TOWARD END-TO-END BIOMETRICS-BASED SECURITY FOR IOT INFRASTRUCTURE

被引:70
|
作者
Hossain, M. Shamim [1 ]
Muhammad, Ghulam [2 ]
Rahman, Sk Md Mizanur [3 ]
Abdul, Wadood [2 ]
Alelaiwi, Abdulhameed [4 ]
Alamri, Atif [3 ]
机构
[1] King Saud Univ, CCIS, Dept Software Engn, Riyadh, Saudi Arabia
[2] King Saud Univ, CCIS, Dept Comp Engn, Riyadh, Saudi Arabia
[3] King Saud Univ, CCIS, Dept Informat Syst, Riyadh, Saudi Arabia
[4] King Saud Univ, CCIS, SWE Dept, Riyadh, Saudi Arabia
关键词
INTERNET; THINGS;
D O I
10.1109/MWC.2016.7721741
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The IoT is the next generation of innovation in the smart world, which has the potential to improve safety, security, and the quality of our daily lives through pervasive communication and computation. Currently, we have observed that a plethora of interconnected smartphones, devices, and sensors are deployed for providing personalized services (e.g., social media, smart home, health monitoring) at any time from anywhere. The personalized services offered by IoT, although enhancing the quality of our lives, have serious challenges of securing networks and data in transit, as every day a myriad of devices and services are connected to the IoT. However, existing security solutions, such as two-factor authentication based on passwords along with second-level protection may not be efficient and reliable for providing end-to-end secure communication solutions among different devices and services connected to the IoT. To this end, this article proposes an end-to-end secure IoT-based solution using biometrics and pairing-based cryptography. Because of the uniqueness of one's biometric traits (e.g., face, fingerprint, palm, iris, voice, heartbeat), a biometric-based security solution is less vulnerable to security breaches for IoT systems or infrastructure. We present a biometric-based IoT infrastructure comprising four layers, and for each layer, we discuss possible security challenges along with the corresponding countermeasures. Finally, we provide a case study of face-based biometric recognition, where sensors or smartphones capture a face image and securely transmit it to the IoT platform to provide end-to end security.
引用
收藏
页码:44 / 51
页数:8
相关论文
共 50 条
  • [1] End-to-End Security for the IoT
    Dooley, James
    [J]. INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 606 - 606
  • [2] An End-to-End View of IoT Security and Privacy
    Ling, Zhen
    Liu, Kaizheng
    Xu, Yiling
    Jin, Yier
    Fu, Xinwen
    [J]. GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [3] IoTSM: An End-to-end Security Model for IoT Ecosystems
    Bugeja, Joseph
    Vogel, Bahtijar
    Jacobsson, Andreas
    Varshney, Rimpu
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2019, : 267 - 272
  • [4] Enhancement of end-to-end security in advanced metering infrastructure
    Kalidass, J.
    Purusothaman, T.
    Suresh, P.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,
  • [5] The Design and Deployment of an End-To-End IoT Infrastructure for the Natural Environment
    Nundloll, Vatsala
    Porter, Barry
    Blair, Gordon S.
    Emmett, Bridget
    Cosby, Jack
    Jones, Davey L.
    Chadwick, Dave
    Winterbourn, Ben
    Beattie, Philip
    Dean, Graham
    Shaw, Rory
    Shelley, Wayne
    Brown, Mike
    Ullah, Izhar
    [J]. FUTURE INTERNET, 2019, 11 (06)
  • [6] End-to-end security validation of IoT systems based on digital twins of end-devices
    Maillet-Contoz, Laurent
    Michel, Emmanuel
    Nava, Mario Diaz
    Brun, Paul-Emmanuel
    Lepretre, Kevin
    Massot, Guillemette
    [J]. 2020 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), 2020,
  • [7] Application Layer Key Establishment for End-to-End Security in IoT
    Perez, Salvador
    Hernandez-Ramos, Jose L.
    Raza, Shahid
    Skarmeta, Antonio
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (03): : 2117 - 2128
  • [8] Performance Analysis of End-to-End Security Schemes in Healthcare IoT
    Moosavi, Sanaz Rahimi
    Nigussie, Ethiopia
    Levorato, Marco
    Virtanen, Seppo
    Isoaho, Jouni
    [J]. 9TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2018) / THE 8TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2018) / AFFILIATED WORKSHOPS, 2018, 130 : 432 - 439
  • [9] End-to-end Security Architecture for Federated Cloud and IoT Networks
    Massonet, Philippe
    Deru, Laurent
    Achour, Amel
    Dupont, Sebastien
    Levin, Anna
    Villari, Massimo
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2017, : 463 - 468
  • [10] Decentralized security framework for future IoT end-to-end connectivity
    Xin, Qin
    Gonzalez Crespo, Ruben
    Enrique Montenegro-Marin, Carlos
    Garcia Diaz, Vicente
    Alazab, Mamoun
    [J]. ANNALS OF OPERATIONS RESEARCH, 2023, 326 (SUPPL 1) : 79 - 79