2023
DOI: 10.1109/jiot.2022.3204246
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Length-Flexible Lightweight Cancelable Fingerprint Template for Privacy-Preserving Authentication Systems in Resource-Constrained IoT Applications

Abstract: Fingerprint authentication techniques have been employed in various Internet of Things (IoT) applications for access control to protect private data, but raw fingerprint template leakage in unprotected IoT applications may render the authentication system insecure. Cancelable fingerprint templates can effectively prevent privacy breaches and provide strong protection to the original templates. However, to suit resource-constrained IoT devices, oversimplified templates would compromise authentication performanc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 42 publications
0
5
0
Order By: Relevance
“…Definition 3: Global sensitivity: The global sensitivity can be expressed by (3), where Q represents any query function and :…”
Section: ( ) ( ) ( )mentioning
confidence: 99%
See 1 more Smart Citation
“…Definition 3: Global sensitivity: The global sensitivity can be expressed by (3), where Q represents any query function and :…”
Section: ( ) ( ) ( )mentioning
confidence: 99%
“…The fingerprint image is obtained and the fingerprint feature information is extracted by the attacker, and the fake fingerprint and synthetic fingerprint can be produced by the fingerprint feature information. Fake fingerprint and synthetic fingerprint are the methods of forging or synthesizing fingerprint models by various means to cheat fingerprint identification system [3].…”
Section: Introductionmentioning
confidence: 99%
“…In order to solve the problem of multi-level data transmission security, Aman et al [28] proposed a multi-hop indirect data transmission method to complete the whole communication process with the help of other auxiliary devices, as well as to complete the authentication of identity between devices based on PUF. In order to protect data privacy, Yin et al [29] adopted fingerprint authentication technique to solve the privacy leakage problem and proposed a lightweight fingerprint template with variable length to help resourceconstrained devices with data privacy protection. However, this scheme has limited application scenarios and is difficult to meet the communication authentication between devices.…”
Section: Related Workmentioning
confidence: 99%
“…X. Yin el al. [13] System presented a lightweight, length-flexible fingerprint template design in this article for privacy-preserving authentication systems in resource-constrained Internet of Things applications. There are two parts to the suggested template design: 1) Lightweight cancellable feature creation based on the encoding-nested-difference OR method, and 2) length-flexible partialcancellable feature generation based on the reinedxing approach.…”
Section: IImentioning
confidence: 99%