透過您的圖書館登入
IP:3.139.81.58
  • 學位論文

結合生物特徵之物聯網安全身分驗證暨金鑰協議方式

Biometric-based Identity Verification and Key Agreement for IoT Applications

指導教授 : 盧永豐
共同指導教授 : 黃慧鳳(Hui-Feng Huang)
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


生物辨識的技術研究迄今已有數年。目前市面上的產品中,許多設備有雙重驗證機制甚至更多層驗證。生物辨識的認證擁有唯一性、普遍性、永久性、可測性、方便性、接受性、不可欺性等優勢。手機或家用設備也漸漸地都擁有了生物辨識的功能,使資訊安全的強度和使用上更安全,並且滿足使用者的需求。 本論文提出了一個結合了生物辨識的三因子認證暨金鑰協議協定。在我們所提出的方法中,使用者的資訊可以受到多重的保護。系統可透過模糊萃取技術取得使用者的身分資訊。結合了一系列的雜湊與加密技術,本方法可以達成三因子認證及高安全高可靠度,適合用在物聯網雲環境中。

並列摘要


Technical studies of biometrics have been conducted for several years. Many of the products currently on the market have a dual verification mechanism and even more layers of verification. Biometric authentication has the advantages of uniqueness, universality, permanence, measurability, convenience, acceptability, and non-fatability. Mobile phones or home devices are gradually becoming biometric, making information security more secure and safer to use, and meeting the needs of users. This paper proposes a three-factor authentication and key agreement that combines biometrics. In the method we propose, the user's information can be properly protected. The system can obtain the user's identity information through the fuzzy extraction technology. Combined with a series of hash and encryption technologies, this method can achieve three-factor authentication, high security and high reliability, and is suitable for use in the Internet of Things cloud environment.

參考文獻


[1] Aigner, M., Dominikus S, Feldhofer,” A system of secure virtual coupons using NFC technology.” IEEE international conference on pervasive computing and communications workshops, pp. 362–366.
[2] Aziza,”NFC Technology in mobile phone next-generation services.”, Proceedings of the 2nd international workshop on near field communication, Monaco, pp. 21–26.
[3] Baldo, D., Benelli, G., & Pozzebon,”The SIESTA project: Near Field Communication, based applications for tourism.” international symposium on communication systems networks and digital signal processing, Newcastle upon Tyne, pp. 721–725.
[4] Debiao He, Neeraj Kumar, Jianhua Chen, Cheng-Chi Lee, Naveen Chilamkurti, Seng-Soo Yeo, ”Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks”, Multimedia Systems February 2015, Volume 21, Issue 1, pp 49–60
[5] Debiao He, Neeraj Kumar, Jong-Hyouk Lee, “Secure pseudonym-based near field communication protocol for the consumer internet of things”, IEEE Transactions on Consumer Electronics Volume: 61 Issue: 1, February 2015, Pages 56 – 62.

延伸閱讀