2022
DOI: 10.3233/ica-210673
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight encryption for short-range wireless biometric authentication systems in Industry 4.0

Abstract: Most recent solutions for users’ authentication in Industry 4.0 scenarios are based on unique biological characteristics that are captured from users and recognized using artificial intelligence and machine learning technologies. These biometric applications tend to be computationally heavy, so to monitor users in an unobtrusive manner, sensing and processing modules are physically separated and connected through point-to-point wireless communication technologies. However, in this approach, sensors are very re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 69 publications
1
7
0
Order By: Relevance
“…Mathematical operations are consistent with traditional decryption algorithms (only one cell as the test message is no longer than one hundred bits). Besides, the processing delay is similar to other algorithms reported for resource constrained nodes [6].…”
Section: Resultssupporting
confidence: 81%
See 1 more Smart Citation
“…Mathematical operations are consistent with traditional decryption algorithms (only one cell as the test message is no longer than one hundred bits). Besides, the processing delay is similar to other algorithms reported for resource constrained nodes [6].…”
Section: Resultssupporting
confidence: 81%
“…These devices are usually manufactured as sensing nodes whose computational resources are sparse and only enough to capture data and transmit it to a central gateway using point-to-point communications [5]. Feedback control algorithms, orchestration and resource allocation mechanisms, communication management protocols and other similar computationally heavy technologies are delegated to gateways, placed at the central point of a star topology network, and where more resources and available [6]. Also, with such several devices, human intervention is totally inefficient, and devices must operate autonomously.…”
Section: Introductionmentioning
confidence: 99%
“…Hardware attacks such as VGAs are among the most important modern attacks on IoT/IIoT devices [ 20 ]. Features such as the predicted behavior of the device can be changed, or even secret information such as encryption keys can be changed intercepted [ 33 ]. Given the growing complexity, ever-changing distributed industrial environment combined with the weakness of traditional systems, which in most cases fails to adapt to modern challenges, it is necessary to use alternative and more effective methods to protect industrial infrastructures [ 4 , 7 ].…”
Section: Discussionmentioning
confidence: 99%
“…The attacker cannot increment the estimate of P to diminish the likelihood of a collision and rehash the attack as, within the proposed design, the item maintenance encryption is not remotely retrievable as [ 28 , 29 ] …”
Section: Methodsmentioning
confidence: 99%