EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid

被引:25
|
作者
Ma, Zhuo [1 ]
Yang, Yilong [1 ]
Liu, Ximeng [2 ,3 ]
Liu, Yang [1 ]
Ma, Siqi [4 ]
Ren, Kui [5 ]
Yao, Chang [6 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350002, Peoples R China
[3] Key Lab Informat Secur Network Syst, Fuzhou 350116, Fujian, Peoples R China
[4] CSIRO Marsfield Site, Data 61, Marsfield, NSW 2122, Australia
[5] Zhejiang Univ, Inst Cyberspace Res, Hangzhou 310027, Zhejiang, Peoples R China
[6] Natl Nat Sci Fdn China, Beijing 100085, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Iris recognition; Smart grids; Informatics; Elliptic curves; Industries; biometric; eye-movement trajectory; iris recognition; smart grid; USER AUTHENTICATION; PRIVACY; BIOMETRICS;
D O I
10.1109/TII.2019.2946047
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of Industry 4.0, the communication of smart grid has recently been taken seriously to ensure secure communication between operator and control center. However, the authentication process between them faces many challenges. Once the attacker successfully authenticated in the control center, the privacy data in the smart grid may leak and cause irreparable damage to the user. In addition, operator authentication is one of the most basic and crucial processes. Therefore, we propose the eye-movement and iris recognition based authentication (EmIr-Auth), a novel biometrics-based remote operator authentication scheme. EmIr-Auth uses the recorded eye-movement trajectory and randomly selected iris image to authenticate operators, which is beneficial in that it is able to get rid of many cryptographic computations, as well as the need to minimize message exchange. Furthermore, except for a high-resolution camera, we do not require any additional biometric sensors in this scheme. Using the Burrows-Abadi-Needham logic, in this article, we demonstrate that our scheme provides secure authentication. Moreover, we analyze the attacks that EmIr-Auth can resist by informal security analysis. Experimental results show that EmIr-Auth is efficient enough to deploy on portable devices and reduce the overhead of authentication procedure.
引用
收藏
页码:6597 / 6606
页数:10
相关论文
共 1 条
  • [1] Iris-based remote user authentication scheme using smart cards
    Sun, Hong-Wei
    Lam, Kwok-Yan
    Gu, Ming
    Sun, Jia-Guang
    [J]. 2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 476 - +