Secure authentication on the Internet of Things
Title | Secure authentication on the Internet of Things |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Griffin, P. H. |
Conference Name | SoutheastCon 2017 |
Publisher | IEEE |
ISBN Number | 978-1-5386-1539-3 |
Keywords | authentication, biometric authenticated key exchange protocol, biometric-based cryptographic techniques, biometrics, biometrics (access control), Ciphers, code size, Computer crime, confidential communications, cryptographic protocols, cryptography, Human Behavior, human factor, human factors, Internet of Things, lightweight cryptographic algorithms, man-in-the-middle attacks, memory requirements, Metrics, multifactor authentication, mutual multifactor authentication, phishing, Protocols, pubcrawl, resilience, Resiliency, resource constrained environments, Servers, universal access, user credential protection |
Abstract | This paper describes biometric-based cryptographic techniques for providing confidential communications and strong, mutual and multifactor authentication on the Internet of Things. The described security techniques support the goals of universal access when users are allowed to select from multiple choice alternatives to authenticate their identities. By using a Biometric Authenticated Key Exchange (BAKE) protocol, user credentials are protected against phishing and Man-in-the-Middle attacks. Forward secrecy is achieved using a Diffie-Hellman key establishment scheme with fresh random values each time the BAKE protocol is operated. Confidentiality is achieved using lightweight cryptographic algorithms that are well suited for implementation in resource constrained environments, those limited by processing speed, limited memory and power availability. Lightweight cryptography can offer strong confidentiality solutions that are practical to implement in Internet of Things systems, where efficient execution, and small memory requirements and code size are required. |
URL | https://ieeexplore.ieee.org/document/7925274 |
DOI | 10.1109/SECON.2017.7925274 |
Citation Key | griffin_secure_2017 |
- lightweight cryptographic algorithms
- user credential protection
- universal access
- Servers
- resource constrained environments
- Resiliency
- resilience
- pubcrawl
- Protocols
- Phishing
- mutual multifactor authentication
- multifactor authentication
- Metrics
- memory requirements
- man-in-the-middle attacks
- authentication
- Internet of Things
- Human Factors
- human factor
- Human behavior
- Cryptography
- Cryptographic Protocols
- confidential communications
- Computer crime
- code size
- Ciphers
- biometrics (access control)
- biometrics
- biometric-based cryptographic techniques
- biometric authenticated key exchange protocol