2022
DOI: 10.1155/2022/8051905
|View full text |Cite
|
Sign up to set email alerts
|

Security-Level Improvement of IoT-Based Systems Using Biometric Features

Abstract: The Internet of Things (IoT) is reported as a main research topic in the current decade. It will be possible to connect smart devices to each other using IoT, a platform such as the Internet. However, the expansion and intrusion of such a large network raises some new security issues and risks related to the disclosure of user confidential information where these devices are subject to hacker threats and intrusions. Traditional security systems were password based. In this paper, after reviewing the actions ta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 30 publications
(26 reference statements)
0
3
0
Order By: Relevance
“…e extensive connectivity and continuous sharing of data of these devices make them a prime target of di erent threat actors that can execute anomalous activities against them [6]. e exploit's motivations are to obtain important information, steal money, and damage the system's resources [7][8][9].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…e extensive connectivity and continuous sharing of data of these devices make them a prime target of di erent threat actors that can execute anomalous activities against them [6]. e exploit's motivations are to obtain important information, steal money, and damage the system's resources [7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…While providing significant benefits, the pervasive and open nature of the IoMT ecosystem makes it a possible target for various emerging cyber threats and attacks [ 2 5 ]. The extensive connectivity and continuous sharing of data of these devices make them a prime target of different threat actors that can execute anomalous activities against them [ 6 ]. The exploit's motivations are to obtain important information, steal money, and damage the system's resources [ 7 9 ].…”
Section: Introductionmentioning
confidence: 99%
“…Biometric authentications are popular, more reliable, and user-friendly than conventional methods. The previous research has discussed IoT issues and challenges regarding biometric security and application, including where biometrics can be integrated into IoT infrastructure [26], [51], [57].…”
Section: E Biometric Technology On Internet Of Things Platformmentioning
confidence: 99%