Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud
Autor: | Mustafa A. Al Sibahee, Mohammed Abdulridha Hussain, Zaid Ameen Abduljabbar, Ahmed Abdulelah Jasim Al-ashoor, Erasmus (Xin) Liu, Zaid Alaa Hussien, Songfeng Lu, Yanli Ran |
---|---|
Rok vydání: | 2020 |
Předmět: |
Authentication
Computer science 020206 networking & telecommunications 02 engineering and technology RC4 Computer security computer.software_genre Data integrity 0202 electrical engineering electronic engineering information engineering Code (cryptography) Key (cryptography) 020201 artificial intelligence & image processing Session (computer science) computer Anonymity |
Zdroj: | ICSPCC |
DOI: | 10.1109/icspcc50002.2020.9259519 |
Popis: | Document integrity and origin for E2E S2S in IoTcloud have recently received considerable attention because of their importance in the real-world fields. Maintaining integrity could protect decisions made based on these message/image documents. Authentication and integrity solutions have been conducted to recognise or protect any modification in the exchange of documents between E2E S2S (smart-to-smart). However, none of the proposed schemes appear to be sufficiently designed as a secure scheme to prevent known attacks or applicable to smart devices. We propose a robust scheme that aims to protect the integrity of documents for each users session by integrating HMAC-SHA-256, handwritten feature extraction using a local binary pattern, one-time random pixel sequence based on RC4 to randomly hide authentication codes using LSB. The proposed scheme can provide users with one-time bio-key, robust message anonymity and a disappearing authentication code that does not draw the attention of eavesdroppers. Thus, the scheme improves the data integrity for a users messages/image documents, phase key agreement, bio-key management and a one-time message/image document code for each users session. The concept of stego-anonymity is also introduced to provide additional security to cover a hashed value. Finally, security analysis and experimental results demonstrate and prove the invulnerability and efficiency of the proposed scheme. |
Databáze: | OpenAIRE |
Externí odkaz: |