TOWARD END-TO-END BIOMETRICS-BASED SECURITY FOR IOT INFRASTRUCTURE

被引:70
|
作者
Hossain, M. Shamim [1 ]
Muhammad, Ghulam [2 ]
Rahman, Sk Md Mizanur [3 ]
Abdul, Wadood [2 ]
Alelaiwi, Abdulhameed [4 ]
Alamri, Atif [3 ]
机构
[1] King Saud Univ, CCIS, Dept Software Engn, Riyadh, Saudi Arabia
[2] King Saud Univ, CCIS, Dept Comp Engn, Riyadh, Saudi Arabia
[3] King Saud Univ, CCIS, Dept Informat Syst, Riyadh, Saudi Arabia
[4] King Saud Univ, CCIS, SWE Dept, Riyadh, Saudi Arabia
关键词
INTERNET; THINGS;
D O I
10.1109/MWC.2016.7721741
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The IoT is the next generation of innovation in the smart world, which has the potential to improve safety, security, and the quality of our daily lives through pervasive communication and computation. Currently, we have observed that a plethora of interconnected smartphones, devices, and sensors are deployed for providing personalized services (e.g., social media, smart home, health monitoring) at any time from anywhere. The personalized services offered by IoT, although enhancing the quality of our lives, have serious challenges of securing networks and data in transit, as every day a myriad of devices and services are connected to the IoT. However, existing security solutions, such as two-factor authentication based on passwords along with second-level protection may not be efficient and reliable for providing end-to-end secure communication solutions among different devices and services connected to the IoT. To this end, this article proposes an end-to-end secure IoT-based solution using biometrics and pairing-based cryptography. Because of the uniqueness of one's biometric traits (e.g., face, fingerprint, palm, iris, voice, heartbeat), a biometric-based security solution is less vulnerable to security breaches for IoT systems or infrastructure. We present a biometric-based IoT infrastructure comprising four layers, and for each layer, we discuss possible security challenges along with the corresponding countermeasures. Finally, we provide a case study of face-based biometric recognition, where sensors or smartphones capture a face image and securely transmit it to the IoT platform to provide end-to end security.
引用
收藏
页码:44 / 51
页数:8
相关论文
共 50 条
  • [31] End-to-End Management of IoT Applications
    Khazaei, Hamzeh
    Bannazadeh, Hadi
    Leon-Garcia, Alberto
    [J]. 2017 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (IEEE NETSOFT), 2017,
  • [32] Enhancing End-to-End Communication Security in IoT Devices Through Application Layer Protocol
    Zahid, Rimsha
    Anwar, Muhammad Waseem
    Azam, Farooque
    Amjad, Anam
    Mukhtar, Danish
    [J]. INFORMATION AND SOFTWARE TECHNOLOGIES, ICIST 2022, 2022, 1665 : 148 - 159
  • [33] iTLS/iDTLS: Lightweight End-to-End Security Protocol for IoT Through Minimal Latency
    Li, Pengkun
    Su, Jinshu
    Wang, Xiaofeng
    [J]. PROCEEDINGS OF THE 2019 ACM SIGCOMM CONFERENCE POSTERS AND DEMOS (SIGCOMM '19), 2019, : 166 - 168
  • [34] Erratum to: Secure IoT framework and 2D architecture for End-To-End security
    Jongseok Choi
    Youngjin In
    Changjun Park
    Seonhee Seok
    Hwajeong Seo
    Howon Kim
    [J]. The Journal of Supercomputing, 2018, 74 : 3536 - 3536
  • [35] Toward the inclusion of end-to-end security in the OM2M platform
    Simone Patonico
    Thanh-Long Nguyen
    Placide Shabisha
    An Braeken
    Kris Steenhaut
    [J]. The Journal of Supercomputing, 2021, 77 : 4056 - 4080
  • [36] Toward the inclusion of end-to-end security in the OM2M platform
    Patonico, Simone
    Nguyen, Thanh-Long
    Shabisha, Placide
    Braeken, An
    Steenhaut, Kris
    [J]. JOURNAL OF SUPERCOMPUTING, 2021, 77 (04): : 4056 - 4080
  • [37] IoT ETEI: End-to-end IoT device identification method
    Yin, Feihong
    Yang, Li
    Wang, Yuchen
    Dai, Jiahao
    [J]. 2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [38] End-To-End Security for Video Distribution
    Boho, Andras
    Van Wallendael, Glenn
    Dooms, Ann
    De Cock, Jan
    Braeckman, Geert
    Schelkens, Peter
    Preneel, Bart
    Van de Walle, Rik
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 97 - 107
  • [39] A transparent end-to-end security solution
    Thomas, S
    Misra, D
    Eswari, PRL
    Babu, NSC
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 336 - 339
  • [40] An end-to-end security solution for SCTP
    Lindskog, Stefan
    Brunstrom, Anna
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 526 - +