Presentation is loading. Please wait.

Presentation is loading. Please wait.

An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems.

Similar presentations


Presentation on theme: "An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems."— Presentation transcript:

1 An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems Vol. 34, pp. 1403–1410, 2018 Author: Sandip Roy, Santanu Chatterjee, and Gautam Mahapatra Speaker: Nguyen Ngoc Tu Date: 2018/06/07 Green: environmentally friendly

2 Outline Motivations Preliminaries Proposed scheme Conclusions

3 Motivations

4 Motivations Proposed a light weight AKE scheme Three security factors:
Password, smart card, biometric Using only lightweight operations: Exclusive-OR, Hash, symmetric encryption/decryption Formal security verification: ProVerif simulation tool Intercept: Delete, modify, fabricate ; corrupt: clients

5 Preliminaries : secret string 𝛽 𝑖 :public reproduction parameter
Fuzzy extractor Generation function : secret string 𝛽 𝑖 :public reproduction parameter Reproduction function Input biometric and If then Contribution

6 Proposed scheme (1/4) User registration phase Gateway
Select ; input biometric Compute Select a random number Compute Check Compute Compute Store and into a smart card Contribution Store into Destroy from

7 Proposed scheme (2/4) Authenticated key agreement phase Gateway
Input , and then computes Verify Select a random number and compute Contribution

8 Proposed scheme (3/4) Authenticated key agreement phase Gateway
Compute Decrypt Verify Select a random number and compute Contribution

9 Proposed scheme (4/4) Authenticated key agreement phase Gateway Verify
Compute Decrypt Compute Contribution Verify Update Session key

10 Performance comparison
Security comparisons AAKE: [5] H. Arshad and M. Nikooghadam, Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems, Journal of Medical Systems 38(12) (2014), 136. [4] X. Xu, P. Zhu, Q. Wen, Z. Jin, H. Zhang and L. He, A secure and efficient authentication and key agreement scheme based on ECC for telecare medicine information systems, Journal of Medical Systems 38 (2014), 9994. [7] Q. Xie, W. Liu, S. Wang, L. Han, B. Hu and T. Wu, Improvement of a uniqueness-and-anonymity-preserving user authentication scheme for connected health care, Journal of Medical Systems 38(9) (2014), 91. [6] C.T. Li, C.C. Lee and C.Y.Weng,Asecure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems, Journal of Medical Systems 38 (2014),77. [8] L. Xu and F. Wu, Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care, Journal of Medical Systems 39 (2015), 10.

11 Performance comparison
Computation comparisons AAKE:

12 Conclusions Light weight computation over head Use privacy
Formal security verification using ProVerif 2.0 Automated Validation of Internet Security Protocols and Applications.

13 Comments Multi-gateway environments ?
Automated Validation of Internet Security Protocols and Applications.


Download ppt "An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems."

Similar presentations


Ads by Google