Design and Implementation of Secure Biometric Based Authentication System using RFID and Secret Sharing

被引:0
|
作者
Patil, Sonali [1 ]
Dhumal, Priyanka [1 ]
Lokhande, Shweta [1 ]
Kamble, Trishala [1 ]
机构
[1] Pimpri Chinchwad Coll Engn, Dept Comp, Pune, Maharashtra, India
关键词
Secret sharing; RFID; Information Security; Biometrics;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Biometric data refers to metrics related to unique human characteristics like fingerprint, iris, face recognition,voice, palm print, etc. Various security threats are raised while handling esoteric data. The current authentication system uses manual methods like PIN and passwords which may be forgotten or be stolen and hence does not ensure that only the actual owner has access to it. This paper introduces a method of secure authentication where secret sharing is applied on biometric template. Created shares of biometric template are stored in the database and RFID tag, which will make dabtabse secure. No attacker can get the whole biometric data of the user even if he/she attacks on the database server. The proposed scheme is robust and secure for authentication purpose.
引用
收藏
页码:480 / 482
页数:3
相关论文
共 50 条
  • [1] Design and Implementation of an IoT Based Secure Biometric Authentication System
    Joshy, Annies
    Jalaja, M. J.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, INFORMATICS, COMMUNICATION AND ENERGY SYSTEMS (SPICES), 2017,
  • [2] Design and implementation of secure active RFID system with cryptography and authentication mechanisms
    Wang, Hsi-Wen
    Lai, Chien-Chih
    Hsiao, Chun-Chieh
    Hsieh, Guan-Yu
    Lee, Ren-Guey
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1273 - +
  • [3] Secure Authentication in Online Voting System Using Multiple Image Secret Sharing
    Naidu, P. Sanyasi
    Kharat, Reena
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 336 - 343
  • [4] Efficient group authentication in RFID using secret sharing scheme
    Yanxiao Liu
    Qindong Sun
    Yichuan Wang
    Lei Zhu
    Wenjiang Ji
    [J]. Cluster Computing, 2019, 22 : 8605 - 8611
  • [5] Design and Implementation of a RFID-based Authentication System by Using Keystroke Dynamics
    Tseng, Chun-wei
    Liu, Feng-jung
    Lin, Ting-yi
    [J]. IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2010), 2010,
  • [6] Efficient group authentication in RFID using secret sharing scheme
    Liu, Yanxiao
    Sun, Qindong
    Wang, Yichuan
    Zhu, Lei
    Ji, Wenjiang
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S8605 - S8611
  • [7] SECURE VOTER AUTHENTICATION FOR RELIABLE VOTING PROCESS USING RFID AND BIOMETRIC
    Bharath, S.
    Tharun, S.
    Kalanandhini, G.
    [J]. INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (05) : 286 - 294
  • [8] RFID Authentication System Based on User Biometric Information
    Huang, Yuanmu
    Fu, Bin
    Peng, Ningwei
    Ba, Yanwen
    Liu, Xuan
    Zhang, Shigeng
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (24):
  • [9] A Secure Dynamic Identity Based Remote User Authentication Scheme Using Secret Sharing
    Liu, Yun
    Cheng, Zi-Yao
    Chang, Chin-Chen
    Zhang, Zhen-Jiang
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (03): : 463 - 469
  • [10] Design and Implementation of Instruments Sharing Management System Based on RFID
    Duan, Yan
    Wu, Jueheng
    Lan, Xiujian
    Zhang, Xuanhong
    Chen, Chunyan
    Chen, Shengping
    [J]. COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 1957 - +