Hardware based Two-Factor User Authentication for the Internet of Things

被引:0
|
作者
Gurabi, Mehdi Akbari [1 ]
Alfandi, Omar [1 ]
Bochem, Arne [1 ]
Hogrefe, Dieter [1 ]
机构
[1] Univ Goettingen, Inst Comp Sci, Gottingen, Germany
关键词
Internet of Things; two-factor authentication; embedded security; public key infrastructure; smart card; wire-less sensor networks; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; SECURITY; CRYPTOGRAPHY; CHALLENGES; PROTOCOL; PRIVACY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the distributed Internet of Things (IoT) architecture, sensors collect data from vehicles, home appliances and office equipment and other environments. Various objects contain the sensor which process data, cooperate and exchange information with other embedded devices and end users in a distributed network. It is important to provide end-to-end communication security and an authentication system to guarantee the security and reliability of the data in such a distributed system. Two-factor authentication is a solution to improve the security level of password-based authentication processes and immunized the system against many attacks. At the same time, the computational and storage overhead of an authentication method also needs to be considered in IoT scenarios. For this reason, many cryptographic schemes are designed especially for the IoT; however, we observe a lack of laboratory hardware test beds and modules, and universal authentication hardware modules. This paper proposes a design and analysis for a hardware module in the IoT which allows the use of two-factor authentication based on smart cards, while taking into consideration the limited processing power and energy reserves of nodes, as well as designing the system with scalability in mind.
引用
收藏
页码:1081 / 1086
页数:6
相关论文
共 50 条
  • [31] Cryptanalysis and improvement of a two-factor user authentication scheme for smart home
    Kaur, Damandeep
    Kumar, Devender
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [32] On the Usability of Two-Factor Authentication
    Wang, Ding
    Wang, Ping
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 141 - 150
  • [33] A three -factor anonymous user authentication scheme for Internet of Things environments
    Lee, Hakjun
    Kang, Dongwoo
    Ryu, Jihyeon
    Won, Dongho
    Kim, Hyoungshick
    Lee, Youngsook
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
  • [34] A Robust Two-Factor User Authentication Scheme-Based ECC for Smart Home in IoT
    Zou, Shihong
    Cao, Qiang
    Wang, Chenyu
    Huang, Zifu
    Xu, Guoai
    IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 4938 - 4949
  • [35] A Two-Factor Authentication Scheme based on Negative Databases
    Liu, Ran
    Wang, Xiang
    Wang, Can
    2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 1110 - 1115
  • [36] Improved Mobile Security Based on Two-Factor Authentication
    Jayaram, Raja Sekar
    Balajothi, Dinesh
    Natchirajan, Deepu
    SECURITY AND PRIVACY, 2025, 8 (01):
  • [37] Hardware-Accelerated Blockchain-Based Authentication for the Internet of Things
    Santos, Joanne Marie, V
    Pascua, Jeanne Eunice, V
    Tiglao, Nestor Michael C.
    COGNITIVE RADIO ORIENTED WIRELESS NETWORKS AND WIRELESS INTERNET, 2022, 427 : 283 - 295
  • [38] An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    Jiang, Qi
    Ma, Jianfeng
    Lu, Xiang
    Tian, Youliang
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (06) : 1070 - 1081
  • [39] Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    SENSORS, 2010, 10 (03) : 2450 - 2459
  • [40] An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    Qi Jiang
    Jianfeng Ma
    Xiang Lu
    Youliang Tian
    Peer-to-Peer Networking and Applications, 2015, 8 : 1070 - 1081