The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy
1
Department of Computer Science, Faculty of Mathematics and Computer Science, Kharazmi University, Tehran, Iran
2
Faculty of Management, Kharazmi University
Abstract
The Internet of Things provides instant access to information about the physical world and the objects within it, leading to new services and increasing efficiency and productivity. The wireless sensor network is an important network infrastructure in the Industrial Internet of Things and user authentication is used as a basic security mechanism to authenticate users to wireless sensor networks. In this article, we intend to provide a new way to improve the security of authentication using image processing. The analysis was performed by MATLAB software. The results presented in this article, which includes seven steps, have a 93% correct detection rate in pupil identification. These seven steps are: 1. Noise reduction, 2. Finding the outer border of the pupil, 3. Separating the eyelashes, 4. Finding the border of the eyelids, 5. Finding the outer border of the iris, 6. Separating the iris area and 7. Extracting the feature and encoding the pixels by the elliptic curve cryptography (ECC) method. With the measurements and experiments performed, it was found that the proposed method in identifying the eyelid border by the quadratic equation method is more efficient and faster in terms of time than the third-degree equation and the Huff parabolic conversion method. In order to extract the feature, the effective parameters in the SAIF feature extraction algorithm were examined and measured, and the optimal parameters were selected. The Sigma parameter with a value of 2.5 and the Octave parameter with a value of 4 should be considered as the best values. Also, in order to evaluate the resistance of the proposed method to error factors such as the angle, brightness and scale, the proposed method was tested and it was proved that the method has the appropriate resistance resolution in different conditions.
j. Katz, A. J. Menezes, et al., “Handbook of applied cryptography”, CRC press, 1996.##
Rankl and W. Effing, “Smart card handbook”, John Wiley & Sons, 2004.##
Bandyopadhyay and J. Sen, “Internet of things: Applications and challenges in technology and standardization”, Wireless Pers. Commun., Vol. 58, no. 1, pp. 49-69, 2011.##
T. Nguyen, M. Laurent, et al. “Survey on secure communication protocols for the Internet of Things”, Ad Hoc Networks, Vol. 32, pp. 17-31, 2015.##
Shelby, “Constrained RESTful environments (CoRE) link format”, RFC, Vol. 6690, pp. 1-22, 2012.##
Kong, M. Zhang, et al. “A belief propagation-based method for task allocation in open and dynamic cloud environments”, Knowl-Based Syst., Vol. 115, pp. 123-132, 2017.##
Xia, X. Wang, et al. “A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing”, IEEE T. Inform. Foren Security, Vol. 11, no. 11, pp. 2594-2608, 2016.##
Xia, X. Wang, et al. “A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data”, IEEE T. PARALL DISTR, Trans. Parallel Distrib. Syst., Vol. 27, no. 2, pp. 340-352, 2016.##
Shen, J. Shen, et al. “An efficient public auditing protocol with novel dynamic structure for cloud data”, IEEE T Inform. Foren Security, Vol. 12, no. 10, pp. 2402-2415, 2017.##
Shen, D. Liu, et al. “A secure cloud-assisted urban data sharing framework for ubiquitous-cities”, Pervasive Mob. Comput., Vol. 41, pp. 219-230, 2017.##
Hsin Lai, Ch. Chen, B. Chiang Jeng, and W. Chao, “Ant-Based IP Traceback”, Expert Syst. Appl., Vol. 34, pp. 3071-3080, 2008.##
Roozbehi, M. Qasemzadeh, “Using Software-Based Networks to Improve IoT Security”, Journal of Information Technology and Communication Innovations, Vol. 1, no. 2, pp. 11-16, 2019.##
Lamport, “Password authentication with insecure communication”, Commun. Acm., Vol. 24, no. 11, pp. 770-772, 1981.##
Lennon, S. Matyas, et al., “Cryptographic authentication of time-invariant quantities”, Ieee T. Commun., Vol. 29, no. 6, pp. 773-777, 1981.##
Sung-Ming, and L. Kuo-Hong, “Shared authentication token secure against replay and weak key attacks”, Inform. Process Lett., Vol. 62, no. 2, pp. 77-80, 1997.##
Kumar, “On the Weaknesses and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards”, IACR Cryptology ePrint Archive, Vol. 163, 2004.##
-Y. Chien, J.-K. Jan, et al., “An efficient and practical solution to remote authentication: smart card”, Computers & Security, Vol. 21, no. 4, pp. 372-375, 2002.##
-J. Yoon, E.-K. Ryu, et al., “Further improvement of an efficient password based remote user authentication scheme using smart cards”, Ieee T. Consum. Electronics, Vol. 50, no. 2, pp. 612-614, 2004.##
-M. Wang, W.-F. Zhang, et al., “Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards”, Computer Standards & Interfaces, Vol. 29, no. 5, pp. 507-512, 2007.##
K. Awasthi, K. Srivastava, et al., “An improved timestamp-based remote user authentication scheme”, Computers & Electrical Engineering, Vol. 37, no. 6, pp. 869-874, 2011.##
Kumari, M. K. Khan, et al., “An improved remote user authentication scheme with key agreement”, Computers & Electrical Engineering, Vol. 40, no. 6, pp. 1997-2012, 2014.##
F. Chang, W. L. Tai, et al., “Untraceable dynamic‐identity‐based remote user authentication scheme شwith verifiable password update”, Int. J. Commun. Syst., Vol. 27, no. 11, pp. 3430-3440, 2014.##
Jiang, S. Zeadally, et al., “Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks”, Ieee Access., Vol. 5, pp. 3376-3392, 2017.##
Gope, and T. Hwang, “A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks”, Ieee T Indust Electronics, Vol. 63, no. 11, pp. 7124-7132, 2016.##
Borna, K., Ebadati, O. M., & Zeynali, S. (2021). The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy. , 1(4), 35-50.
MLA
Keivan Borna; Omid Mahdi Ebadati; Shayan Zeynali. "The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy", , 1, 4, 2021, 35-50.
HARVARD
Borna, K., Ebadati, O. M., Zeynali, S. (2021). 'The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy', , 1(4), pp. 35-50.
VANCOUVER
Borna, K., Ebadati, O. M., Zeynali, S. The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy. , 2021; 1(4): 35-50.