Skip to main content

A Biometric-Based IoT Device Identity Authentication Scheme

  • Conference paper
  • First Online:
Artificial Intelligence for Communications and Networks (AICON 2019)

Abstract

IoT is an important part of the new generation of information technologies and the next big thing in the IT industry after the computer and the internet. The IoT has great development potential and a wide range of possible applications, especially commercial applications. And information security of the IoT is the key to the long-term development of the whole industry. Currently, the two most significant factors in the development of the IoT are user identity authentication and privacy protection. This paper contains an analysis on the current picture of inter-device user identity authentication in the IoT and proposes an inter-device biometric authentication solution for the IoT that’s designed to work with larger devices, addressing the shortcomings of the traditional user identity authentication technologies including security and efficiency problems. A strategy for further solution optimization is also included. This paper elaborates on the specific process of user identity authentication carried out by users on devices and between devices making use of fingerprints. We’ll demonstrate the security of this solution against existing attack methods and in the last part, we enumerate various possible applications of this solution in smart homes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chuankun, W.: An overview on the security techniques and challenges of the Internet of things. J. Cryptologic Res. 2(1), 40–53 (2015)

    Google Scholar 

  2. Ke, J., Zhou, P., Jing, X.: Mixed parameters of differential and weighted mel cepstrum used in speaker recognition. Microelectronics Comput. 31(9), 89–91 (2014)

    Google Scholar 

  3. Lin, W., Wang, X.: One-time password authentication protocol based on non-homogeneous linear equations. Comput. Eng. 36(13), 154–155 (2010)

    Google Scholar 

  4. Zhang, M., Ma, Z., Zhang, X., Gao, F.: An identity authentication scheme on IoT. Designing Tech. Posts Telecommun. 19–22 (2017)

    Google Scholar 

  5. Wang, A., Guo, Y., Wang, X.: An introduction to identification and authentication technology. Comput. Appl. Softw. (2002)

    Google Scholar 

  6. Internet Finance Authentication Alliance. https://ifaa.org.cn/whitebook. Accessed Sept 2018

  7. IoT Security Guidelines for IoT Endpoint Ecosystem. http://www.gsma.com/connectedliving. Accessed 23 May 2017

  8. Chuankun, W.: Security Fundamentals for Internet of Things. Science Press, Beijing (2013)

    Google Scholar 

  9. IoT Security Guidelines Overview Document. http://www.gsma.com/connectedliving. Accessed 23 May 2017

  10. Lee, S., Ong, I., Lim, H., et al.: Two factor authentication for cloud computing. J. Inf. Commun. Convergence Eng. 8(4), 427–432 (2010)

    Article  Google Scholar 

  11. Yuan, J., Jiang, C.: A biometric-based user authentication for wireless sensor networks. Wuhan Univ. J. Nat. Sci. 15(3), 272–276 (2010)

    Article  Google Scholar 

  12. Das, A.K., Chatterjee, S., Sing, J.K.: Formal security verification of a dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Commun. Comput. Inf. Sci. 2(1), 78–102 (2013)

    Google Scholar 

  13. Periaswamy, S.C.G., Thompson, D.R., Di, J.: Fingerprinting RFID tags. IEEE Trans. Dependable and Secure Comput. 8(6), 938–943 (2011)

    Article  Google Scholar 

  14. Ai, Y.X., Mei, L.X.: Security characteristic and technology in the Internet of Things. Network Secur. Technol. Appl. 30(4), 20–29 (2013)

    MathSciNet  Google Scholar 

  15. National Internet Emergency Response Center: China Internet Network Security Report 2016. People’s Posts and Telecommunications Publishing House, Beijing (2017)

    Google Scholar 

  16. Bertino, E., Islam, N.: Botnets and Internet of Things security. Computer 50(2), 76–79 (2017)

    Article  Google Scholar 

  17. Zhang, N., Zang, Y.-L., Tian, J.: The integration of biometrics and cryptography—a new solution for secure identity authentication. J. Cryptologic Res. 2, 159–176 (2015)

    Google Scholar 

  18. Long, W., Sun, D.: Research on security and user privacy of biometric authentication solution. Secret Sci. Technol. (2014)

    Google Scholar 

  19. Li, C., Xin, Y., Niu, X., et al.: Identity authentication scheme based on biometric certificate. Comput. Eng. 33(20), 165–167 (2007)

    Google Scholar 

  20. Xiao, W.U., Jian-Ping, Z., Chu-Hua, L., et al.: Application of Internet of Things in smart home. Internet Things Technol. (2012)

    Google Scholar 

Download references

Acknowledgments

This paper is supported by NSFC under Grant No. 61672350 and 61373149, NSSFC under Grant No. 16BGL003, Ministry of Education Fund under Grant No. 39120K178038 and 14YJA880033, SIT Collaborative innovation platform under Grant No. 3921NH166033, and SIT Foundation for Distinguished Scholars under Grant No. 39120K176049. We are also grateful for the support of the National Natural Science Foundation of China (61170227).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qingshui Xue .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xue, Q., Ju, X., Zhu, H., Zhu, H., Li, F., Zheng, X. (2019). A Biometric-Based IoT Device Identity Authentication Scheme. In: Han, S., Ye, L., Meng, W. (eds) Artificial Intelligence for Communications and Networks. AICON 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 287. Springer, Cham. https://doi.org/10.1007/978-3-030-22971-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-22971-9_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-22970-2

  • Online ISBN: 978-3-030-22971-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics