, 8 : 101 - 116
  • [7] Cryptanalysis of a Privacy-Preserving and Provable User Authentication Scheme for Wireless Sensor Networks based on Internet of Things Security
    Moon, Jongho
    Lee, Youngsook
    Yang, Hyungkyu
    Song, Taeui
    Won, Dongho
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 432 - 437
  • [8] Secure authentication and privacy-preserving blockchain for industrial internet of things
    Sharma, Prakash Chandra
    Mahmood, Md Rashid
    Raja, Hiral
    Yadav, Narendra Singh
    Gupta, Brij B.
    Arya, Varsha
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 108
  • [9] PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones
    Gunasinghe, Hasini
    Bertino, Elisa
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (04) : 1042 - 1057
  • [10] A Multi-Cloud based Privacy-Preserving Data Publishing Scheme for the Internet of Things
    Yang, Lei
    Humayed, Abdulmalik
    Li, Fengjun
    32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 30 - 39