Framework for Secure User Authentication of Internet of Things Devices

Yongtaek Song, Jaewoo Lee


In the 4th Industrial Revolution, the Internet of Things emerged and various services and convenience improved. As the frequency of use increases, security threats such as leakage of personal information coexist and the importance of security are increasing. In this paper, we analyze the security threats of the Internet of things and propose a model for enhancing security through user authentication using Fast IDentity Online (FIDO). As a result, we propose to implement strong user authentication by introducing second authentication through FIDO. 

Full Text:



Chae, C., Cho, H., and Jeong, H., “Authentication Method using Multiple Biometric Information in FIDO Environment,” Journal of Digital Convergence, Vol. 16, No. 1, pp. 159-164, 2019.

Cho, S. and Kim, S., “FIDO technology standardization trend,” Telecommunications Technology Association, TTA Journal, Vol. 172, pp. 65-70, 2017.

Dunkerberger, P., “FIDO2 puts biometrics at heart of web security,” ELSEVIER Vol. 2018, No. 8, pp. 8-10, 2018.

FIDO Alliance, “Client to Authenticator Protocol(CTAP),” Propose Standard, 2019.

FIDO Alliance, “Universal 2nd Factor(U2F) Overview,” FIDO Alliacne Proposed Standard, 2017.

Gubbi, J. and Buyya, R., Marimuthu, S., and Palaniswami, M., “Internet of Things (IoT): A vision, architectural elements, and future directions,” Future Generation Computer Systems, Vol. 29, No. 7, pp. 1645-1660, 2013.

Hossain, M., Fotouhi, M., and Hasan, R., “Towards an Analysis of Security Issues, Challenge and Open Problems in the Internet of Things,” 2015 IEEE World Congress on Services, pp. 21-28, 2015.

IoT Security Alliance, “HomeㆍAppliance IoT Security Guide,” Korea Internet & Security Agency, 2017.

Kang, J., “A Verification of Smart TV Security in IoT Environment,” Soongsil University, 2017.

Kim, Y., Lee, J., and Yun, G., “Study on Smart Office Fit Model of Government and Local Governments,” The Korea Institute of Public Administration, Frequent assignment 2014-04, 2014.

Lee, G. H., “Exploring the standardization forum _Special Theme Bio-recognition,” Telecommunications Technology Association, TTA Journal, Vol. 165, pp. 12-17, 2016.

Lee, S. and Jahng, J., “The Diffusion of Internet of Things: Forecasting Technologies and Company Strategies using Qualitative and Quantitative Approach,” The Journal of Society for e-Business Studies, Vol. 20, No. 4, pp. 19-39, 2015.

Walker, M., “Hype Cycle for Emerging Technologies, 2018,” Gartner Inc., 2018.


  • There are currently no refbacks.