Privacy-Preserving Implicit Authentication Protocol Using Cosine Similarity for Internet of Things

被引:38
|
作者
Wei, Fushan [1 ,2 ]
Vijayakumar, Pandi [3 ]
Kumar, Neeraj [4 ,5 ,6 ,7 ]
Zhang, Ruijie [1 ,2 ]
Cheng, Qingfeng [1 ,2 ]
机构
[1] Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
[3] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Tindivanam 604001, India
[4] Deemed Univ, Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[5] Univ Petr & Energy Studies, Sch Comp Sci, Dehra Dun 248007, Uttarakhand, India
[6] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[7] King Abdulaziz Univ, Dept Comp & Informat, Jeddah, Saudi Arabia
基金
中国国家自然科学基金;
关键词
Authentication; Protocols; Servers; Privacy; Internet of Things; Biometrics (access control); Additive homomorphic encryption scheme; behavior features; implicit authentication; privacy protection;
D O I
10.1109/JIOT.2020.3031486
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things provides complicated value-added services to mobile intelligent terminal users. Different sensors collect various data from the users and transmit the data to the mobile intelligent terminal for storage. Consequently, a great amount of personal and sensitive information related to these rich and colorful applications is stored in the mobile intelligent terminal. Mobile intelligent terminals have become the prominent target of network attackers. Security breach and privacy leakage severely thread the application development of the Internet of Things. We present a privacy-preserving implicit authentication framework using users' behavior features sensed by the mobile intelligent terminal based on the artificial intelligence methodology. More precisely, we first summarize the security and privacy requirements for the security authentication of the mobile intelligent terminal. Then, we present a privacy-preserving implicit authentication framework using the cosine similarity and partial homomorphic public-key encryption scheme. Finally, a performance evaluation of the proposed protocol is conducted. The result shows that the communication and computation efficiency of our protocol is more efficient than other related protocols.
引用
收藏
页码:5599 / 5606
页数:8
相关论文
共 50 条
  • [21] Using TEEs to Build a Privacy-Preserving Internet of Things Ecosystem
    Gremaud, Pascal
    Durand, Arnaud
    Pasquier, Jacques
    [J]. ERCIM NEWS, 2021, (126): : 15 - 16
  • [22] A Lightweight Privacy-Preserving Authentication Protocol for VANETs
    Li, Xiong
    Liu, Tian
    Obaidat, Mohammad S.
    Wu, Fan
    Vijayakumar, Pandi
    Kumar, Neeraj
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (03): : 3547 - 3557
  • [23] A privacy preserving four-factor authentication protocol for internet of medical things
    Guo, Ping
    Liang, Wenfeng
    Xu, Shuilong
    [J]. COMPUTERS & SECURITY, 2024, 137
  • [24] Privacy-Preserving Channel Access for Internet of Things
    Banerjee, Debasmit
    Dong, Bo
    Taghizadeh, Mahmoud
    Biswas, Subir
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (05): : 430 - 445
  • [25] Privacy-Preserving Redactable Blockchain for Internet of Things
    Ren, Yanli
    Cai, Xianji
    Hu, Mingqi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [26] Privacy-preserving solutions in the Industrial Internet of Things
    Drosatos, George
    Rantos, Konstantinos
    Karampatzakis, Dimitris
    Lagkas, Thomas
    Sarigiannidis, Panagiotis
    [J]. 16TH ANNUAL INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS 2020), 2020, : 219 - 226
  • [27] PRIVACY-PRESERVING AUTHENTICATION USING FINGERPRINT
    Feng, Quan
    Su, Fei
    Cai, Anni
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (11): : 8001 - 8018
  • [28] Privacy-preserving authentication using fingerprint
    [J]. Feng, Q. (fquan@sina.com), 1600, ICIC International (08):
  • [29] Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication
    Han, Song
    Potdar, Vidyasagar
    Chang, Elizabeth
    Dillon, Tharam
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2007, 1 (01) : 35 - 46
  • [30] A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment
    Pu, Cong
    Wall, Andrew
    Choo, Kim-Kwang Raymond
    Ahmed, Imtiaz
    Lim, Sunho
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12): : 9918 - 9933