Comments on "Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment"

被引:49
|
作者
Hussain, Sajid [1 ]
Chaudhry, Shehzad Ashraf [2 ]
机构
[1] Int Islamic Univ, Dept Comp Sci & Software Engn, Islamabad 54000, Pakistan
[2] Istanbul Gelisim Univ, Fac Engn & Architecture, Dept Comp Engn, TR-34310 Istanbul, Turkey
来源
IEEE INTERNET OF THINGS JOURNAL | 2019年 / 6卷 / 06期
关键词
Industrial Internet of Things (IIoT); insider attack; key establishment; perfect forward secrecy; secret key expose; stolen smart device; stolen verifier attack; POWER ANALYSIS; SECURITY;
D O I
10.1109/JIOT.2019.2934947
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Very recently, Das et al. (IEEE Internet of Things Journal, pp. 4900-4913, 5(6), DOI: 10.1109/JIOT.2018.2877690, 2018) presented a biometric-based solution for security and privacy in Industrial Internet of Things architecture. Das et al. claimed that their protocol is secure against known attacks. However, this comment shows that their protocol is defenseless against stolen verifier, stolen smart device, and traceability attacks. The attacker having access to public parameters and any of the verifier and parameters stored in smart device can easily expose the session key shared among the user and the smart device. Moreover, their protocol fails to provide perfect forward secrecy. Finally, this article also provides some necessary guidelines on attack resilience for the authentication schemes based on merely the symmetric key primitives, which are overlooked by Das et al.
引用
收藏
页码:10936 / 10940
页数:5
相关论文
共 50 条
  • [41] An Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
    Lu, Jian-Zhu
    Chen, Ting
    Zhou, Jipeng
    Yang, Jinjin
    Jiang, Junhui
    2013 6TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), VOLS 1-3, 2013, : 1643 - 1648
  • [42] PriMal: Cloud-Based Privacy-Preserving Malware Detection
    Sun, Hao
    Su, Jinshu
    Wang, Xiaofeng
    Chen, Rongmao
    Liu, Yujing
    Hu, Qiaolin
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 153 - 172
  • [43] An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking
    Becher, Kilian
    Beck, Martin
    Strufe, Thorsten
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON NETWORKED SYSTEMS (NETSYS 2019), 2019, : 117 - 124
  • [44] An improvement on Li and Hwang's biometrics-based remote user authentication scheme
    Shieh, Wen-Gong
    Wang, Mei-Tzu
    ICIC Express Letters, 2010, 4 (5 B): : 2021 - 2025
  • [45] Enhancing security and privacy in biometrics-based authentication systems
    Ratha, NK
    Connell, JH
    Bolle, RM
    IBM SYSTEMS JOURNAL, 2001, 40 (03) : 614 - 634
  • [46] Lightweight Privacy-Preserving Scheme Using Homomorphic Encryption in Industrial Internet of Things
    Li, Shancang
    Zhao, Shanshan
    Min, Geyong
    Qi, Lianyong
    Liu, Gang
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16) : 14542 - 14550
  • [47] A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things
    Diksha Rangwani
    Dipanwita Sadhukhan
    Sangram Ray
    Muhammad Khurram Khan
    Mou Dasgupta
    Peer-to-Peer Networking and Applications, 2021, 14 : 1548 - 1571
  • [48] A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things
    Rangwani, Diksha
    Sadhukhan, Dipanwita
    Ray, Sangram
    Khan, Muhammad Khurram
    Dasgupta, Mou
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1548 - 1571
  • [49] Privacy-Preserving Techniques in Cloud/Fog and Internet of Things
    Lee, Cheng-Chi
    Gheisari, Mehdi
    Shayegan, Mohammad Javad
    Ahvanooey, Milad Taleby
    Liu, Yang
    CRYPTOGRAPHY, 2023, 7 (04)
  • [50] Privacy and Security of Cloud-Based Internet of Things (IoT)
    Choudhury, Tanupriya
    Gupta, Ayushi
    Pradhan, Saurabh
    Kumar, Praveen
    Rathore, Yogesh Singh
    2017 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NETWORKS (CINE), 2017, : 40 - 45