2019
DOI: 10.1080/09720510.2019.1609722
|View full text |Cite
|
Sign up to set email alerts
|

Biometric authentication in internet of things : A conceptual view

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…Security threats linked with IoT may relate to physical security, computing security and data security (Ahmid and Kazar, In Press). This calls for authentication for securing information which may be made possible by using biometric authentication with iris recognition (Meena and Choudhary, 2019). Furthermore, conceding that diverse data (identification, positional, environmental, historical and descriptive) would be a part of the integrated IoT–e-government ecosystem, it is important that aspects such as querying, indexing, process modeling, transaction handling and integration of data across heterogenous systems be done in a deft manner (Cooper and James, 2009).…”
Section: Potential Barriers To Effect An Integration Of Internet Of T...mentioning
confidence: 99%
“…Security threats linked with IoT may relate to physical security, computing security and data security (Ahmid and Kazar, In Press). This calls for authentication for securing information which may be made possible by using biometric authentication with iris recognition (Meena and Choudhary, 2019). Furthermore, conceding that diverse data (identification, positional, environmental, historical and descriptive) would be a part of the integrated IoT–e-government ecosystem, it is important that aspects such as querying, indexing, process modeling, transaction handling and integration of data across heterogenous systems be done in a deft manner (Cooper and James, 2009).…”
Section: Potential Barriers To Effect An Integration Of Internet Of T...mentioning
confidence: 99%
“…Therefore, it is a major concern that is investigated using biometric authentication. In [10], the concept of securing the IoT network using biometric authentication through iris identification has been presented. In [11], the existing approaches for behavioral fingerprinting have been discussed generally, and their application on IoT devices has been evaluated.…”
Section: Related Workmentioning
confidence: 99%
“…The size of the fused feature vector is then reduced and input into the Euclidian Distance classifier for classification. Meena et al [ 62 ] presented a conceptual view about the application of iris-based authentication in the IoT. The authors identify the difficulty of applying iris authentication to IoT devices.…”
Section: Biometric-based Systems For Iot-oriented Authenticationmentioning
confidence: 99%
“…In this sub-section, several authentication and key agreement schemes are reviewed, in which biometrics are used as one factor to enhance the security level of the overall system. Despite the benefits of biometrics (e.g., difficult to copy or share, cannot be lost or forgotten and hard to forge, as opposed to passwords [ 62 ]), biometric data are uniquely linked to users’ identity. Therefore, user privacy protection is becoming more important, calling for attention and action from both academia and industry.…”
Section: Biometric-based Systems For Iot-oriented Authenticationmentioning
confidence: 99%