Remote user authentication for Internet of Things (IoT) devices is critical to IoT security, as it helps prevent unauthorized access to IoT networks. Biometrics is an appealing authentication technique due to its advantages over traditional password-based authentication. However, the protection of biometric data itself is also important, as original biometric data cannot be replaced or reissued if compromised. In this paper, we propose a cancelable iris- and steganography-based user authentication system to provide user authentication and secure the original iris data. Most of the existing cancelable iris biometric systems need a user-specific key to guide feature transformation, e.g., permutation or random projection, which is also known as key-dependent transformation. One issue associated with key-dependent transformations is that if the user-specific key is compromised, some useful information can be leaked and exploited by adversaries to restore the original iris feature data. To mitigate this risk, the proposed scheme enhances system security by integrating an effective information-hiding technique-steganography. By concealing the user-specific key, the threat of key exposure-related attacks, e.g., attacks via record multiplicity, can be defused, thus heightening the overall system security and complementing the protection offered by cancelable biometric techniques.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC6651016 | PMC |
http://dx.doi.org/10.3390/s19132985 | DOI Listing |
Biomed Eng Lett
January 2025
Department of Electronic Engineering, Hanyang University, Seoul, 04763 Republic of Korea.
Demand for user authentication in virtual reality (VR) applications is increasing such as in-app payments, password manager, and access to private data. Traditionally, hand controllers have been widely used for the user authentication in VR environment, with which the users can typewrite a password or draw a pre-registered pattern; however, the conventional approaches are generally inconvenient and time-consuming. In this study, we proposed a new user authentication method based on eye-writing patterns identified using electrooculogram (EOG) recorded from four locations around the eyes in contact with the face-pad of a VR headset.
View Article and Find Full Text PDFSensors (Basel)
December 2024
Informatics Laboratory, Agricultural University of Athens, 11855 Athens, Greece.
This study presents a blockchain-based traceability system designed specifically for the olive oil supply chain, addressing key challenges in transparency, quality assurance, and fraud prevention. The system integrates Internet of Things (IoT) technology with a decentralized blockchain framework to provide real-time monitoring of critical quality metrics. A practical web application, linked to the Ethereum blockchain, enables stakeholders to track each stage of the supply chain via tamper-proof records.
View Article and Find Full Text PDFSensors (Basel)
December 2024
Department of Financial Information Security, Kookmin University, Seoul 02707, Republic of Korea.
The 5G-AKA protocol, a foundational component for 5G network authentication, has been found vulnerable to various security threats, including linkability attacks that compromise user privacy. To address these vulnerabilities, we previously proposed the 5G-AKA-Forward Secrecy (5G-AKA-FS) protocol, which introduces an ephemeral key pair within the home network (HN) to support forward secrecy and prevent linkability attacks. However, a re-evaluation uncovered minor errors in the initial BAN-logic verification and highlighted the need for more rigorous security validation using formal methods.
View Article and Find Full Text PDFSensors (Basel)
December 2024
School of Engineering and Sciences, Tecnologico de Monterrey, Monterrey 64700, Nuevo Leon, Mexico.
With recent significant advancements in artificial intelligence, the necessity for more reliable recognition systems has rapidly increased to safeguard individual assets. The use of brain signals for authentication has gained substantial interest within the scientific community over the past decade. Most previous efforts have focused on identifying distinctive information within electroencephalogram (EEG) recordings.
View Article and Find Full Text PDFEntropy (Basel)
November 2024
School of Economics and Management, East China Jiaotong University, Nanchang 330013, China.
In response to the widespread issue of fake comments on e-commerce platforms, this study aims to analyze and propose a blockchain-based solution to incentivize authentic user feedback and reduce the prevalence of fraudulent reviews. Specifically, this paper constructs a tripartite evolutionary game model between sellers, buyers, and e-commerce platforms to study the real comment mechanism of blockchain. The strategy evolution under different incentive factors is simulated using replication dynamic equation analysis and Matlab software simulation.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!