Copyright and Licensing
Articles accepted for publication will be licensed under the Creative Commons BY-NC. Authors must sign a non-exclusive distribution agreement after article acceptance.
The limited capabilities of IoT devices have resulted in some of the tasks of IoT applications being distributed to a cloud server, which witnessed the arisen of the cloud of things (COT). It enables IoT applications' development and deployment as a service, providing additional data storage, enhanced processing performance, and fast communication between devices. As COT involves communication between IoT devices, a remote server, and users, remote user authentication is crucial to meeting security demands. Therefore, this study designs a client-based user authentication scheme utilizing smartphone fingerprint recognition technology to fill the gap. The scheme comprises six phases, namely (i) configuration phase, (ii) enrolment phase, (iii) authentication phase, (iv) password update phase, (v) fingerprint revocation phase, and (vi) smartphone revocation phase. The security analysis and automated verification using ProVerif suggested that the scheme is resistant to user impersonating attacks, replay attacks, and man-in-the-middle attacks.
N. N. Mohamed, Y. M. Yussoff, M. A. Saleh, and H. Hashim, "Hybrid cryptographic approach for internet of things applications: A review," Journal of Information and Communication Technology, vol. 19, pp. 279-319, 2020.
I. U. Din, M. Guizani, J. J. P. C. Rodrigues, S. Hassan, and V. V. Korotaev, "Machine learning in the Internet of Things: Designed techniques for smart cities," Future Generation Computer Systems, vol. 100, pp. 826-843, 2019.
K. Ahmad, O. Mohammad, M. Atieh, and H. Ramadan, "Enhanced performance and faster response using new iot litetechnique," International Arab Journal of Information Technology, vol. 16, pp. 548-556, 2019.
B. D. Deebak and F. Al-Turjman, "Lightweight authentication for IoT/Cloud-based forensics in intelligent data computing," Future Generation Computer Systems, vol. 116, pp. 406-425, 2021.
A. M. Rashid, A. A. Yassin, A. A. A. Wahed, and A. J. Yassin, "Smart city security: Face-based image retrieval model using gray level cooccurrence matrix," Journal of Information and Communication Technology, vol. 19, pp. 437-458, 2020.
C.-C. Chang, H.-L. Wu, and C.-Y. Sun, "Notes on “Secure authentication scheme for IoT and cloud servers”," Pervasive and Mobile Computing, vol. 38, pp. 275-278, 2017.
N. Katuk, K. R. Ku-Mahamud, N. H. Zakaria, and M. A. Maarof, "Implementation and recent progress in cloud-based smart home automation systems," in ISCAIE 2018 - 2018 IEEE Symposium on Computer Applications and Industrial Electronics, 2018, pp. 71-77.
B. Guo, D. Zhang, Z. Wang, Z. Yu, and X. Zhou, "Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things," Journal of Network and Computer Applications, vol. 36, pp. 1531-1539, 2013.
F. Alhaidari, A. Rahman, and R. Zagrouba, "Cloud of Things: architecture, applications and challenges," Journal of Ambient Intelligence and Humanized Computing, 2020.
A. Botta, W. de Donato, V. Persico, and A. Pescapé, "Integration of Cloud computing and Internet of Things: A survey," Future Generation Computer Systems, vol. 56, pp. 684-700, 2016/03/01/ 2016.
F. Daneshgar, O. A. Sianaki, and A. Ilyas, "Overcoming Data Security Challenges of Cloud of Things: An Architectural Perspective," Advances in Intelligent Systems and Computing, vol. 993, pp. 646-659, 2020.
D. C. Nguyen, P. N. Pathirana, M. Ding, and A. Seneviratne, "Integration of Blockchain and Cloud of Things: Architecture, Applications and Challenges," IEEE Communications Surveys and Tutorials, vol. 22, pp. 2521-2549, 2020.
T. C. S. Xavier, I. L. Santos, F. C. Delicato, P. F. Pires, M. P. Alves, T. S. Calmon, et al., "Collaborative resource allocation for Cloud of Things systems," Journal of Network and Computer Applications, vol. 159, 2020.
S. Xuan and D. H. Kim, "Development of Cloud of Things Based on Proxy Using OCF IoTivity and MQTT for P2P Internetworking," Peer-to-Peer Networking and Applications, vol. 13, pp. 729-741, 2020.
H. Elazhary, "Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions," Journal of Network and Computer Applications, vol. 128, pp. 105-140, 2019.
H. Nguyen, H. H. Nguyen, T. Hoang, D. Choi, and T. D. Nguyen, "A Generalized Authentication Scheme for Mobile Phones Using Gait Signals," in International Conference on E-Business and Telecommunications, 2015, pp. 386-407.
A. Ayoub, R. Najat, and A. Jaafar, "A lightweight secure CoAP for IoT-cloud paradigm using elliptic-curve cryptography," Indonesian Journal of Electrical Engineering and Computer Science, vol. 20, pp. 1460-1470, 2020.
H. L. Wu, C. C. Chang, Y. Z. Zheng, L. S. Chen, and C. C. Chen, "A secure IoT-based authentication system in cloud computing environment," Sensors (Switzerland), vol. 20, pp. 1-14, 2020.
Z. Houhamdi and B. Athamena, "Identity identification and management in the internet of things," International Arab Journal of Information Technology, vol. 17, pp. 645-654, 2020.
S. M. Kannan Mani, M. Balaji Bharatwaj, and N. Harini, "A Scheme to Enhance the Security and Efficiency of MQTT Protocol," Smart Innovation, Systems and Technologies, vol. 194, pp. 79-93, 2021.
B. Liao, Y. Ali, S. Nazir, L. He, and H. U. Khan, "Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review," IEEE Access, vol. 8, pp. 120331-120350, 2020.
N. Katuk, N. H. Zakaria, and K. R. Ku-Mahamud, "Mobile phone sensing using the built-in camera," International Journal of Interactive Mobile Technologies, vol. 13, pp. 102-114, 2019.
I. A. Alnajjar and M. Mahmuddin, "Feature indexing and search optimization for enhancing the forensic analysis of mobile cloud environment," Information Security Journal, 2020.
H. B. Alwan and K. R. Ku-Mahamud, "Cancellable face template algorithm based on speeded-up robust features and winner-takes-all," Multimedia Tools and Applications, vol. 79, pp. 28675-28693, 2020.
P. C. Venugopal and K. S. A. Viji, "Applying empirical thresholding algorithm for a keystroke dynamics based authentication system," Journal of Information and Communication Technology, vol. 18, pp. 383-413, 2019.
S. Desai Karanam, S. Shetty, and K. U. G. Nithin, "Fog computing application for biometric-based secure access to healthcare data," Signals and Communication Technology, pp. 355-383, 2021.
K. Shanmugasundaram, A. S. A. Mohmed, and N. I. R. Ruhaiyem, "Hybrid improved bacterial swarm optimization algorithm in hand-based multimodal biometric authentication system," Journal of Information and Communication Technology, vol. 18, pp. 123-141, 2019.
A. Siswanto, N. Katuk, and K. R. Ku-Mahamud, "Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection," International Journal of Communication Networks and Information Security, vol. 12, pp. 1-9, 2020.
I. Velásquez, A. Caro, and A. Rodríguez, "Kontun: A Framework for recommendation of authentication schemes and methods," Information and Software Technology, vol. 96, pp. 27-37, 2017/11/09/ 2018.
M. Masdari and S. Ahmadzadeh, "A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems," Journal of Network and Computer Applications, vol. 87, pp. 1-19, 2017.
S. Asha and C. Chellappan, "Authentication of e-learners using multimodal biometric technology," in International Symposium on Biometrics and Security Technologies, 2008. ISBAST 2008 2008, pp. 1-6.
S. Seno, T. Sadakane, Y. Baba, T. Shikama, Y. Koui, and N. Nakaya, "A network authentication system with multi-biometrics," in Communications, 2003. APCC 2003. The 9th Asia-Pacific Conference on, 2003, pp. 914-918.
A. Ometov, S. Bezzateev, N. Mäkitalo, S. Andreev, T. Mikkonen, and Y. Koucheryavy, "Multi-Factor Authentication: A Survey," Cryptography, vol. 2, p. 1, 2018.
SAP. (n.d.). Authentication Scheme. Available: https://help.sap.com/doc/7ba199e10fdc488293db33f0709f9225/7.5.6/en-US/9052c43dac1bcf51e10000000a114084.html
P. K. Dhillon and S. Kalra, "A lightweight biometrics based remote user authentication scheme for IoT services," Journal of Information Security and Applications, vol. 34, pp. 255-270, 2017.
H. Zhu, J. Hu, S. Chang, and L. Lu, "ShakeIn: Secure User Authentication of Smartphones with Single-Handed Shakes," IEEE Transactions on Mobile Computing, vol. 16, pp. 2901-2912, 2017.
A. De Santis, M. Flores, and B. Masucci, "One-Message Unilateral Entity Authentication Schemes," presented at the Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, 2017.
I.-E. Liao, C.-C. Lee, and M.-S. Hwang, "A password authentication scheme over insecure networks," Journal of Computer and System Sciences, vol. 72, pp. 727-740, 2006.
T. Sahayini and M. Manikandan, "Enhancing the security of modern ICT systems with multimodal biometric cryptosystem and continuous user authentication," International Journal of Information and Computer Security, vol. 8, pp. 55-71, 2016.
D. Dasgupta, A. Roy, and A. Nag, "Multi-Factor Authentication," in Advances in User Authentication, ed: Springer, 2017, pp. 185-233.
M. J. Dillon, "Factors that influence adoption of multi-factored authentication within large organizations," PhD Dissertation, Capella University, 2015.
S. H. Khan, M. A. Akbar, F. Shahzad, M. Farooq, and Z. Khan, "Secure biometric template generation for multi-factor authentication," Pattern Recognition, vol. 48, pp. 458-472, 2015.
D. Dasgupta, A. Roy, and A. Nag, "Toward the design of adaptive selection strategies for multi-factor authentication," computers & security, vol. 63, pp. 85-116, 2016.
S. Kalra and S. K. Sood, "Secure authentication scheme for IoT and cloud servers," Pervasive and Mobile Computing, vol. 24, pp. 210-223, 2015.
P. Gope, R. Amin, S. K. Hafizul Islam, N. Kumar, and V. K. Bhalla, "Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment," Future Generation Computer Systems, 2017/07/03/ 2017.
F. Wu, L. Xu, S. Kumari, X. Li, J. Shen, K.-K. R. Choo, et al., "An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment," Journal of Network and Computer Applications, vol. 89, pp. 72-85, 2017/07/01/ 2017.
R. Amin, N. Kumar, G. P. Biswas, R. Iqbal, and V. Chang, "A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment," Future Generation Computer Systems, vol. 78, pp. 1005-1019, 2018/01/01/ 2018.
T. Maitra, M. S. Obaidat, R. Amin, S. Islam, S. A. Chaudhry, and D. Giri, "A robust ElGamal‐based password‐authentication protocol using smart card for client‐server communication," International Journal of Communication Systems, vol. 30, p. e3242, 2017.
Y. Yu, L. Hu, and J. Chu, "A secure authentication and key agreement scheme for iot-based cloud computing environment," Symmetry, vol. 12, 2020.
D. He, S. Zeadally, N. Kumar, and W. Wu, "Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures," IEEE Transactions on Information Forensics and Security, vol. 11, pp. 2052-2064, 2016.
M. Abadi, B. Blanchet, and C. Fournet, "The applied Pi calculus: Mobile values, new names, and secure communication," Journal of the ACM, vol. 65, 2017.
X. Allamigeon and B. Blanchet, "Reconstruction of attacks against cryptographic protocols," in Proceedings of the Computer Security Foundations Workshop, 2005, pp. 140-154.
K. Bhargavan, B. Blanchet, and N. Kobeissi, "Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate," in Proceedings - IEEE Symposium on Security and Privacy, 2017, pp. 483-502.
B. Blanchet, "Using horn clauses for analyzing security protocols," Cryptology and Information Security Series, vol. 5, pp. 86-111, 2011.
B. Blanchet, "Security protocol verification: Symbolic and computational models," Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7215 LNCS, pp. 3-29, 2012.
B. Blanchet, "Automatic Verification of Security Protocols in the Symbolic Model: The Verifier Proverif," Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8604, pp. 54-87, 2014.
B. Blanchet, M. Abadi, and C. Fournet, "Automated verification of selected equivalences for security protocols," in Proceedings - Symposium on Logic in Computer Science, 2005, pp. 331-340.
B. Blanchet, M. Abadi, and C. Fournet, "Automated verification of selected equivalences for security protocols," Journal of Logic and Algebraic Programming, vol. 75, pp. 3-51, 2008.
B. Blanchet and A. Chaudhuri, "Automated formal analysis of a protocol for secure file sharing on untrusted storage," in Proceedings - IEEE Symposium on Security and Privacy, 2008, pp. 417-431.
V. Cheval and B. Blanchet, "Proving more observational equivalences with ProVerif," Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7796 LNCS, pp. 226-246, 2013.
M. J. Bhuva and S. Singh, "Symmetric key-based authenticated encryption protocol," Information Security Journal, vol. 28, pp. 35-45, 2019.
C. Dai and Z. Xu, "A secure three-factor authentication scheme for multi-gateway wireless sensor networks based on elliptic curve cryptography," Ad Hoc Networks, vol. 127, 2022.
M. Xu, G. Xu, H. Xu, J. Zhou, and S. Li, "A decentralized lightweight authentication protocol under blockchain," Concurrency and Computation: Practice and Experience, vol. 34, 2022.
M. Ebrahimi, M. Bayat, and B. Zahednejad, "A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems," ISeCure, vol. 14, pp. 57-68, 2022.
M. Bhattacharya, S. Roy, A. K. Das, S. Chattopadhyay, S. Banerjee, and A. Mitra, "DDoS attack resisting authentication protocol for mobile based online social network applications," Journal of Information Security and Applications, vol. 65, 2022.
B. Hu, W. Tang, and Q. Xie, "A two-factor security authentication scheme for wireless sensor networks in IoT environments," Neurocomputing, vol. 500, pp. 741-749, 2022.
Copyright (c) 2022 Norliza Katuk, Roberto Vergallo, Tito Sugiharto, Rio Andriyat Krisdiawan
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Articles accepted for publication will be licensed under the Creative Commons BY-NC. Authors must sign a non-exclusive distribution agreement after article acceptance.
ISSN
1666-6038 (Online)
1666-6046 (Print)
Member of: