banner

Fingerprint based authentication framework for IoT environment

Vijender Singh, Chander Kant

Abstract


Internet of Things (IoT) approach makes the humans life easy and safe and due to its acceptability and portability. Humans are surrounded by multitude of heterogeneous devices which assist them in their daily routine. The integration of Blockchain technology with IoT played an important role in medical science and online transaction. At same point of time, the IoT network and devices are vulnerable that can be exploit to affect the network and devices security and accessibility. Therefore, robust authentication techniques should be implementing to secure the IoT network as well as devices accessibility. Due to high heterogeneity of applications, providing authentication for these devices is always challengeable. In this work, a novel fingerprint-based authentication framework in implemented in which Gaussian filter is used for image smoothness, Robert filter for edge detection and achieve 94% accuracy while authentication.


Keywords


smart things; IoT; blockchain; biometric authentication; CASIA

Full Text:

PDF

References


1. Khader R, Eleyan D. Survey of DoS/DDoS attacks in IoT. Sustainable Engineering and Innovation 2021; 3(1): 23–28. doi: 10.37868/sei.v3i1.124

2. Kumar A, Sharma S, Goyal N, et al. Secure and energy-efficient smart building architecture with emerging technology IoT. Computer Communications, Computer Communications 2021; 176: 207–217. doi: 10.1016/j.comcom.2021.06.003

3. Yan B, Xu A, Cao Y, et al. Hardware-fingerprint Based Authentication for NFC Devices in Power Grids. In: Proceedings of the IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC 2019); 20–22 December 2019; Chengdu, China. pp. 1147–1154.

4. Lilhore UK, Imoize AL, Li CT, et al. Design and implementation of an ML and IoT based adaptive traffic-management system for smart cities. Sensors 2022; 22(8): 2908. doi: 10.3390/s22082908

5. Armstrong R, Hall BJ, Doyle J, Waters E. Scoping the scope’ of a Cochrane review. Journal of Public Health 2011; 33(1): 147–150. doi: 10.1093/pubmed/fdr015

6. BioCatch .From Login to Logout: Continuous Authentication with Behavioral Biometrics | Cyentia Cybersecurity Research Library. 2019.

7. Bekara C. Security issues and challenges for the IoT-based smart grid. Procedia Computer Science 2014; 34: 532–537. doi: 10.1016/j.procs.2014.07.064

8. He D, Wang D. Robust biometrics-based authentication scheme for multiserver environment. IEEE Systems Journal 2015; 9(3): 816–823. doi: 10.1109/jsyst.2014.2301517

9. Zhao K, Sun D, Ren G, Zhang Y. Public auditing scheme with identity privacy preserving based on certificateless ring signature for Wireless Body Area Networks. IEEE Access 2020; 8: 41975–41984. doi: 10.1109/access.2020.2977048

10. Hu C, Li H, Huo Y, et al. Secure and efficient data communication protocol for wireless body area networks. IEEE Transactions on Multi-Scale Computing Systems 2016; 2(2): 94–107. doi: 10.1109/tmscs.2016.2525997

11. Dhillon PK, Kalra S. A lightweight biometrics based remote user authentication scheme for IoT services. Journal of Information Security and Applications 2017; 34: 255–270. doi: 10.1016/j.jisa.2017.01.003

12. Alotaibi M. An enhanced symmetric cryptosystem and biometric-based anonymous user authentication and session key establishment scheme for WSN. IEEE Access 2018; 6: 70072–70087. doi: 10.1109/access.2018.2880225

13. Kang D, Jung J, Kim H, et al. Efficient and secure biometric-based user authenticated key agreement scheme with anonymity. Security and Communication Networks 2018; 2018: 1–14. doi: 10.1155/2018/9046064

14. S.D. Kaul, A.K. Awasthi, Security enhancement of an improved remote user au- thentication scheme with key agreement, Wirel. Pers. Commun. 89 (2) (2016) 621–637.

15. Li X, Peng J, Obaidat MS, et al. A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Systems Journal 2020; 14(1): 39–50. doi: 10.1109/jsyst.2019.2899580

16. Wu F, Xu L, Kumari S, Li X. An improved and provably secure three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Networking and Applications 2018; 11(1): 1–20. doi: 10.1007/s12083-016-0485-9

17. Guo C, You L, Hu G. A Novel Biometric Identification Scheme Based on Zero-Knowledge Succinct Noninteractive Argument of Knowledge. Security and Communication Network, Hindawi. 2022. doi: 10.1155/2022/2791058.

18. Dalkilic H, Ozcanhan MH. Strong authentication protocol for identity verification in internet of things (IoT). In: Proceedings of the 6th International Conference on Computer Science and Engineering (UBMK 2021); 15–17 September 2021; Ankara, Turkey. pp. 199–203.

19. Kho JB, Kim J, Kim IJ, et al. Cancelable fingerprint template design with randomized non-negative least squares. Pattern Recognition 2019; 91: 245–260.




DOI: https://doi.org/10.32629/jai.v7i4.863

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Vijender Singh, Chander Kant

License URL: https://creativecommons.org/licenses/by-nc/4.0/