2019
DOI: 10.1155/2019/1694702
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprint Protected Password Authentication Protocol

Abstract: With the rapid development of industrial Internet of things (IIOT), a variety of cloud services have been deployed to store and process the big data of IIOT. The traditional password only authentication is unable to meet the needs of security situation in IIOT. Therefore, a lot of mobile phone assisted password authentication schemes have been proposed. However, in existing schemes, the secret information is required to be stored in the user’s mobile phone. Once the phone is lost, the secret information may be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…[28] relies on vibration captures by accelerometer to reconstruct the user's heartbeat signal. [29] use user's fingerprint to assist in generating private keys. In [30], a dynamic feature selection for hand-writing is developed to enhance the authentication performance.…”
Section: B Biometrics-driven Explicit Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…[28] relies on vibration captures by accelerometer to reconstruct the user's heartbeat signal. [29] use user's fingerprint to assist in generating private keys. In [30], a dynamic feature selection for hand-writing is developed to enhance the authentication performance.…”
Section: B Biometrics-driven Explicit Authenticationmentioning
confidence: 99%
“…However, these solutions are still not perfect: signals used in these works are generated from biochemical effect [2], [26], [28], which are weak and are not directly measured thus needs a high signal-to-noise ratio environment; or are sent from other devices [27], which face common problems in machine-to-machine authentication, as in [31], [32]. The approaches in [29], [30] heavily rely on online servers and can hardly be performed in an offline manner.…”
Section: B Biometrics-driven Explicit Authenticationmentioning
confidence: 99%
“…It usually uses learning methods to extract information representing user characteristics from different types of sensors on mobile devices to build a model. Such as face [6,7], fingerprint [8,9], voice [10,11], environmental location [12,13], keystroke behavior [14,15], finger movement [16,17], etc. However, the above-mentioned biometric information collection usually requires invoking the privacy-related permissions of the mobile device, which makes users worry that their privacy-related information may be leaked, and cannot take into account the security, privacy, and usability requirements of mobile authentication jointly at the same time.…”
Section: Introductionmentioning
confidence: 99%
“…Both fingerprint scanners and readers are incredibly secure and appropriate devices for security rather than a secret word because the password is easy to guess and difficult to remember. A fingerprint-protected password authentication technique that does not require the secret parameter to be saved in the phone [2]. Throughout the secret key generation process, the password and fingerprint should always be submitted.…”
Section: Introductionmentioning
confidence: 99%