Abstract
In an era of tremendous development in information technology and the Internet of Things (IoT), security plays a key role in safety devices connected with the Internet. Authentication is vital in the security field, and to achieve a strong authentication scheme, there are several systems using a Multi-Factor Authentication (MFA) scheme based on a smart card, token, and biometric. However, these schemes have suffered from the extra cost; lost, stolen or broken factor, and malicious attacks. In this paper, we design an MFA protocol to be the authenticated administrator of IoT’s devices. The main components of our protocol are a smart mobile device and the fuzzy extractor of the administrator’s fingerprint. The information of the authenticated user is stored in an anomalous manner in mobile devices and servers to resist well-known attacks, and, as a result, the attacker fails to authenticate the system when they obtain a mobile device or password. Our work overcomes the above-mentioned issues and does not require extra cost for a fingerprint device. By using the AVISPA tool to analysis protocol security, the results are good and safe against known attacks.
Highlights
Computer networks and the Internet can be traced back to the 1960s and the late 1980s, respectively [1,2]
To implement and simulate the presented protocol on AVISPA, we focused on the main tool called Security Protocol Animator (SPAN) Version 1.6 on a computer system containing Windows
We executed our proposal protocol considering a minimal number of components included in Server–Client/Internet of Things (IoT) based on Dolev–Yao model with a restricted number of sessions, detected goal, On-the-Fly Model-Checker (OFMC) and Constraint-Logic based Attack
Summary
Computer networks and the Internet can be traced back to the 1960s and the late 1980s, respectively [1,2]. Biometrics (behavioral (behavioral andbiological biological characteristics), the smart mobile device, token device, and biometrics characteristics), thethe smart mobile device, tokentoken device, and smart biometrics (behavioraland and biological characteristics), smart mobile device, device, and smart card. This type of authentication scheme increases the security degree and allows for the card. This type of authentication scheme increases securitythe degree and allows theallows application of smart card This type of authentication scheme the increases security degreefor and for the application of identification, verification, and authentication for ensuring user authority. Verification, and authentication for ensuring user authority. Figure demonstrates the application of identification, verification, and authentication for ensuring user authority.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.