Secure and reliable biometric access control for resource-constrained systems and IoT

N Karimian, Z Guo, F Tehranipoor, D Woodard… - arXiv preprint arXiv …, 2018 - arxiv.org
With the emergence of the Internet-of-Things (IoT), there is a growing need for access
control and data protection on low-power, pervasive devices. Biometric-based …

Unlock your heart: Next generation biometric in resource-constrained healthcare systems and IoT

N Karimian, M Tehranipoor, D Woodard, D Forte - IEEE Access, 2019 - ieeexplore.ieee.org
With the emergence of the Internet-of-Things, there is a growing need for access control and
data protection on low-power, pervasive devices. Key-based biometric cryptosystems are …

Pufsec: Device fingerprint-based security architecture for internet of things

SY Park, S Lim, D Jeong, J Lee… - IEEE INFOCOM 2017 …, 2017 - ieeexplore.ieee.org
A low-end embedded platform for Internet of Things (IoT) often suffers from a critical trade-off
dilemma between security enhancement and computation overhead. We propose PUFSec …

Privacy-preserving biometric authentication: Cryptanalysis and countermeasures

H Zhang, X Li, SY Tan, MJ Lee… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this article, we cryptanalyzed a Verifiable Threshold Predicate Encryption (VTPE) enabled
Privacy-Preserving Biometric Authentication (PPBA) protocol reported in IEEE-TDSC and …

Comments on biometric-based non-transferable credentials and their application in blockchain-based identity management

ND Sarier - Computers & Security, 2021 - Elsevier
In IT-ecosystems, access to unauthorized parties is prevented with credential-based access
control techniques (locks, RFID cards, biometrics, etc.). Some of these methods are …

A secure and efficient AKE scheme for IoT devices using PUF and cancellable biometrics

B Zahednejad, C Gao - Internet of Things, 2023 - Elsevier
Abstract As the Internet of Things (IoT) continues to grow, there is an increasing need for
secure and efficient authentication protocols for IoT devices. The design of IoT …

[PDF][PDF] Physical unclonable functions for IoT security

AM Naveed, KC Chua, B Sikdar - … on IoT Privacy, Trust, and Security, 2016 - ece.nus.edu.sg
Traditionally security for the Internet has been provided by classical cryptography. These
security primitives and techniques were designed with an implied assumption of physically …

Response-based cryptographic methods with ternary physical unclonable functions

B Cambou, C Philabaum, D Booher… - Advances in Information …, 2020 - Springer
Abstract Physical Unclonable Functions (PUFs) are used as hardware fingerprints for access
control, and authentication in mobile and wireless networks and Internet of Things. However …

Cancelable biometrics vault: A secure key-binding biometric cryptosystem based on chaffing and winnowing

O Ouda, K Nandakumar, A Ross - 2020 25th International …, 2021 - ieeexplore.ieee.org
Existing key-binding biometric cryptosystems, such as the Fuzzy Vault Scheme (FVS) and
Fuzzy Commitment Scheme (FCS), employ Error Correcting Codes (ECC) to handle intra …

Toward end-to-end biomet rics-based security for IoT infrastructure

MS Hossain, G Muhammad… - IEEE Wireless …, 2016 - ieeexplore.ieee.org
The IoT is the next generation of innovation in the smart world, which has the potential to
improve safety, security, and the quality of our daily lives through pervasive communication …