Abstract
IoT is an important part of the new generation of information technologies and the next big thing in the IT industry after the computer and the internet. The IoT has great development potential and a wide range of possible applications, especially commercial applications. And information security of the IoT is the key to the long-term development of the whole industry. Currently, the two most significant factors in the development of the IoT are user identity authentication and privacy protection. This paper contains an analysis on the current picture of inter-device user identity authentication in the IoT and proposes an inter-device biometric authentication solution for the IoT that’s designed to work with larger devices, addressing the shortcomings of the traditional user identity authentication technologies including security and efficiency problems. A strategy for further solution optimization is also included. This paper elaborates on the specific process of user identity authentication carried out by users on devices and between devices making use of fingerprints. We’ll demonstrate the security of this solution against existing attack methods and in the last part, we enumerate various possible applications of this solution in smart homes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chuankun, W.: An overview on the security techniques and challenges of the Internet of things. J. Cryptologic Res. 2(1), 40–53 (2015)
Ke, J., Zhou, P., Jing, X.: Mixed parameters of differential and weighted mel cepstrum used in speaker recognition. Microelectronics Comput. 31(9), 89–91 (2014)
Lin, W., Wang, X.: One-time password authentication protocol based on non-homogeneous linear equations. Comput. Eng. 36(13), 154–155 (2010)
Zhang, M., Ma, Z., Zhang, X., Gao, F.: An identity authentication scheme on IoT. Designing Tech. Posts Telecommun. 19–22 (2017)
Wang, A., Guo, Y., Wang, X.: An introduction to identification and authentication technology. Comput. Appl. Softw. (2002)
Internet Finance Authentication Alliance. https://ifaa.org.cn/whitebook. Accessed Sept 2018
IoT Security Guidelines for IoT Endpoint Ecosystem. http://www.gsma.com/connectedliving. Accessed 23 May 2017
Chuankun, W.: Security Fundamentals for Internet of Things. Science Press, Beijing (2013)
IoT Security Guidelines Overview Document. http://www.gsma.com/connectedliving. Accessed 23 May 2017
Lee, S., Ong, I., Lim, H., et al.: Two factor authentication for cloud computing. J. Inf. Commun. Convergence Eng. 8(4), 427–432 (2010)
Yuan, J., Jiang, C.: A biometric-based user authentication for wireless sensor networks. Wuhan Univ. J. Nat. Sci. 15(3), 272–276 (2010)
Das, A.K., Chatterjee, S., Sing, J.K.: Formal security verification of a dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Commun. Comput. Inf. Sci. 2(1), 78–102 (2013)
Periaswamy, S.C.G., Thompson, D.R., Di, J.: Fingerprinting RFID tags. IEEE Trans. Dependable and Secure Comput. 8(6), 938–943 (2011)
Ai, Y.X., Mei, L.X.: Security characteristic and technology in the Internet of Things. Network Secur. Technol. Appl. 30(4), 20–29 (2013)
National Internet Emergency Response Center: China Internet Network Security Report 2016. People’s Posts and Telecommunications Publishing House, Beijing (2017)
Bertino, E., Islam, N.: Botnets and Internet of Things security. Computer 50(2), 76–79 (2017)
Zhang, N., Zang, Y.-L., Tian, J.: The integration of biometrics and cryptography—a new solution for secure identity authentication. J. Cryptologic Res. 2, 159–176 (2015)
Long, W., Sun, D.: Research on security and user privacy of biometric authentication solution. Secret Sci. Technol. (2014)
Li, C., Xin, Y., Niu, X., et al.: Identity authentication scheme based on biometric certificate. Comput. Eng. 33(20), 165–167 (2007)
Xiao, W.U., Jian-Ping, Z., Chu-Hua, L., et al.: Application of Internet of Things in smart home. Internet Things Technol. (2012)
Acknowledgments
This paper is supported by NSFC under Grant No. 61672350 and 61373149, NSSFC under Grant No. 16BGL003, Ministry of Education Fund under Grant No. 39120K178038 and 14YJA880033, SIT Collaborative innovation platform under Grant No. 3921NH166033, and SIT Foundation for Distinguished Scholars under Grant No. 39120K176049. We are also grateful for the support of the National Natural Science Foundation of China (61170227).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Xue, Q., Ju, X., Zhu, H., Zhu, H., Li, F., Zheng, X. (2019). A Biometric-Based IoT Device Identity Authentication Scheme. In: Han, S., Ye, L., Meng, W. (eds) Artificial Intelligence for Communications and Networks. AICON 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 287. Springer, Cham. https://doi.org/10.1007/978-3-030-22971-9_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-22971-9_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22970-2
Online ISBN: 978-3-030-22971-9
eBook Packages: Computer ScienceComputer Science (R0)