2019
DOI: 10.1109/jiot.2018.2837751
|View full text |Cite
|
Sign up to set email alerts
|

Two-Factor Fuzzy Commitment for Unmanned IoT Devices Security

Abstract: To create an environment for IoT devices, securely, it is necessary to establish a cryptographic key for those devices. Conventionally, this key has been stored on the actual device, but this leaves the key vulnerable to physical attacks in the IoT environment. To solve this problem, several research studies have been conducted on how best to conceal the cryptographic key. Recently, these studies have most often focused on generating the key dynamically from noisy data using a fuzzy extractor or providing secu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 30 publications
(10 citation statements)
references
References 39 publications
0
10
0
Order By: Relevance
“…According to the proposed mechanism in this paper, which is a combination of biometrics and coding, the security of the system has been improved by an average of 96.82%. Based on simulation states, the proposed method improves the system security by 120.38% on average, which shows 106.23, 110.45 and 144.46% improvement for the IoT sensor layer, controller layer and application layer, respectively [30][31][32][33][34][35].…”
Section: Discussionmentioning
confidence: 99%
“…According to the proposed mechanism in this paper, which is a combination of biometrics and coding, the security of the system has been improved by an average of 96.82%. Based on simulation states, the proposed method improves the system security by 120.38% on average, which shows 106.23, 110.45 and 144.46% improvement for the IoT sensor layer, controller layer and application layer, respectively [30][31][32][33][34][35].…”
Section: Discussionmentioning
confidence: 99%
“…The authors conducted a detailed analysis on two cryptographic primitives, the fuzzy commitment and fuzzy vault, and discussed their strengths and weaknesses when used in ECG-based bio-cryptosystems. Choi et al [ 90 ] protected the cryptographic key stored in the unmanned IoT device with a novel two-factor fuzzy commitment. The proposed scheme uses both the biometric data and physical unclonable function (PUF), which increases the difficulty for the attacker to acquire the correct key.…”
Section: Biometric-cryptographic Systems For Iot Data Encryption/decryptionmentioning
confidence: 99%
“…Recent works [44][45][46] have proved the efficiency of PUF scheme and have shown how the internet of things (IoT) devices in which PUF chips are embedded can be deployed safely in an IoT environment. However, PUF-based security mechanisms are rarely used for UAVs.…”
Section: Related Workmentioning
confidence: 99%