An Integrated Two-Factor Authentication Scheme for Smart Communications and Control Systems
Fast and reliable authentication is a crucial requirement of communications networks and has various research challenges in an Internet of Things (IoT) environment. In IoT-based applications, as fast and user-friendly access and high security are required simultaneously, biometric identification of the user, such as the face, iris, or fingerprint, is broadly employed as an authentication approach. Moreover, a so-called multi-factor authentication that combines user identification with other identification information, including token information and device identity, is used
to enhance the authentication security level. This paper proposes a novel twofactor authentication scheme for intelligent communication and control systems by utilizing the watermarking technique to incorporate the mobile device authentication component into the user’s facial recognition image. Our proposed scheme offers user-friendliness while improving user security and privacy and reducing authentication information exchange procedures to provide a secure and lightweight schema in real applications. The proposed scheme’s security advantages are validated using the widely accepted Burrows–Abadi–Needham (BAN) logic and experimentally assessed using the Automated Validation of Internet Security Protocols and Applications (AVISPA) simulator tool. Finally, our experimental results show that the proposed authentication scheme is an innovative solution for a smarthome control system, such as a smart lock door operation.
Face recognition. https://github.com/ ageitgey/face_recognition. Accessed: 12, Jan 2022.
Abdulla, A. I., Abdulraheem, A. S., Salih, A. A., Sadeeq, M., Ahmed, A. J., Ferzor, B. M., Sardar, O. S., and Mohammed, S. I. Internet of things and smart home security. Technol. Rep. Kansai Univ 62, 5 (2020), 2465–2476.
Aparna, J., and Ayyappan, S. Image watermarking using diffie hellman key exchange algorithm. Procedia Computer Science 46 (2015), 1684–1691.
Bal, S. N., Nayak, M. R., and Sarkar, S. K. On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching. Journal of King Saud UniversityComputer and Information Sciences 33, 5 (2021), 552–561.
Burrows, M., Abadi, M., and Needham, R. M. A logic of authentication. Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences 426, 1871 (1989), 233–271.
Cortes, C., and Vapnik, V. Support-vector networks. Machine learning 20, 3 (1995), 273–297.
Halim, M. A. A., Othman, M. F. I., Abidin, A. Z. Z., Hamid, E., Harum, N., and Shah, W. M. Face recognition-based door locking system with two-factor authentication using opencv, In 2021 Sixth International Conference on Informatics and Computing (ICIC) (2021), IEEE, pp. 1–7.
Hoang, T.-M., Bui, V.-H., and Nguyen, N.-T. A lightweight multi-factor authentication scheme based on digital watermarking technique. In 2021 International Conference on Advanced Technologies for Communications (ATC) (2021), pp. 270–274.
Kabir, M., et al. An efficient low bit rate image watermarking and tamper detection for image authentication. SN Applied Sciences 3, 4 (2021), 1–17.
Kaur, D., and Kumar, D. Cryptanalysis and improvement of a two-factor user authentication scheme for smart home. Journal of Information Security and Applications 58 (2021), 102787.
Mohanarathinam, A., Kamalraj, S., Prasanna Venkatesan, G., Ravi, R. V., and Manikandababu, C. Digital watermarking techniques for image security: a review. Journal of Ambient Intelligence and Humanized Computing 11, 8 (2020), 3221–3229.
Munir, A., Ehsan, S. K., Raza, S. M., and Mudassir, M. Face and speech recognition based smart home. In 2019 International Conference on Engineering and Emerging Technologies (ICEET) (2019), IEEE, pp. 1–5.
Panwar, N., Sharma, S., Mehrotra, S., Krzywiecki, L., and Venkatasubramanian, N. Smart home survey on security and privacy. arXiv preprint arXiv:1904.05476 (2019).
Shuai, M., Yu, N., Wang, H., and Xiong, L. Anonymous authentication scheme for smart home environment with provable security. Computers & Security 86 (2019), 132–146.
Sureshkumar, V., Amin, R., Vijaykumar, V., and Sekar, S. R. Robust secure communication protocol for smart healthcare system with fpga implementation. Future Generation Computer Systems 100 (2019), 938–951.
Vigano, L. Automated security protocol analysis with the avispa tool. Electronic Notes in Theoretical Computer Science 155 (2006), 61–86.
Wahyudono, B., and Ogi, D. Implementation of two factor authentication based on rfid and face recognition using lbp algorithm on access control system. In 2020 International Conference on ICT for Smart Society (ICISS) (2020), IEEE, pp. 1–6.
Wazid, M., Das, A. K., Odelu, V., Kumar, N., and Susilo, W. Secure remote user authenticated key establishment protocol for smart home environment. IEEE Transactions on Dependable and Secure Computing 17, 2 (2017), 391–406.
Wu, F., Xu, L., Kumari, S., and Li, X. An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multimedia Systems 23, 2 (2017), 195–205.
Xiong, W., Zhou, F., Wang, R., Lan, R., Sun, X., and Luo, X. An efficient and secure two-factor password authentication scheme with card reader (terminal) verification. IEEE Access 6 (2018), 70707–70719.
Yuan, B., Du, C., Wang, Z., and Zhu, R. Research on intelligent algorithm of identity authentication based on facial features. Wireless Communications and Mobile Computing 2021 (2021).
Zhang, J., Tan, X., Wang, X., Yan, A., and Qin, Z. T2fa: Transparent two-factor authentication. IEEE Access 6 (2018), 32677–32686.
Copyright (c) 2023 MENDEL
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
MENDEL open access articles are normally published under a Creative Commons Attribution-NonCommercial-ShareAlike (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ . Under the CC BY-NC-SA 4.0 license permitted 3rd party reuse is only applicable for non-commercial purposes. Articles posted under the CC BY-NC-SA 4.0 license allow users to share, copy, and redistribute the material in any medium of format, and adapt, remix, transform, and build upon the material for any purpose. Reusing under the CC BY-NC-SA 4.0 license requires that appropriate attribution to the source of the material must be included along with a link to the license, with any changes made to the original material indicated.