dc.contributor.author | Hussain, Sajid | |
dc.contributor.author | Chaudhry, Shehzad Ashraf | |
dc.date.accessioned | 2023-11-10T12:41:08Z | |
dc.date.available | 2023-11-10T12:41:08Z | |
dc.date.issued | 2019 | en_US |
dc.identifier.issn | 2327-4662 | |
dc.identifier.uri | https://hdl.handle.net/11363/6335 | |
dc.description.abstract | Very recently, Das et al. (IEEE Internet of Things
Journal, pp. 4900–4913, 5(6), DOI: 10.1109/JIOT.2018.2877690,
2018) presented a biometric-based solution for security and privacy in Industrial Internet of Things architecture. Das et al.
claimed that their protocol is secure against known attacks.
However, this comment shows that their protocol is defenseless against stolen verifier, stolen smart device, and traceability
attacks. The attacker having access to public parameters and any
of the verifier and parameters stored in smart device can easily
expose the session key shared among the user and the smart
device. Moreover, their protocol fails to provide perfect forward
secrecy. Finally, this article also provides some necessary guidelines on attack resilience for the authentication schemes based
on merely the symmetric key primitives, which are overlooked
by Das et al. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141 | en_US |
dc.relation.isversionof | 10.1109/JIOT.2019.2934947 | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | Industrial Internet of Things (IIoT) | en_US |
dc.subject | insider attack | en_US |
dc.subject | perfect forward secrecy | en_US |
dc.subject | secret key expose | en_US |
dc.subject | stolen smart device | en_US |
dc.subject | stolen verifier attack | en_US |
dc.subject | key establishment | en_US |
dc.title | Comments on “Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment” | en_US |
dc.type | editorial | en_US |
dc.relation.ispartof | IEEE Internet of Things Journal | en_US |
dc.department | Mühendislik ve Mimarlık Fakültesi | en_US |
dc.authorid | https://orcid.org/0000-0003-1540-4940 | en_US |
dc.authorid | https://orcid.org/0000-0002-9321-6956 | en_US |
dc.identifier.volume | 6 | en_US |
dc.identifier.issue | 6 | en_US |
dc.identifier.startpage | 10936 | en_US |
dc.identifier.endpage | 10940 | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.institutionauthor | Chaudhry, Shehzad Ashraf | |