Hardware based Two-Factor User Authentication for the Internet of Things

被引:0
|
作者
Gurabi, Mehdi Akbari [1 ]
Alfandi, Omar [1 ]
Bochem, Arne [1 ]
Hogrefe, Dieter [1 ]
机构
[1] Univ Goettingen, Inst Comp Sci, Gottingen, Germany
关键词
Internet of Things; two-factor authentication; embedded security; public key infrastructure; smart card; wire-less sensor networks; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; SECURITY; CRYPTOGRAPHY; CHALLENGES; PROTOCOL; PRIVACY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the distributed Internet of Things (IoT) architecture, sensors collect data from vehicles, home appliances and office equipment and other environments. Various objects contain the sensor which process data, cooperate and exchange information with other embedded devices and end users in a distributed network. It is important to provide end-to-end communication security and an authentication system to guarantee the security and reliability of the data in such a distributed system. Two-factor authentication is a solution to improve the security level of password-based authentication processes and immunized the system against many attacks. At the same time, the computational and storage overhead of an authentication method also needs to be considered in IoT scenarios. For this reason, many cryptographic schemes are designed especially for the IoT; however, we observe a lack of laboratory hardware test beds and modules, and universal authentication hardware modules. This paper proposes a design and analysis for a hardware module in the IoT which allows the use of two-factor authentication based on smart cards, while taking into consideration the limited processing power and energy reserves of nodes, as well as designing the system with scalability in mind.
引用
收藏
页码:1081 / 1086
页数:6
相关论文
共 50 条
  • [21] Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography
    Zhang, Liping
    Tang, Shanyu
    Chen, Jing
    Zhu, Shaohui
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 81 (01) : 53 - 75
  • [22] Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography
    Liping Zhang
    Shanyu Tang
    Jing Chen
    Shaohui Zhu
    Wireless Personal Communications, 2015, 81 : 53 - 75
  • [23] TWO-FACTOR AUTHENTICATION SYSTEM
    Tsymzhitov, Gonchik
    Zudilova, Tatiana
    Voituk, Tatiana
    INFORMATICS, GEOINFORMATICS AND REMOTE SENSING CONFERENCE PROCEEDINGS, SGEM 2016, VOL I, 2016, : 505 - 512
  • [24] An Efficient Two-Factor User Authentication Framework for Wireless Sensor Networks
    Zhao, Jingying
    Guo, Hai
    Wei, Wei
    COMPUTATIONAL MECHANICS, MATERIALS AND ENGINEERING APPLICATIONS, 2012, 147 : 320 - 323
  • [25] Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 55 - 60
  • [26] User-centric Two-factor Authentication Key Agreement Protocol
    Yang, Xue
    Liu, Yi-Jing
    Jiang, Qi
    Wang, Jin-Hua
    Li, Xing-Hua
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (10): : 4859 - 4875
  • [27] An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
    He, Daojing
    Gao, Yi
    Chan, Sammy
    Chen, Chun
    Bu, Jiajun
    AD HOC & SENSOR WIRELESS NETWORKS, 2010, 10 (04) : 361 - 371
  • [28] BlinKey: A Two-Factor User Authentication Method for Virtual Reality Devices
    Zhu, Huadi
    Jin, Wenqiang
    Xiao, Mingyan
    Murali, Srinivasan
    Li, Ming
    PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2020, 4 (04):
  • [29] A Survey on Two-Factor User Authentication Schemes in Wireless Sensor Networks
    Kaur, Sharanjeet
    Khandnor, P.
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 1077 - 1081
  • [30] Robust two-factor authentication and key agreement preserving user privacy
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Yang, Li
    International Journal of Network Security, 2014, 16 (03) : 229 - 240