Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks

Contribution to Journal


Cui, Hui, Yang, Xuechao, Yang, Wencheng, Qin, Baodong and Yi, Xun. 2023. "Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks." IEEE Transactions on Network Science and Engineering. 10 (4), pp. 2347-2357. https://doi.org/10.1109/TNSE.2023.3246439
Article Title

Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks

ERA Journal ID212767
AuthorsCui, Hui, Yang, Xuechao, Yang, Wencheng, Qin, Baodong and Yi, Xun
Journal TitleIEEE Transactions on Network Science and Engineering
Journal Citation10 (4), pp. 2347-2357
Number of Pages11
Year2023
PublisherIEEE (Institute of Electrical and Electronics Engineers)
Place of PublicationUnited States
ISSN2327-4697
2334-329X
Digital Object Identifier (DOI)https://doi.org/10.1109/TNSE.2023.3246439
Web Address (URL)https://ieeexplore.ieee.org/document/10049085
AbstractA biometric authenticated key derivation (BAKD) scheme is an architecture allowing users to derive keys from their biometric characteristics with the help of the server via a wireless network. Traditionally, the user registers his/her biometric feature with the server, and the server keeps a record for the user to recover the key locked by the biometric data. In this case, when the server is compromised, an attacker is able to launch exhaustive attacks to learn the user's biometric input. With such a concern in mind, we introduce a notion called Biometric Enhanced Key Derivation (BEKD) to prevent brute-force attacks. In a BEKD scheme, the server does not store any biometric related information for the user. It is the user who locally stores tokens to recover the cryptographic key. An attacker who steals tokens from the user cannot launch exhaustive attacks to confirm the user's biometric distribution. In addition, the BEKD scheme protects users' privacy in that the server could not distinguish a user's biometric input from a token. We define security requirements for a BEKD scheme, present a concrete BEKD construction, and analyse its security. We also implement the proposed basic BEKD scheme to evaluate its performance in practice. © 2013 IEEE.
KeywordsAuthentication; biometric; key derivation; password; token
Contains Sensitive ContentDoes not contain sensitive content
ANZSRC Field of Research 2020460403. Data security and protection
Public Notes

Files associated with this item cannot be displayed due to copyright restrictions.

Byline AffiliationsMonash University
Royal Melbourne Institute of Technology (RMIT)
School of Mathematics, Physics and Computing
Xi’an University of Posts and Telecommunications, China
Permalink -

https://research.usq.edu.au/item/z2589/token-based-biometric-enhanced-key-derivation-for-authentication-over-wireless-networks

  • 13
    total views
  • 0
    total downloads
  • 1
    views this month
  • 0
    downloads this month

Export as

Related outputs

UAV Control Method Combining Reptile Meta-Reinforcement Learning and Generative Adversarial Imitation Learning
Jiang, Shui, Ge, Yanning, Yang, Xu, Yang, Wencheng and Cui, Hui. 2024. "UAV Control Method Combining Reptile Meta-Reinforcement Learning and Generative Adversarial Imitation Learning." Future Internet. 16 (3). https://doi.org/10.3390/fi16030105
Evaluating Cryptocurrency Market Risk on the Blockchain: An Empirical Study Using the ARMA-GARCH-VaR Model
Huang, Yongrong, Wang, Huiqing, Chen, Zhide, Feng, Chen, Zhu, Kexin, Yang, Xu and Yang, Wencheng. 2024. "Evaluating Cryptocurrency Market Risk on the Blockchain: An Empirical Study Using the ARMA-GARCH-VaR Model." IEEE Open Journal of the Computer Society. 5, pp. 83-94. https://doi.org/10.1109/OJCS.2024.3370603
Feature extraction and learning approaches for cancellable biometrics: A survey
Yang, Wencheng, Wang, Song, Hu, Jiankun, Tao, Xiaohui and Li, Yan. 2024. "Feature extraction and learning approaches for cancellable biometrics: A survey." CAAI Transactions on Intelligence Technology. 9 (1), pp. 4-25. https://doi.org/10.1049/cit2.12283
An Adaptive Feature Fusion Network for Alzheimer’s Disease Prediction
Wei, Shicheng, Li, Yan and Yang, Wencheng. 2023. "An Adaptive Feature Fusion Network for Alzheimer’s Disease Prediction." 12th International Conference on Health Information Science (HIS 2023). Melbourne, Australia 23 - 24 Oct 2023 Germany. https://doi.org/10.1007/978-981-99-7108-4
A Review of Homomorphic Encryption for Privacy-Preserving Biometrics
Yang, Wencheng, Wang, Song, Cui, Hui, Tang, Zhaohui and Li, Yan. 2023. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics." Sensors. 23 (7). https://doi.org/10.3390/s23073566
Hybrid KD-NFT: A multi-layered NFT assisted robust Knowledge Distillation framework for Internet of Things
Wang, Nai, Chen, Junjun, Wu, Di, Yang, Wencheng, Xiang, Yong and Sajjanhar, Atul. 2023. "Hybrid KD-NFT: A multi-layered NFT assisted robust Knowledge Distillation framework for Internet of Things." Journal of Information Security and Applications. 75. https://doi.org/10.1016/j.jisa.2023.103483
A review of multi-factor authentication in the Internet of Healthcare Things
Suleski, Tance, Ahmed, Mohiuddin, Yang, Wencheng and Wang, Eugene. 2023. "A review of multi-factor authentication in the Internet of Healthcare Things." Digital Health. 9, pp. 1-20. https://doi.org/10.1177/20552076231177144
A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks
Bedari, Aseel, Wang, Song and Yang, Wencheng. 2022. "A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks." Sensors. 22 (19), pp. 1-16. https://doi.org/10.3390/s22197609
Multimedia security and privacy protection in the internet of things: research developments and challenges
Yang, Wencheng, Wang, Song, Hu, Jiankun and Karie, Nickson M.. 2022. "Multimedia security and privacy protection in the internet of things: research developments and challenges." International Journal of Multimedia Intelligence and Security. 4 (1), pp. 20-46. https://doi.org/10.1504/ijmis.2022.121282
A linear convolution-based cancelable fingerprint biometric authentication system
Yang, Wencheng, Wang, Song, Kang, James Jin, Johnstone, Michael N. and Bedari, Aseel. 2022. "A linear convolution-based cancelable fingerprint biometric authentication system." Computers and Security. 114, pp. 1-14. https://doi.org/10.1016/j.cose.2021.102583
A Review on Security Issues and Solutions of the Internet of Drones
Yang, Wencheng, Wang, Song, Yin, Xuefei, Wang, Xu and Hu, Jiankun. 2022. "A Review on Security Issues and Solutions of the Internet of Drones." IEEE Open Journal of the Computer Society. 3, pp. 96-110. https://doi.org/10.1109/OJCS.2022.3183003
Network Forensics in the Era of Artificial Intelligence
Yang, Wencheng, Johnstone, Michael N., Wang, Song, Karie, Nickson M., Bin Sahri, Nor Masri and Kang, James Jin. 2022. "Network Forensics in the Era of Artificial Intelligence." Ahmed, Mohiuddin, Islam, Sheikh Rabiul, Anwar, Adnan, Moustafa, Nour and Pathan, Al-Sakib Khan (ed.) Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence. Cham, Switzerland. Springer. pp. 171-190
Leveraging Artificial Intelligence Capabilities for Real-Time Monitoring of Cybersecurity Threats
Karie, Nickson M., Bin Sahri, Nor Masri Bin, Yang, Wencheng and Johnstone, Michael N.. 2022. "Leveraging Artificial Intelligence Capabilities for Real-Time Monitoring of Cybersecurity Threats." Ahmed, Mohiuddin, Islam, Sheikh Rabiul, Anwar, Adnan, Moustafa, Nour and Pathan, Al-Sakib Khan (ed.) Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence. Cham, Switzerland. Springer. pp. 141-169
Positive Influence Dominating Set Games
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji, Yi, Xun and Yong, Jianming. 2014. "Positive Influence Dominating Set Games." Hou, Jiang-Liang, Trappey, Amy J. C., Wu, Chien-Wei, Chang, Kuo-Hao, Liao, Chuing-Shou, Shen, Wei-Ming, Barthes, Jean-Paul and Luo, Jun-Zhou (ed.) 18th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2014). Hsinchu, Taiwan 21 - 23 May 2014 United States. https://doi.org/10.1109/CSCWD.2014.6846890