EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid
With the development of Industry 4.0, the communication of smart grid has recently been taken seriously to ensure secure communication between operator and control center. However, the authentication process between them faces many challenges. Once the attacker successfully authenticated in the cont...
Saved in:
Published in | IEEE transactions on industrial informatics Vol. 16; no. 10; pp. 6597 - 6606 |
---|---|
Main Authors | , , , , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
01.10.2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | With the development of Industry 4.0, the communication of smart grid has recently been taken seriously to ensure secure communication between operator and control center. However, the authentication process between them faces many challenges. Once the attacker successfully authenticated in the control center, the privacy data in the smart grid may leak and cause irreparable damage to the user. In addition, operator authentication is one of the most basic and crucial processes. Therefore, we propose the eye-movement and iris recognition based authentication ( EmIr-Auth ) , a novel biometrics-based remote operator authentication scheme. EmIr-Auth uses the recorded eye-movement trajectory and randomly selected iris image to authenticate operators, which is beneficial in that it is able to get rid of many cryptographic computations, as well as the need to minimize message exchange. Furthermore, except for a high-resolution camera, we do not require any additional biometric sensors in this scheme. Using the Burrows-Abadi-Needham logic, in this article, we demonstrate that our scheme provides secure authentication. Moreover, we analyze the attacks that EmIr-Auth can resist by informal security analysis. Experimental results show that EmIr-Auth is efficient enough to deploy on portable devices and reduce the overhead of authentication procedure. |
---|---|
ISSN: | 1551-3203 1941-0050 |
DOI: | 10.1109/TII.2019.2946047 |