Biometric-Based Physical and Cybersecurity Systems 2018
DOI: 10.1007/978-3-319-98734-7_19
|View full text |Cite
|
Sign up to set email alerts
|

Biometric Security and Internet of Things (IoT)

Abstract: The human-to-machine and human-to-human communications are transforming to machine-to-machine communications by which several decision-making systems can be built. When different Internet enabled smart devices interact with each other's to achieve a goal (application depended), then a network is formed in which different sophisticated technologies will integrate to each other to form Internet of Things (IoT). It encompasses the vast amount of diverse smart devices, which collaborate with each other to achieve … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
15
0
2

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(19 citation statements)
references
References 73 publications
0
15
0
2
Order By: Relevance
“…Several biometric traits that meet these requirements are generally classified into two categories, physiological traits and behavioral traits, as shown in Figure 2 . Each biometric trait has its strengths and drawbacks; thus, the selection of biometric traits for authentication and encryption purposes depends on specific IoT applications [ 12 ]. Below is a brief introduction to common biometric traits.…”
Section: Biometrics Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Several biometric traits that meet these requirements are generally classified into two categories, physiological traits and behavioral traits, as shown in Figure 2 . Each biometric trait has its strengths and drawbacks; thus, the selection of biometric traits for authentication and encryption purposes depends on specific IoT applications [ 12 ]. Below is a brief introduction to common biometric traits.…”
Section: Biometrics Overviewmentioning
confidence: 99%
“…In addition, the computing cost, system structure and experiment setup of different schemes are compared and analyzed in [ 11 ]. Obaidat et al [ 12 ] discussed and compared popular biometric traits applied to the IoT in terms of accuracy, ease of use and cost. The authors also covered the biometric feature extraction techniques (e.g., the Fourier transform and Gabor filtering) and gave an example of a biometric-based eHealth system.…”
Section: Introductionmentioning
confidence: 99%
“…Data and identity theft occur in case of careless handling of Internet-connected devices. The information accessible on the Internet including social media and smart devices gives an overall clue of personal identity [37]. For the level where direct human access is needed, biometric security arrangements are highly recommended.…”
Section: Introductionmentioning
confidence: 99%
“…Biometric security arrangements ensure a scalable solution for IoT to work against unauthorized access, ID swapping, and manual badge checks. Biometric-based security can be used in every application area of IoT [29,31,33,37].…”
Section: Introductionmentioning
confidence: 99%
“…It is recommended to consider and analyse combined methods of identification, usually it is necessary to find ways to improve the effectiveness of biometric security systems against unauthorised access. It is worth always to consider the development of technologies to improve the above tools [18].…”
mentioning
confidence: 99%