Abstract
When milliards of smart devices are connected to the Internet using the Internet of Things (IoT), robust security methods are required to deliver current information to the objects. Using IoT, the user can be accessed via smart device applications at any time and any place, which challenges IoT security and privacy. From security point of view, users and smart devices should have secure communication channel and digital ID. Authentication is the first step towards any security action. Biometric-based authentication can ensure higher security for developing secure access. In this paper, fingerprint is used as the biometric factor. After scanning the fingerprint using the cellphone’s camera, the image is transmitted to the authentication system. Since the comparison time increases after increasing the database volume, instead of storing the scanned fingerprint image, some key features of the scanned fingerprint are extracted and transmitted to the learning system of the convolutional neural network for detection and authentication and stored in the database. In the user authentication phase, the authentication keys are identified and the passcodes for the user of interest are extracted, and zero code is sent to the forged people; finally, the passcode is examined to check if the user is legal or illegal. In this step, the legal codes for fuzzy encoding of the image and text information are activated, and encryption is carried out in multiple steps depending on the number of members. The final code is compressed using Huffman coding and used for transmission to the network or storage. The proposed method is tested in MATLAB, and the results show that an excellent security is achieved using this cascade encryption method. Conclusively, the proposed hybrid coding technique reduces the information volume by 15.9%.
Highlights
Internet of Things (IoT) is a keyword in which all digital devices are connected to exchange information with each other
In [7], a secure biometric encryption has been presented for IoT based on fuzzy commitment that is suitable due to its ability to process and protect data against devices connected to the network
We presented a reliable encryption scheme for the IoT that considers security requirements and material constraints of the connected objects
Summary
Received 6 November 2021; Revised 12 January 2022; Accepted 18 January 2022; Published 26 February 2022. In the user authentication phase, the authentication keys are identified and the passcodes for the user of interest are extracted, and zero code is sent to the forged people; the passcode is examined to check if the user is legal or illegal. In this step, the legal codes for fuzzy encoding of the image and text information are activated, and encryption is carried out in multiple steps depending on the number of members. The proposed hybrid coding technique reduces the information volume by 15.9%
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.