{"title":"物联网应用中基于生物识别的安全用户认证协议的密码分析","authors":"P. Ramalingam, P. Pabitha","doi":"10.1109/C2I456876.2022.10051341","DOIUrl":null,"url":null,"abstract":"In the 21st century various Biometric based user authentication schemes for Internet of Things network applications are evolving. As a part, Vinoth et al. proposed an Biometric authenticated key agreement scheme for industrial IoT. As the IoT environments are rapidly connecting with various public networks for the communication and data transfer, there are high chance for security attacks. The schemes used in these kind of IoT networks needs to maintain the security with lightweight operations. Validation of existing schemes are highly important to protect the environment. We cryptanalysis the Vinoth et al.'s scheme and identified a security design flaw. Their scheme is failed to protect the biometric and not achieving the key freshness. As a result, their scheme is vulnerable to Biometric template attack, user impersonation attack and failed to meet the user anonymity security feature. This work proposes a technique to address the flaws identified. The proposed scheme has been implemented and verified using the AVISPA simulator.","PeriodicalId":165055,"journal":{"name":"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Cryptanalysis of Biometric Based Secure User Authentication Protocol for IoT Applications\",\"authors\":\"P. Ramalingam, P. Pabitha\",\"doi\":\"10.1109/C2I456876.2022.10051341\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the 21st century various Biometric based user authentication schemes for Internet of Things network applications are evolving. As a part, Vinoth et al. proposed an Biometric authenticated key agreement scheme for industrial IoT. As the IoT environments are rapidly connecting with various public networks for the communication and data transfer, there are high chance for security attacks. The schemes used in these kind of IoT networks needs to maintain the security with lightweight operations. Validation of existing schemes are highly important to protect the environment. We cryptanalysis the Vinoth et al.'s scheme and identified a security design flaw. Their scheme is failed to protect the biometric and not achieving the key freshness. As a result, their scheme is vulnerable to Biometric template attack, user impersonation attack and failed to meet the user anonymity security feature. This work proposes a technique to address the flaws identified. The proposed scheme has been implemented and verified using the AVISPA simulator.\",\"PeriodicalId\":165055,\"journal\":{\"name\":\"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/C2I456876.2022.10051341\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/C2I456876.2022.10051341","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cryptanalysis of Biometric Based Secure User Authentication Protocol for IoT Applications
In the 21st century various Biometric based user authentication schemes for Internet of Things network applications are evolving. As a part, Vinoth et al. proposed an Biometric authenticated key agreement scheme for industrial IoT. As the IoT environments are rapidly connecting with various public networks for the communication and data transfer, there are high chance for security attacks. The schemes used in these kind of IoT networks needs to maintain the security with lightweight operations. Validation of existing schemes are highly important to protect the environment. We cryptanalysis the Vinoth et al.'s scheme and identified a security design flaw. Their scheme is failed to protect the biometric and not achieving the key freshness. As a result, their scheme is vulnerable to Biometric template attack, user impersonation attack and failed to meet the user anonymity security feature. This work proposes a technique to address the flaws identified. The proposed scheme has been implemented and verified using the AVISPA simulator.