An Integrated Two-Factor Authentication Scheme for Smart Communications and Control Systems

  • Trong-Minh Hoang Telecommunication faculty 1, Posts and Telecommunications Institute of Technology, Hanoi, 100000, Vietnam
  • Van-Hau Bui Electronic Faculty, The University of Econ-Tech for Industries, 456 Minh Khai Street, Hanoi, 100000, Vietnam
  • Nam-Hoang Nguyen University of Engineering and Technology, Vietnam National University, Hanoi, 100000, Vietnam
Keywords: Security, Authentication, Watermarking Technique, Face Recognition, Smart-home

Abstract

Fast and reliable authentication is a crucial requirement of communications networks and has various research challenges in an Internet of Things (IoT) environment. In IoT-based applications, as fast and user-friendly access and high security are required simultaneously, biometric identification of the user, such as the face, iris, or fingerprint, is broadly employed as an authentication approach. Moreover, a so-called multi-factor authentication that combines user identification with other identification information, including token information and device identity, is used
to enhance the authentication security level. This paper proposes a novel twofactor authentication scheme for intelligent communication and control systems by utilizing the watermarking technique to incorporate the mobile device authentication component into the user’s facial recognition image. Our proposed scheme offers user-friendliness while improving user security and privacy and reducing authentication information exchange procedures to provide a secure and lightweight schema in real applications. The proposed scheme’s security advantages are validated using the widely accepted Burrows–Abadi–Needham (BAN) logic and experimentally assessed using the Automated Validation of Internet Security Protocols and Applications (AVISPA) simulator tool. Finally, our experimental results show that the proposed authentication scheme is an innovative solution for a smarthome control system, such as a smart lock door operation.

References

Face recognition. https://github.com/ ageitgey/face_recognition. Accessed: 12, Jan 2022.

Abdulla, A. I., Abdulraheem, A. S., Salih, A. A., Sadeeq, M., Ahmed, A. J., Ferzor, B. M., Sardar, O. S., and Mohammed, S. I. Internet of things and smart home security. Technol. Rep. Kansai Univ 62, 5 (2020), 2465–2476.

Aparna, J., and Ayyappan, S. Image watermarking using diffie hellman key exchange algorithm. Procedia Computer Science 46 (2015), 1684–1691.

Bal, S. N., Nayak, M. R., and Sarkar, S. K. On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching. Journal of King Saud UniversityComputer and Information Sciences 33, 5 (2021), 552–561.

Burrows, M., Abadi, M., and Needham, R. M. A logic of authentication. Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences 426, 1871 (1989), 233–271.

Cortes, C., and Vapnik, V. Support-vector networks. Machine learning 20, 3 (1995), 273–297.

Halim, M. A. A., Othman, M. F. I., Abidin, A. Z. Z., Hamid, E., Harum, N., and Shah, W. M. Face recognition-based door locking system with two-factor authentication using opencv, In 2021 Sixth International Conference on Informatics and Computing (ICIC) (2021), IEEE, pp. 1–7.

Hoang, T.-M., Bui, V.-H., and Nguyen, N.-T. A lightweight multi-factor authentication scheme based on digital watermarking technique. In 2021 International Conference on Advanced Technologies for Communications (ATC) (2021), pp. 270–274.

Kabir, M., et al. An efficient low bit rate image watermarking and tamper detection for image authentication. SN Applied Sciences 3, 4 (2021), 1–17.

Kaur, D., and Kumar, D. Cryptanalysis and improvement of a two-factor user authentication scheme for smart home. Journal of Information Security and Applications 58 (2021), 102787.

Mohanarathinam, A., Kamalraj, S., Prasanna Venkatesan, G., Ravi, R. V., and Manikandababu, C. Digital watermarking techniques for image security: a review. Journal of Ambient Intelligence and Humanized Computing 11, 8 (2020), 3221–3229.

Munir, A., Ehsan, S. K., Raza, S. M., and Mudassir, M. Face and speech recognition based smart home. In 2019 International Conference on Engineering and Emerging Technologies (ICEET) (2019), IEEE, pp. 1–5.

Panwar, N., Sharma, S., Mehrotra, S., Krzywiecki, L., and Venkatasubramanian, N. Smart home survey on security and privacy. arXiv preprint arXiv:1904.05476 (2019).

Shuai, M., Yu, N., Wang, H., and Xiong, L. Anonymous authentication scheme for smart home environment with provable security. Computers & Security 86 (2019), 132–146.

Sureshkumar, V., Amin, R., Vijaykumar, V., and Sekar, S. R. Robust secure communication protocol for smart healthcare system with fpga implementation. Future Generation Computer Systems 100 (2019), 938–951.

Vigano, L. Automated security protocol analysis with the avispa tool. Electronic Notes in Theoretical Computer Science 155 (2006), 61–86.

Wahyudono, B., and Ogi, D. Implementation of two factor authentication based on rfid and face recognition using lbp algorithm on access control system. In 2020 International Conference on ICT for Smart Society (ICISS) (2020), IEEE, pp. 1–6.

Wazid, M., Das, A. K., Odelu, V., Kumar, N., and Susilo, W. Secure remote user authenticated key establishment protocol for smart home environment. IEEE Transactions on Dependable and Secure Computing 17, 2 (2017), 391–406.

Wu, F., Xu, L., Kumari, S., and Li, X. An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multimedia Systems 23, 2 (2017), 195–205.

Xiong, W., Zhou, F., Wang, R., Lan, R., Sun, X., and Luo, X. An efficient and secure two-factor password authentication scheme with card reader (terminal) verification. IEEE Access 6 (2018), 70707–70719.

Yuan, B., Du, C., Wang, Z., and Zhu, R. Research on intelligent algorithm of identity authentication based on facial features. Wireless Communications and Mobile Computing 2021 (2021).

Zhang, J., Tan, X., Wang, X., Yan, A., and Qin, Z. T2fa: Transparent two-factor authentication. IEEE Access 6 (2018), 32677–32686.

Published
2023-12-20
How to Cite
[1]
Hoang, T.-M., Bui, V.-H. and Nguyen, N.-H. 2023. An Integrated Two-Factor Authentication Scheme for Smart Communications and Control Systems. MENDEL. 29, 2 (Dec. 2023), 181-190. DOI:https://doi.org/10.13164/mendel.2023.2.181.
Section
Research articles