4.7 Article

TOWARD END-TO-END BIOMETRICS-BASED SECURITY FOR IOT INFRASTRUCTURE

期刊

IEEE WIRELESS COMMUNICATIONS
卷 23, 期 5, 页码 44-51

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/MWC.2016.7721741

关键词

-

资金

  1. Deanship of Scientific Research at King Saud University, Riyadh, Saudi Arabia through International Research Group project [14-204]

向作者/读者索取更多资源

The IoT is the next generation of innovation in the smart world, which has the potential to improve safety, security, and the quality of our daily lives through pervasive communication and computation. Currently, we have observed that a plethora of interconnected smartphones, devices, and sensors are deployed for providing personalized services (e.g., social media, smart home, health monitoring) at any time from anywhere. The personalized services offered by IoT, although enhancing the quality of our lives, have serious challenges of securing networks and data in transit, as every day a myriad of devices and services are connected to the IoT. However, existing security solutions, such as two-factor authentication based on passwords along with second-level protection may not be efficient and reliable for providing end-to-end secure communication solutions among different devices and services connected to the IoT. To this end, this article proposes an end-to-end secure IoT-based solution using biometrics and pairing-based cryptography. Because of the uniqueness of one's biometric traits (e.g., face, fingerprint, palm, iris, voice, heartbeat), a biometric-based security solution is less vulnerable to security breaches for IoT systems or infrastructure. We present a biometric-based IoT infrastructure comprising four layers, and for each layer, we discuss possible security challenges along with the corresponding countermeasures. Finally, we provide a case study of face-based biometric recognition, where sensors or smartphones capture a face image and securely transmit it to the IoT platform to provide end-to end security.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据