Hardware based Two-Factor User Authentication for the Internet of Things

被引:0
|
作者
Gurabi, Mehdi Akbari [1 ]
Alfandi, Omar [1 ]
Bochem, Arne [1 ]
Hogrefe, Dieter [1 ]
机构
[1] Univ Goettingen, Inst Comp Sci, Gottingen, Germany
关键词
Internet of Things; two-factor authentication; embedded security; public key infrastructure; smart card; wire-less sensor networks; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; SECURITY; CRYPTOGRAPHY; CHALLENGES; PROTOCOL; PRIVACY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the distributed Internet of Things (IoT) architecture, sensors collect data from vehicles, home appliances and office equipment and other environments. Various objects contain the sensor which process data, cooperate and exchange information with other embedded devices and end users in a distributed network. It is important to provide end-to-end communication security and an authentication system to guarantee the security and reliability of the data in such a distributed system. Two-factor authentication is a solution to improve the security level of password-based authentication processes and immunized the system against many attacks. At the same time, the computational and storage overhead of an authentication method also needs to be considered in IoT scenarios. For this reason, many cryptographic schemes are designed especially for the IoT; however, we observe a lack of laboratory hardware test beds and modules, and universal authentication hardware modules. This paper proposes a design and analysis for a hardware module in the IoT which allows the use of two-factor authentication based on smart cards, while taking into consideration the limited processing power and energy reserves of nodes, as well as designing the system with scalability in mind.
引用
收藏
页码:1081 / 1086
页数:6
相关论文
共 50 条
  • [1] Design and Analysis of a Provable Secure Two-Factor Authentication Protocol for Internet of Things
    Chen, Chien-Ming
    Liu, Shuangshuang
    Li, Xuanang
    Kumari, Saru
    Li, Long
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [2] RSA Based Two-Factor Remote User Authentication Scheme with User Anonymity
    Chandrakar, Preeti
    Om, Hari
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2015, 70 : 318 - 324
  • [3] Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction
    Li, Wenting
    Wang, Ping
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 694 - 708
  • [4] Cryptanalysis and Improvement of a Two-Factor User Authentication Scheme
    Kumar, Devender
    Chand, Satish
    Kumar, Bijendra
    INFOCOMMUNICATIONS JOURNAL, 2018, 10 (01): : 10 - 14
  • [5] Two-Factor User Authentication in Wireless Sensor Networks
    Das, Manik Lal
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) : 1086 - 1090
  • [6] A Two-factor based Remote User Authentication Scheme using ElGamal Cryptosystem
    Soni, Preeti
    Ali, Rifaqat
    Pal, Arup Kumar
    IOTSEC'17: PROCEEDINGS OF THE ACM WORKSHOP ON INTERNET OF THINGS (IOT) SECURITY: ISSUES AND INNOVATIONS, 2017,
  • [7] Two-factor authentication schemes based smart card and password with user anonymity
    Cao, Tianjie
    Huang, Shi
    Journal of Computational Information Systems, 2013, 9 (21): : 8831 - 8838
  • [8] Two-Factor Dynamic ID-Based Remote User Authentication Scheme
    Huang, Renjun
    Su, Fengfu
    Chen, Yangyi
    PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 373 - 377
  • [9] User Authentication for the Internet of Things
    Stajano, Frank
    Lomas, Mark
    SECURITY PROTOCOLS XXVI, 2018, 11286 : 209 - 213
  • [10] TWO ATTACKS ON A TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chen, Shun-Der
    PARALLEL PROCESSING LETTERS, 2011, 21 (01) : 21 - 26