Skip to main content

A Novel User Authentication Protocol Using Biometric Data for IoT Networks

  • Conference paper
  • First Online:
Rising Threats in Expert Applications and Solutions

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1187))

Abstract

Internet-based client authentication protocols must be strengthened to reduce attacks and security vulnerabilities that threaten the performance of apps in fast Internet distribution and cloud computing. For secure access to services, IoT safety is thus of critical importance. High safety encryption with dual factors will be provided. This article offers a mobile user authentication with flexible biometric authentication and a core entry management framework for IoT services. The proposed system provides mutual encryption and an integral arrangement that ensures safe access to cloud servers. The legislation preserves anonymous user identity against the eavesdroppers, guarantees the security of the session key, and responds to the challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. S. Challa, M. Wazid, A.K. Das, N. Kumar, A.G. Reddy, E.J. Yoon, K.Y. Yoo, Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 5, 3028–3043 (2017)

    Article  Google Scholar 

  2. M. Wazid, A.K. Das, V. Odelu, N. Kumar, M. Conti, M. Jo, Design of secure user authenticated key management protocol for generic IoT networks. IEEE Internet of Things J. 5(1), 269–282 (2018)

    Article  Google Scholar 

  3. Maissa Dammak, Omar Rafik Merad Boudia (Token-based lightweight authentication to secure IoT networks, IEEE CCNC, 2019)

    Google Scholar 

  4. Y. Park, Y. Park, Three-factor user authentication and key agreement using elliptic curve cryptosystem in wireless sensor networks. Sensors 16(12), 2123 (2017)

    Article  Google Scholar 

  5. L. Atzori, A. Iera, G. Morabito, The internet of things: a survey. Comput. Netw. (2010)

    Google Scholar 

  6. H. Li, X. Zhou, Study on security architecture for Internet of Things. in Applied Informatics and Communication (Springer, Berlin, 2011), pp. 404–411

    Google Scholar 

  7. H.D. Ma, IOT: objectives and scientific challenges. J. Comput. Sci. Technol. (2011)

    Google Scholar 

  8. M. Thoma, S. Meyer, K. Sperner, S. Meissner, T. Braun, On iot-services: survey, classification and enterprise integration, in 2012 IEEE International Conference on Green Computing and Communications (GreenCom), November 2012. (IEEE, 2012), pp. 257–260

    Google Scholar 

  9. K.T. Nguyen, M. Laurent, N. Oualha, Survey on secure communication protocols for the Internet of Things. Ad Hoc Netw. (2015)

    Google Scholar 

  10. C.X. Ren, Y.B. Gong, F. Hao, X.Y. Cai, Y.X. Wu, When biometrics meet IoT: a survey, in Proceedings of the 6th International Asia Conference on Industrial Engineering and Management Innovation (Atlantis Press, 2016), pp. 635–643

    Google Scholar 

  11. J.K. Lee, S.R. Ryu, K.Y. Yoo, Fingerprint-based remote user authentication scheme using smart cards. Electron Lett. (2002)

    Google Scholar 

  12. C.H. Lin, Y.Y. Lai, A flexible biometrics remote user authentication scheme. Comput. Stand Interfaces (2004)

    Google Scholar 

  13. L. Chen, F. Wei, C. Ma, A secure user authentication scheme against smart-card loss attack for WSN using symmetric key techniques. Int. J. Distrib. Sens. Netw. 2015

    Google Scholar 

  14. A.K. Das, A. Goswami, A robust anonymous biometric-based remote user authentication scheme using smart cards. J. King Saud Univ.-Comput. Inf. Sci. (2015)

    Google Scholar 

  15. Y. An, Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards. BioMed Res. Int. (2012)

    Google Scholar 

  16. C.T. Li, M.S. Hwang, An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. (2010)

    Google Scholar 

  17. Y.P. Liao, C.M. Hsiao, A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw. (2014)

    Google Scholar 

  18. B. Ndibanje, H.J. Lee, S.G. Lee, Security analysis and improvements of authentication and access control in the internet of things. Sensors (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Kameswara Rao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kameswara Rao, M., Santhi, S.G. (2021). A Novel User Authentication Protocol Using Biometric Data for IoT Networks. In: Rathore, V.S., Dey, N., Piuri, V., Babo, R., Polkowski, Z., Tavares, J.M.R.S. (eds) Rising Threats in Expert Applications and Solutions. Advances in Intelligent Systems and Computing, vol 1187. Springer, Singapore. https://doi.org/10.1007/978-981-15-6014-9_11

Download citation

Publish with us

Policies and ethics