SwePub
Sök i LIBRIS databas

  Extended search

onr:"swepub:oai:DiVA.org:ltu-71344"
 

Search: onr:"swepub:oai:DiVA.org:ltu-71344" > Biometrics-Based Pr...

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment

Kumar Das, Ashok (author)
Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India
Wazid, Mohammad (author)
Department of Computer Science and Engineering, Manipal Institute of Technology, Manipal Academy of Higher Education, Karnataka, India
Kumar, Neeraj (author)
Department of Computer Science and Engineering, Thapar University, Patiala, India
show more...
Vasilakos, Athanasios (author)
Luleå tekniska universitet,Datavetenskap
Rodrigues, Joel J. P. C. (author)
National Institute of Telecommunications (Inatel), Brazil; Instituto de Telecomunicações, Portugal; University of Fortaleza (UNIFOR), Brazil.
show less...
 (creator_code:org_t)
Piscataway, NJ : IEEE, 2018
2018
English.
In: IEEE Internet of Things Journal. - Piscataway, NJ : IEEE. - 2327-4662. ; 5:6, s. 4900-4913
  • Journal article (peer-reviewed)
Abstract Subject headings
Close  
  • Due to the widespread popularity of Internet-enabled devices, Industrial Internet of Things (IIoT) becomes popular in recent years. However, as the smart devices share the information with each other using an open channel, i.e., Internet, so security and privacy of the shared information remains a paramount concern. There exist some solutions in the literature for preserving security and privacy in IIoT environment. However, due to their heavy computation and communication overheads, these solutions may not be applicable to wide category of applications in IIoT environment. Hence, in this paper, we propose a new Biometric-based Privacy Preserving User Authentication (BP2UA) scheme for cloud-based IIoT deployment. BP2UA consists of strong authentication between users and smart devices using pre-established key agreement between smart devices and the gateway node. The formal security analysis of BP2UA using the well-known ROR model is provided to prove its session key security. Moreover, an informal security analysis of BP2UA is also given to show its robustness against various types of known attacks. The computation and communication costs of BP2UA in comparison to the other existing schemes of its category demonstrate its effectiveness in the IIoT environment. Finally, the practical demonstration of BP2UA is also done using the NS2 simulation.

Subject headings

NATURVETENSKAP  -- Data- och informationsvetenskap -- Medieteknik (hsv//swe)
NATURAL SCIENCES  -- Computer and Information Sciences -- Media and Communication Technology (hsv//eng)

Keyword

Biometrics
Industrial Internet of Things (IIoT)
key agreement
NS2 simulation
security
user authentication
Pervasive Mobile Computing
Distribuerade datorsystem

Publication and Content Type

ref (subject category)
art (subject category)

Find in a library

To the university's database

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

Search outside SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view