Secure Path: Block-Chaining IoT Information for Continuous Authentication in Smart Spaces
نویسندگان
چکیده
The Internet of Things offers a wide range possibilities that can be exploited more or less explicitly for user authentication, ranging from specifically designed systems including biometric devices to environmental sensors opportunistically used feed behavioural authentication systems. How integrate all this information in reliable way get continuous service presents several open challenges. Among these: how combine semi-trusted coming non-tamper-proof sensors, where store such data avoiding single point failure, analyse distributed way, which interface use provide an multitude different services and applications. In paper, we present Blockchain-based architectural solution system able transform IoT interactions into useful system. design includes: (i) security procedure certify users’ positions identities, (ii) secure storage hold information, (iii) dynamically assign trust level user’s position. We call “Secure Path”.
منابع مشابه
SEA: A Secure and Efficient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways
In this paper, a secure and efficient authentication and authorization architecture for IoT-based healthcare is developed. Security and privacy of patients’ medical data are crucial for the acceptance and ubiquitous use of IoT in healthcare. Secure authentication and authorization of a remote healthcare professional is the main focus of this work. Due to resource constraints of medical sensors,...
متن کاملSecure continuous biometric-enhanced authentication
Biometrics have the potential to solidify person-authentication by examining "unforgeable" features of individuals. This paper explores issues involved with effective integration of biometric-enhanced authentication into computer systems and design options for addressing them. Because biometrics are not secrets, systems must not use them like passwords; otherwise, biometric-based authentication...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملOn the Security of Cipher Block Chaining Message Authentication Code
In [4], Bernstein presented a simple proof of security of Cipher Block Chaining (CBC) Message Authentication Code (MAC) against adversaries querying messages all of which are of the same length. In this paper we show that Bernstein’s proof can be used to prove security of CBC MAC against adversaries querying non-empty messages that are not prefixes of each other. This implies that “length-prepe...
متن کاملThe Security of the Cipher Block Chaining Message Authentication Code
Let F be some block cipher (eg., DES) with block length l. The Cipher Block Chaining Message Authentication Code (CBC MAC) speci es that an m-block message x = x1 xm be authenticated among parties who share a secret key a for the block cipher by tagging x with a pre x of ym, where y0 = 0 l and yi = Fa(mi yi 1) for i = 1; 2; : : : ;m. This method is a pervasively used international and U.S. stan...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Iot
سال: 2021
ISSN: ['2624-831X']
DOI: https://doi.org/10.3390/iot2020017