A Two-Stage Feature Transformation-Based Fingerprint Authentication System for Privacy Protection in IoT

      

ABSTARCT :

Bio-features are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose of this investigation is to summaries the factors that hinder biometrics models’ development and deployment on a large scale, including human physiological (e.g., face, eyes, fingerprints-palm, or electrocardiogram) and behavioral features (e.g., signature, voice, gait, or keystroke). The different machine learning and data mining methods used by authentication and authorization schemes for mobile IoT devices are provided. Threat models and countermeasures used by biometrics-based authentication schemes for mobile IoT devices are also presented. More specifically, We analyze the state of the art of the existing biometric-based authentication schemes for IoT devices. Based on the current taxonomy, We conclude our paper with different types of challenges for future research efforts in biometrics-based authentication schemes for IoT devices.

EXISTING SYSTEM :

? Our system has a conspicuously smaller hardware footprint in comparison to the existing exclusively hardware-based works, and its algorithm is computationally much simpler in comparison to the existing lightweight biometric recognition systems. ? The existing works related to the security vulnerabilities of the AES cryptographic hardware. These Trojans target the hardware functionality in order to harm the biometric data. ? Fingerprint has been used in criminal investigation for a long period of time and is known to provide good accuracy, good execution time and good security. ? A fingerprint is the pattern of friction ridges and valleys on the surface of a fingertip, the formation of which is determined during the first seven months of fetal development.

DISADVANTAGE :

? We emphasize the challenges and open issues of authentication and authorization schemes for mobile IoT devices. ? This amount is calculated without taking into account the economic problems and psychological oppression that victims of this fraud suffer. ? Vocal resonance can be used as a passive biometric, and it achieves high accuracy in terms of identification and verification problems. ? Except from data use issues, general terms such as computer f ear and technophobia also provide established accounts of individuals resistance to use new and unfamiliar information technologies, especially for elder people.

PROPOSED SYSTEM :

• In this work, we propose a cross-layer biometric recognition system that has small computational complexity and is suitable for mobile Internet of Things (IoT) devices. • Due to the involvement of both hardware and software in realizing this system in a decussate and chaining structure, it is easier to locate and provide alternative paths for the system flow in the case of an attack. • In order to compare the proposed system with its counterparts, two benchmark recognition systems are adopted. • The purpose of these Trojans is to sabotage the biometric data that are under process by the biometric recognition system. • All of the software and the hardware modules of this system are implemented using MATLAB and Verilog HDL, respectively.

ADVANTAGE :

? Biometric identification is applied nowadays in sectors where security is a top priority, like airports and could be used as a means to control border crossing at sea, land and air frontier. ? The paper also states the benefits of the deep learning technique such as efficient segmentation on large data sets. ? This method can be a basis for future biometric systems that can be fast, efficient and recognize unique characteristics of the human body. ? The authentication of mobile IoT devices will be achieved when the bio-features models becomes sufficiently mature, efficient and resistant to IoT attacks. ? Mobile devices are nowadays an essential part of our everyday life, as they are used for a variety of mobile applications.

Download DOC Download PPT

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Chat on WhatsApp