Abstract

In an era of tremendous development in information technology and the Internet of Things (IoT), security plays a key role in safety devices connected with the Internet. Authentication is vital in the security field, and to achieve a strong authentication scheme, there are several systems using a Multi-Factor Authentication (MFA) scheme based on a smart card, token, and biometric. However, these schemes have suffered from the extra cost; lost, stolen or broken factor, and malicious attacks. In this paper, we design an MFA protocol to be the authenticated administrator of IoT’s devices. The main components of our protocol are a smart mobile device and the fuzzy extractor of the administrator’s fingerprint. The information of the authenticated user is stored in an anomalous manner in mobile devices and servers to resist well-known attacks, and, as a result, the attacker fails to authenticate the system when they obtain a mobile device or password. Our work overcomes the above-mentioned issues and does not require extra cost for a fingerprint device. By using the AVISPA tool to analysis protocol security, the results are good and safe against known attacks.

Highlights

  • Computer networks and the Internet can be traced back to the 1960s and the late 1980s, respectively [1,2]

  • To implement and simulate the presented protocol on AVISPA, we focused on the main tool called Security Protocol Animator (SPAN) Version 1.6 on a computer system containing Windows

  • We executed our proposal protocol considering a minimal number of components included in Server–Client/Internet of Things (IoT) based on Dolev–Yao model with a restricted number of sessions, detected goal, On-the-Fly Model-Checker (OFMC) and Constraint-Logic based Attack

Read more

Summary

Introduction

Computer networks and the Internet can be traced back to the 1960s and the late 1980s, respectively [1,2]. Biometrics (behavioral (behavioral andbiological biological characteristics), the smart mobile device, token device, and biometrics characteristics), thethe smart mobile device, tokentoken device, and smart biometrics (behavioraland and biological characteristics), smart mobile device, device, and smart card. This type of authentication scheme increases the security degree and allows for the card. This type of authentication scheme increases securitythe degree and allows theallows application of smart card This type of authentication scheme the increases security degreefor and for the application of identification, verification, and authentication for ensuring user authority. Verification, and authentication for ensuring user authority. Figure demonstrates the application of identification, verification, and authentication for ensuring user authority.

Multi-factor
Related Work
Symbols Used
Cryptography Concepts
Our Proposed Protocol
Registration Phase
Login Phase
Change Password Phase
Security
Security Analysis
Experimental Results
AVISPA
Comparison with Other Related Works
Performance Comparisons
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.