Privacy-Preserving Implicit Authentication Protocol Using Cosine Similarity for Internet of Things

被引:38
|
作者
Wei, Fushan [1 ,2 ]
Vijayakumar, Pandi [3 ]
Kumar, Neeraj [4 ,5 ,6 ,7 ]
Zhang, Ruijie [1 ,2 ]
Cheng, Qingfeng [1 ,2 ]
机构
[1] Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
[3] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Tindivanam 604001, India
[4] Deemed Univ, Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[5] Univ Petr & Energy Studies, Sch Comp Sci, Dehra Dun 248007, Uttarakhand, India
[6] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[7] King Abdulaziz Univ, Dept Comp & Informat, Jeddah, Saudi Arabia
基金
中国国家自然科学基金;
关键词
Authentication; Protocols; Servers; Privacy; Internet of Things; Biometrics (access control); Additive homomorphic encryption scheme; behavior features; implicit authentication; privacy protection;
D O I
10.1109/JIOT.2020.3031486
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things provides complicated value-added services to mobile intelligent terminal users. Different sensors collect various data from the users and transmit the data to the mobile intelligent terminal for storage. Consequently, a great amount of personal and sensitive information related to these rich and colorful applications is stored in the mobile intelligent terminal. Mobile intelligent terminals have become the prominent target of network attackers. Security breach and privacy leakage severely thread the application development of the Internet of Things. We present a privacy-preserving implicit authentication framework using users' behavior features sensed by the mobile intelligent terminal based on the artificial intelligence methodology. More precisely, we first summarize the security and privacy requirements for the security authentication of the mobile intelligent terminal. Then, we present a privacy-preserving implicit authentication framework using the cosine similarity and partial homomorphic public-key encryption scheme. Finally, a performance evaluation of the proposed protocol is conducted. The result shows that the communication and computation efficiency of our protocol is more efficient than other related protocols.
引用
收藏
页码:5599 / 5606
页数:8
相关论文
共 50 条
  • [1] A privacy-preserving code-based authentication protocol for Internet of Things
    Noureddine Chikouche
    Pierre-Louis Cayrel
    El Hadji Modou Mboup
    Brice Odilon Boidje
    [J]. The Journal of Supercomputing, 2019, 75 : 8231 - 8261
  • [2] A privacy-preserving code-based authentication protocol for Internet of Things
    Chikouche, Noureddine
    Cayrel, Pierre-Louis
    Mboup, El Hadji Modou
    Boidje, Brice Odilon
    [J]. JOURNAL OF SUPERCOMPUTING, 2019, 75 (12): : 8231 - 8261
  • [3] Privacy-Preserving Delegable Authentication in the Internet of Things
    Gritti, Clementine
    Onen, Melek
    Molva, Refik
    [J]. SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 861 - 869
  • [4] Ibn Sina: A patient privacy-preserving authentication protocol in medical internet of things
    Rasslan, Mohamed
    Nasreldin, Mahmoud M.
    Aslan, Heba K.
    [J]. COMPUTERS & SECURITY, 2022, 119
  • [5] Privacy-Preserving Implicit Authentication
    Safa, Nashad Ahmed
    Safavi-Naini, Reihaneh
    Shahandashti, Siamak F.
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 471 - 484
  • [6] A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles
    Aman, Muhammad Naveed
    Javaid, Uzair
    Sikdar, Biplab
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (02) : 1123 - 1139
  • [7] A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things
    Diksha Rangwani
    Dipanwita Sadhukhan
    Sangram Ray
    Muhammad Khurram Khan
    Mou Dasgupta
    [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 1548 - 1571
  • [8] FTP: An Approximate Fast Privacy-Preserving Equality Test Protocol for Authentication in Internet of Things
    Zhu, Youwen
    Zhang, Yue
    Yuan, Jiabin
    Wang, Xianmin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [9] A blockchain-enabled privacy-preserving authentication management protocol for Internet of Medical Things
    Miao, Junfeng
    Wang, Zhaoshun
    Wu, Zeqing
    Ning, Xin
    Tiwari, Prayag
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2024, 237
  • [10] A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things
    Rangwani, Diksha
    Sadhukhan, Dipanwita
    Ray, Sangram
    Khan, Muhammad Khurram
    Dasgupta, Mou
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1548 - 1571