Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment
Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India.
Department of Computer Science and Engineering, Manipal Institute of Technology, Manipal Academy of Higher Education, Karnataka, India.
Department of Computer Science and Engineering, Thapar University, Patiala, India.
Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.ORCID-id: 0000-0003-1902-9877
Visa övriga samt affilieringar
2018 (Engelska)Ingår i: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 5, nr 6, s. 4900-4913Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

Due to the widespread popularity of Internet-enabled devices, Industrial Internet of Things (IIoT) becomes popular in recent years. However, as the smart devices share the information with each other using an open channel, i.e., Internet, so security and privacy of the shared information remains a paramount concern. There exist some solutions in the literature for preserving security and privacy in IIoT environment. However, due to their heavy computation and communication overheads, these solutions may not be applicable to wide category of applications in IIoT environment. Hence, in this paper, we propose a new Biometric-based Privacy Preserving User Authentication (BP2UA) scheme for cloud-based IIoT deployment. BP2UA consists of strong authentication between users and smart devices using pre-established key agreement between smart devices and the gateway node. The formal security analysis of BP2UA using the well-known ROR model is provided to prove its session key security. Moreover, an informal security analysis of BP2UA is also given to show its robustness against various types of known attacks. The computation and communication costs of BP2UA in comparison to the other existing schemes of its category demonstrate its effectiveness in the IIoT environment. Finally, the practical demonstration of BP2UA is also done using the NS2 simulation.

Ort, förlag, år, upplaga, sidor
Piscataway, NJ: IEEE, 2018. Vol. 5, nr 6, s. 4900-4913
Nyckelord [en]
Biometrics, Industrial Internet of Things (IIoT), key agreement, NS2 simulation, security, user authentication
Nationell ämneskategori
Data- och informationsvetenskap
Forskningsämne
Distribuerade datorsystem
Identifikatorer
URN: urn:nbn:se:ltu:diva-71344DOI: 10.1109/JIOT.2018.2877690ISI: 000456475500057Scopus ID: 2-s2.0-85055727588OAI: oai:DiVA.org:ltu-71344DiVA, id: diva2:1258881
Anmärkning

Validerad;2019;Nivå 2;2019-02-11 (inah)

Tillgänglig från: 2018-10-26 Skapad: 2018-10-26 Senast uppdaterad: 2025-02-18Bibliografiskt granskad

Open Access i DiVA

Fulltext saknas i DiVA

Övriga länkar

Förlagets fulltextScopus

Person

Vasilakos, Athanasios

Sök vidare i DiVA

Av författaren/redaktören
Vasilakos, Athanasios
Av organisationen
Datavetenskap
I samma tidskrift
IEEE Internet of Things Journal
Data- och informationsvetenskap

Sök vidare utanför DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetricpoäng

doi
urn-nbn
Totalt: 167 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf