Security Authentication Scheme Based on Certificateless Signature and Fingerprint Recognition

Author(s):  
Zhu Yanqiong ◽  
Xu Hui ◽  
Gao Zhan
IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 55372-55379 ◽  
Author(s):  
Zhonglin Chen ◽  
Shanzhi Chen ◽  
Hui Xu ◽  
Bo Hu

Symmetry ◽  
2021 ◽  
Vol 13 (1) ◽  
pp. 125
Author(s):  
Yang Li ◽  
Xinyu Yun ◽  
Liming Fang ◽  
Chunpeng Ge

Access management of IoT devices is extremely important, and a secure login authentication scheme can effectively protect users’ privacy. However, traditional authentication schemes are threatened by shoulder-surfing attacks, and biometric-based schemes, such as fingerprint recognition and face recognition, that are commonly used today can also be cracked. Researchers have proposed some schemes for current attacks, but they are limited by usability. For example, the login authentication process requires additional device support. This method solves the problem of attacks, but it is unusable, which limits its application. At present, most authentication schemes for the Internet of Things and mobile platforms either focus on security, thus ignoring availability, or have excellent convenience but insufficient security. This is a symmetry problem worth exploring. Therefore, users need a new type of login authentication scheme that can balance security and usability to protect users’ private data or maintain device security. In this paper, we propose a login authentication scheme named PinWheel, which combines a textual password, a graphical password, and biometrics to prevent both shoulder-surfing attacks and smudge attacks and solves the current schemes’ lack of usability. We implemented PinWheel and evaluated it from the perspective of security and usability. The experiments required 262 days, and 573 subjects participated in our investigation. The evaluation results show that PinWheel can at least effectively resist both mainstream attacks and is superior to most existing schemes in terms of usability.


Biometrics,One Among the existing security authentication schemes, involves parts of body for identification, hence used in various fields. Due to the level of its simplicity fingerprint recognition remains popular. But the introduction of many technologies has made to lose its uniqueness by just taking a finger print scan, print it on special paper and then swipe. This project is mainly designed to new optical method, which is based on liveness detection on fingers. Infrared pulse sensor which is a new method is employed to enhance image contrast of the finger vein and to know the pattern of blood flow for liveness detection.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Jingyi Li ◽  
Yujue Wang ◽  
Yong Ding ◽  
Wanqing Wu ◽  
Chunhai Li ◽  
...  

In unmanned aerial vehicle networks (UAVNs), unmanned aerial vehicles with restricted computing and communication capabilities can perform tasks in collaborative manner. However, communications in UAVN confront many security issues, for example, malicious entities may launch impersonate attacks. In UAVN, the command center (CMC) needs to perform mutual authentication with unmanned aerial vehicles in clusters. The aggregator (AGT) can verify the authenticity of authentication request from CMC; then, the attested authentication request is broadcasted to the reconnaissance unmanned aerial vehicle (UAV) in the same cluster. The authentication responses from UAVs can be verified and aggregated by AGT before being sent to CMC for validation. Also, existing solutions cannot resist malicious key generation center (KGC). To address these issues, this paper proposes a pairing-free authentication scheme (CLAS) for UAVNs based on the certificateless signature technology, which supports batch verification at both AGT and CMC sides so that the verification efficiency can be improved greatly. Security analysis shows that our CLAS scheme can guarantee the unforgeability for (attested) authentication request and (aggregate) responses in all phases. Performance analysis indicates that our CLAS scheme enjoys practical efficiency.


2021 ◽  
Vol 60 (1) ◽  
pp. 435-446
Author(s):  
Kehe Wu ◽  
Rui Cheng ◽  
Wenchao Cui ◽  
Wei Li

Sign in / Sign up

Export Citation Format

Share Document