Design and Implementation of an IoT Based Secure Biometric Authentication System

被引:0
|
作者
Joshy, Annies [1 ]
Jalaja, M. J. [1 ]
机构
[1] Govt Engn Coll, Dept Elect & Commun, Idukki, Kerala, India
关键词
Authentication; Iris recognition; IoT; Blowfish; RSA; Aadhaar database; Time and attendance system;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Authentication systems are used to verify the identity of a person and provide authorization for access. with the in creased number of Internet enabled devices in the modern world, reliable authentication is crucial for secure access in networked environments, Hence, a secure and reliable biometric authentication system based on IOT is proposed in this paper. The proposed biometric authentication scheme is based on iris recognition, as it provides better Accuracy and security, compared to other biometrics. In most authentication systems, user credentials are compared with locally stored database. It becomes in secure and inconvenient due 10 the physical access provided by local storage, and it is vulnerable to attacks or tampering, To mitigate this, IoT is used in the proposed system. For provide security to the data sent over the Internet, a hybrid encryption algorithm that combines Blowfish and RSA algorithms is used. The two-step authentication system provides enhanced security and reliability, The proposed scheme is developed and implemented as an embedded system, for secure employee authentication. Authentication is done using employee database and the Aadhaar database, which is an adequately secured one that contains validated data of all citizens in India. The system developed is found to be superior in terms of security and reliability, compared to existing systems.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] A Vein Biometric Based Authentication System
    Gupta, Puneet
    Gupta, Phalguni
    [J]. INFORMATION SYSTEMS SECURITY (ICISS 2014), 2014, 8880 : 425 - 436
  • [32] Design and evaluation of a pressure-based typing biometric authentication system
    Eltahir W.E.
    Salami M.J.E.
    Ismail A.F.
    Lai W.K.
    [J]. EURASIP Journal on Information Security, 2008 (1):
  • [33] Secure Authentication Using Biometric Methods
    Rejman-Greene, Marek
    [J]. Information Security Technical Report, 2002, 7 (03): : 30 - 40
  • [34] Design of Biometric Authentication Technique for MANET Based Emergency Response System
    Srividya, R.
    Ramesh, B.
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES, 2015,
  • [35] Secure biometric authentication with improved accuracy
    Barbosa, Manuel
    Brouard, Thierry
    Cauchie, Stephane
    de Sousa, Simao Melo
    [J]. INFORMATION SECURITY AND PRIVACY, 2008, 5107 : 21 - +
  • [36] Lattice-Based Secure Biometric Authentication for Hamming Distance
    Cheon, Jung Hee
    Kim, Dongwoo
    Kim, Duhyeong
    Lee, Joohee
    Shin, Junbum
    Song, Yongsoo
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 653 - 672
  • [37] Biometric-Based Authentication in Internet of Things (IoT): A Review
    Singh, Vijender
    Kant, Chander
    [J]. ADVANCES IN INFORMATION COMMUNICATION TECHNOLOGY AND COMPUTING, AICTC 2021, 2022, 392 : 309 - 317
  • [38] Design of a MEMS-based retina scanning system for biometric authentication
    Woittennek, Franziska
    Knobbe, Jens
    Puegner, Tino
    Schelinski, Uwe
    Grueger, Heinrich
    [J]. MICRO-OPTICS 2014, 2014, 9130
  • [39] Appearance-based biometric recognition: Secure authentication and cancellability
    Dabbah, M. A.
    Woo, W. L.
    Dlay, S. S.
    [J]. PROCEEDINGS OF THE 2007 15TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING, 2007, : 479 - +
  • [40] iiCardiac Rhythm - Biometric based Secure Authentication for IEEE 802.15.6
    Belinda, Carmel Mary
    Sugumaran, Tolstoy
    Kannan, E.
    [J]. 2014 INTERNATIONAL CONFERENCE ON SCIENCE ENGINEERING AND MANAGEMENT RESEARCH (ICSEMR), 2014,