Two-Factor Authentication and Key Agreement Schemes for Smart Home Fingerprint Characteristics

被引:0
|
作者
Liu, Zhenpeng [1 ]
Li, Zeyuan [1 ]
Zhang, Qingwen [1 ]
Dong, Shuhui [1 ]
Liu, Jiahang [1 ]
Zhao, Yonggang [2 ]
机构
[1] Hebei Univ, Sch Elect Informat Engn, hbu, cn, Baoding 071002, Hebei, Peoples R China
[2] Hebei Univ Engn, Sch Management Engn & Business,hebeu,edu,cn, Handan 056038, Hebei, Peoples R China
关键词
USER AUTHENTICATION; NETWORKS; PROTOCOL; INTERNET; PRIVACY;
D O I
10.1155/2022/4184433
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Aiming at the potential security threat of personal information disclosure in smart homes, a two-factor authentication and key protocol scheme based on fingerprint feature was designed to ensure privacy and secure communication in a smart home environment. The scheme consisted of fingerprint authentication and a key protocol. Fingerprint features were extracted by fuzzy processor to ensure the stability of fingerprint features and effectively prevent the failure of fingerprint extraction caused by subtle changes. The key protocol was used to ensure the security of the communication process. Through performance comparison and security analysis, it was proved that the proposed scheme can meet the security requirements.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Two-Factor Authentication and Key Agreement Schemes for Smart Home Fingerprint Characteristics
    Liu, Zhenpeng
    Li, Zeyuan
    Zhang, Qingwen
    Dong, Shuhui
    Liu, Jiahang
    Zhao, Yonggang
    [J]. Mobile Information Systems, 2022, 2022
  • [2] Robust two-factor authentication and key agreement preserving user privacy
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Yang, Li
    [J]. International Journal of Network Security, 2014, 16 (03) : 229 - 240
  • [3] User-centric Two-factor Authentication Key Agreement Protocol
    Yang, Xue
    Liu, Yi-Jing
    Jiang, Qi
    Wang, Jin-Hua
    Li, Xing-Hua
    [J]. Ruan Jian Xue Bao/Journal of Software, 2024, 35 (10): : 4859 - 4875
  • [4] Two-factor mutual authentication with key agreement in wireless sensor networks
    Vaidya, Binod
    Makrakis, Dimitrios
    Mouftah, Hussein
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (02) : 171 - 183
  • [5] Cryptanalysis and improvement of a two-factor user authentication scheme for smart home
    Kaur, Damandeep
    Kumar, Devender
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [6] Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol
    Xie, Qi
    Dong, Na
    Wong, Duncan S.
    Hu, Bin
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (03) : 478 - 487
  • [7] A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme
    Chandrakar, Preeti
    Om, Hari
    [J]. INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2016, 12 (02) : 62 - 79
  • [8] Two-factor authentication schemes based smart card and password with user anonymity
    Cao, Tianjie
    Huang, Shi
    [J]. Journal of Computational Information Systems, 2013, 9 (21): : 8831 - 8838
  • [9] Robust Two-factor Smart Card Authentication
    Candan, Omer Mert
    Levi, Albert
    [J]. 2017 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2017, : 184 - 188
  • [10] Two-Factor User Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem
    Qu, Juan
    Tan, Xiao-Ling
    [J]. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2014, 2014