2018
DOI: 10.3390/electronics7020026
|View full text |Cite
|
Sign up to set email alerts
|

A Cross-Layer Biometric Recognition System for Mobile IoT Devices

Abstract: A biometric recognition system is one of the leading candidates for the current and the next generation of smart visual systems. The visual system is the engine of the surveillance cameras that have great importance for intelligence and security purposes. These surveillance devices can be a target of adversaries for accomplishing various malicious scenarios such as disabling the camera in critical times or the lack of recognition of a criminal. In this work, we propose a cross-layer biometric recognition syste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2
2

Relationship

1
9

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…There has been a lot of study done on FKP recognition for both identification and authentication security, whether for IoT or more general security [116][117][118][119][120][121]. These are only a few instances.…”
Section: Related Workmentioning
confidence: 99%
“…There has been a lot of study done on FKP recognition for both identification and authentication security, whether for IoT or more general security [116][117][118][119][120][121]. These are only a few instances.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, a fingerprint-based authentication system is implemented with Raspberry Pi together with several types of sensors. Taheri and Yuan [28] developed a cross-layer biometric recognition system that includes both software and hardware layers in a chaining structure. In this work, biometrics (e.g., fingerprint) is adopted.…”
Section: Single-modal Biometric Authentication Systemsmentioning
confidence: 99%
“…In attaining this IoT vision, Low-Power (LP) and Loss Networks (LLNs) are diversified, and the interconnection of restricted physical devices by the use of LP and LLNs involves the modification of protocols and existing structures currently in common use [23]. Latterly, hardware trojan attacks have developed as a threat to all hardware and integrated circuits (ICs) [24]. The main challenge of handling network connectivity in a tightly-equipped setting, including a smart factory, is to identify and manipulate different attack vectors.…”
Section: Multi-layer Security Modelmentioning
confidence: 99%