2020
DOI: 10.1016/j.patrec.2020.08.017
|View full text |Cite
|
Sign up to set email alerts
|

On the design of biometric-based user authentication protocol in smart city environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 40 publications
(5 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…In that paper, they mentioned individual privacy but did not prove that personal privacy could actually be leaked. Bera et al [17] propose a new type of biometric-based authentication scheme using passwords and biometric information. ey presented a secure authentication scheme for various cyber attacks such as replay attacks and man-in-themiddle attacks.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In that paper, they mentioned individual privacy but did not prove that personal privacy could actually be leaked. Bera et al [17] propose a new type of biometric-based authentication scheme using passwords and biometric information. ey presented a secure authentication scheme for various cyber attacks such as replay attacks and man-in-themiddle attacks.…”
Section: Discussionmentioning
confidence: 99%
“…However, they did not present details on the privacy leakage problem of ECG-based authentication schemes. Bera et al [17] proposed a robust security design for ECG-based authentication by combining ECG features with other biometric information. ey claim that their design can successfully mitigate system and network attacks such as man-in-the-middle, replay, and privilege escalation attacks.…”
Section: Vulnerability Of Ecg-based Authentication Schemesmentioning
confidence: 99%
“…In the year 2020, Basudeb et al [22] proposed a new biometric-based authentication protocol for smart cities. They allow a registered user to update their password based on biometric authentication.…”
Section: Literature Reviewmentioning
confidence: 99%
“…To improve security, the authentication schema involves integrating encryption techniques, such as ''RSA-based public key cryptosystem'' [60], ''Secure Hash Agorithm (SHA)'' [61], ''Advanced Encryption Standard (AES)'' [62], and ''Elliptic Curve Cryptography (ECC)'' [63]. In recent years, ''access control, authentication and key management'' are widely-used two main security mechanisms in providing security in IoT-enabled environments [64], [65], [66], [67], [68], [69], [70], [71], [72], [73], [74], [75], [76], [77], [78], [79], [80].…”
Section: B Security Requirementsmentioning
confidence: 99%