EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid

With the development of Industry 4.0, the communication of smart grid has recently been taken seriously to ensure secure communication between operator and control center. However, the authentication process between them faces many challenges. Once the attacker successfully authenticated in the cont...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on industrial informatics Vol. 16; no. 10; pp. 6597 - 6606
Main Authors Ma, Zhuo, Yang, Yilong, Liu, Ximeng, Liu, Yang, Ma, Siqi, Ren, Kui, Yao, Chang
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.10.2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:With the development of Industry 4.0, the communication of smart grid has recently been taken seriously to ensure secure communication between operator and control center. However, the authentication process between them faces many challenges. Once the attacker successfully authenticated in the control center, the privacy data in the smart grid may leak and cause irreparable damage to the user. In addition, operator authentication is one of the most basic and crucial processes. Therefore, we propose the eye-movement and iris recognition based authentication ( EmIr-Auth ) , a novel biometrics-based remote operator authentication scheme. EmIr-Auth uses the recorded eye-movement trajectory and randomly selected iris image to authenticate operators, which is beneficial in that it is able to get rid of many cryptographic computations, as well as the need to minimize message exchange. Furthermore, except for a high-resolution camera, we do not require any additional biometric sensors in this scheme. Using the Burrows-Abadi-Needham logic, in this article, we demonstrate that our scheme provides secure authentication. Moreover, we analyze the attacks that EmIr-Auth can resist by informal security analysis. Experimental results show that EmIr-Auth is efficient enough to deploy on portable devices and reduce the overhead of authentication procedure.
ISSN:1551-3203
1941-0050
DOI:10.1109/TII.2019.2946047