Comments on "Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment"

被引:49
|
作者
Hussain, Sajid [1 ]
Chaudhry, Shehzad Ashraf [2 ]
机构
[1] Int Islamic Univ, Dept Comp Sci & Software Engn, Islamabad 54000, Pakistan
[2] Istanbul Gelisim Univ, Fac Engn & Architecture, Dept Comp Engn, TR-34310 Istanbul, Turkey
来源
IEEE INTERNET OF THINGS JOURNAL | 2019年 / 6卷 / 06期
关键词
Industrial Internet of Things (IIoT); insider attack; key establishment; perfect forward secrecy; secret key expose; stolen smart device; stolen verifier attack; POWER ANALYSIS; SECURITY;
D O I
10.1109/JIOT.2019.2934947
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Very recently, Das et al. (IEEE Internet of Things Journal, pp. 4900-4913, 5(6), DOI: 10.1109/JIOT.2018.2877690, 2018) presented a biometric-based solution for security and privacy in Industrial Internet of Things architecture. Das et al. claimed that their protocol is secure against known attacks. However, this comment shows that their protocol is defenseless against stolen verifier, stolen smart device, and traceability attacks. The attacker having access to public parameters and any of the verifier and parameters stored in smart device can easily expose the session key shared among the user and the smart device. Moreover, their protocol fails to provide perfect forward secrecy. Finally, this article also provides some necessary guidelines on attack resilience for the authentication schemes based on merely the symmetric key primitives, which are overlooked by Das et al.
引用
收藏
页码:10936 / 10940
页数:5
相关论文
共 50 条
  • [21] A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing
    Huang, Chanying
    Wei, Songjie
    Yan, Kedong
    Zhang, Gongxuan
    Fu, Anmin
    2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 260 - 265
  • [22] Efficient Privacy-Preserving Authentication Scheme With Fine-Grained Error Location for Cloud-Based VANET
    Wang, Yu
    Zhang, Wenfang
    Wang, Xiaomin
    Khan, Muhammad Khurram
    Fan, Pingzhi
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (10) : 10436 - 10449
  • [23] A privacy-preserving Internet of Things device management scheme based on blockchain
    He, Qingsu
    Xu, Yu
    Liu, Zhoubin
    He, Jinhong
    Sun, You
    Zhang, Rui
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (11)
  • [24] An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme
    Ou, Lu
    Yin, Hui
    Qin, Zheng
    Xiao, Sheng
    Yang, Guangyi
    Hu, Yupeng
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [25] Efficient Privacy-Preserving Range Query With Leakage Suppressed for Encrypted Data in Cloud-Based Internet of Things
    Basudan, Sultan
    Alamer, Abdulrahman
    IEEE ACCESS, 2024, 12 : 187652 - 187664
  • [26] Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs
    Wang, Yujue
    Ding, Yong
    Wu, Qianhong
    Wei, Yongzhuang
    Qin, Bo
    Wang, Huiyong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (07) : 1779 - 1790
  • [27] PRIVACY-PRESERVING CLOUD-BASED DNN INFERENCE
    Xie, Shangyu
    Liu, Bingyu
    Hong, Yuan
    2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, : 2675 - 2679
  • [28] Lightweight and privacy-preserving multi-server authentication scheme based on PUF and biometrics
    Sun, Shuwan
    Bian, Weixin
    Xie, Dong
    Xu, Deqin
    Huang, Yi
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 45 (01) : 911 - 928
  • [29] A Biometrics-Based Remote User Authentication Scheme Using Smart Cards
    Cui, Jianming
    Sui, Rongquan
    Zhang, Xiaojun
    Li, Hengzhong
    Cao, Ning
    CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 531 - 542
  • [30] Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection
    Yang, Wencheng
    Hu, Jiankun
    Wang, Song
    Wu, Qianhong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,