Biometric Security and Internet of Things (IoT)

The human-to-machine and human-to-human communications are transforming to machine-to-machine communications by which several decision-making systems can be built. When different Internet-enabled smart devices interact with each other to achieve a goal (application depended), then a network is formed in which different sophisticated technologies will integrate to each other to form Internet of Things (IoT). It encompasses the vast amount of diverse smart devices, which collaborate with each other to achieve different smart applications like smart cities, connected cars, automated agriculture, and so on. Through radio-frequency identification (RFID), wireless, mobile, and sensor technologies make IoT feasible, but it suffers from many challenges like scalability, security, and heterogeneity problems. Out of many challenges, security is one of the primary concerns in IoT. Without proper security and privacy, the business model of IoT will not succeed. This chapter discusses the secure solutions for IoT using biometric features of users as well as end users. The chapter will demonstrate that biometric security is most feasible, reliable, and efficient with respect to other existing security arrangements.

[1]  Michele Zorzi,et al.  Health care applications: a solution based on the internet of things , 2011, ISABEL '11.

[2]  Marcos Faúndez-Zanuy,et al.  Biometric security technology , 2006, IEEE Aerospace and Electronic Systems Magazine.

[3]  Mohammad S. Obaidat,et al.  Security of e-Systems and Computer Networks , 2007 .

[4]  Yu Feng,et al.  The study and application of the IOT technology in agriculture , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[5]  Wei Wang,et al.  Recognizing Keystrokes Using WiFi Devices , 2017, IEEE Journal on Selected Areas in Communications.

[6]  Eric C. Larson,et al.  SpiroSmart: using a microphone to measure lung function on a mobile phone , 2012, UbiComp.

[7]  Zeng Lingkang Internet of things and smart grid , 2012 .

[8]  Michele Ruta,et al.  CoAP-based healthcare sensor networks: A survey , 2014, Proceedings of 2014 11th International Bhurban Conference on Applied Sciences & Technology (IBCAST) Islamabad, Pakistan, 14th - 18th January, 2014.

[9]  Carsten Gottschlich Curved Gabor Filters for Fingerprint Image Enhancement , 2011, ArXiv.

[10]  Geir M. Køien,et al.  Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..

[11]  David G. Lowe,et al.  Object recognition from local scale-invariant features , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.

[12]  Theresa A. Pardo,et al.  Conceptualizing smart city with dimensions of technology, people, and institutions , 2011, dg.o '11.

[13]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[14]  Andrea Zanella,et al.  Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.

[15]  von F. Zernike Beugungstheorie des schneidenver-fahrens und seiner verbesserten form, der phasenkontrastmethode , 1934 .

[16]  Dario Bonino,et al.  ALMANAC: Internet of Things for Smart Cities , 2015, 2015 3rd International Conference on Future Internet of Things and Cloud.

[17]  Dong-Chen He,et al.  Texture Unit, Texture Spectrum, And Texture Analysis , 1990 .

[18]  Carsten Gottschlich,et al.  Curved-Region-Based Ridge Frequency Estimation and Curved Gabor Filters for Fingerprint Image Enhancement , 2011, IEEE Transactions on Image Processing.

[19]  Mohammad S. Obaidat,et al.  Smart Cities and Homes: Key Enabling Technologies , 2016 .

[20]  Paul Suetens,et al.  meshSIFT: Local surface features for 3D face recognition under expression variations and partial data , 2013, Comput. Vis. Image Underst..

[21]  Lihua Huang,et al.  Cloud Computing and the Internet of Things: Technology Innovation in Automobile Service , 2013, HCI.

[22]  Marit Hansen,et al.  Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..

[23]  Andrea Tagliasacchi,et al.  Sphere-meshes for real-time hand modeling and tracking , 2016, ACM Trans. Graph..

[24]  Chao Li,et al.  SemanMedical: A kind of semantic medical monitoring system model based on the IoT sensors , 2012, 2012 IEEE 14th International Conference on e-Health Networking, Applications and Services (Healthcom).

[25]  Borhanuddin Mohd Ali,et al.  A Network Mobility Solution Based on 6LoWPAN Hospital Wireless Sensor Network (NEMO-HWSN) , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[26]  Doroteo Torre Toledano,et al.  Emulating DNA: Rigorous Quantification of Evidential Weight in Transparent and Testable Forensic Speaker Recognition , 2007, IEEE Transactions on Audio, Speech, and Language Processing.

[27]  Antonio F. Gómez-Skarmeta,et al.  Drugs interaction checker based on IoT , 2010, 2010 Internet of Things (IOT).

[28]  Shiv Ram Dubey,et al.  Identity verification using shape and geometry of human hands , 2015, Expert Syst. Appl..

[29]  Dacheng Tao,et al.  Multi-Task Pose-Invariant Face Recognition , 2015, IEEE Transactions on Image Processing.

[30]  Begonya Garcia-Zapirain,et al.  Gait Analysis Methods: An Overview of Wearable and Non-Wearable Systems, Highlighting Clinical Applications , 2014, Sensors.

[31]  Ying Shen,et al.  Towards contactless palmprint recognition: A novel device, a new benchmark, and a collaborative representation based identification approach , 2017, Pattern Recognit..

[32]  Juan Ruiz-Alzola,et al.  Biometric identification systems , 2003, Signal Process..

[33]  Sarmistha Neogy,et al.  Enabling agricultural automation to optimize utilization of water, fertilizer and insecticides by implementing Internet of Things (IoT) , 2016, 2016 International Conference on Information Technology (InCITe) - The Next Generation IT Summit on the Theme - Internet of Things: Connect your Worlds.

[34]  Ajay Kumar,et al.  Personal Authentication Using Hand Vein Triangulation and Knuckle Shape , 2009, IEEE Transactions on Image Processing.

[35]  John Daugman How iris recognition works , 2004 .

[36]  Anil K. Jain,et al.  Handbook of Face Recognition, 2nd Edition , 2011 .

[37]  Miao Yun,et al.  Research on the architecture and key technology of Internet of Things (IoT) applied on smart grid , 2010, 2010 International Conference on Advances in Energy Engineering.

[38]  Antonio Iera,et al.  A systemic and cognitive approach for IoT security , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[39]  Peter Semmelhack Social Machines: How to Develop Connected Products That Change Customers' Lives , 2013 .

[40]  Yair Frankel,et al.  On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[41]  Dieter Hayn,et al.  The Internet of Things for Ambient Assisted Living , 2010, 2010 Seventh International Conference on Information Technology: New Generations.

[42]  Yonghui Zhang,et al.  Intelligent Monitoring System on Refrigerator Trucks Based on the Internet of Things , 2011 .

[43]  Yifan Bo,et al.  The Application of Cloud Computing and the Internet of Things in Agriculture and Forestry , 2011, 2011 International Joint Conference on Service Sciences.

[44]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[45]  Hannu Tenhunen,et al.  Smart e-Health Gateway: Bringing intelligence to Internet-of-Things based ubiquitous healthcare systems , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).

[46]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[47]  Zhenhua Guo,et al.  Hierarchical multiscale LBP for face and palmprint recognition , 2010, 2010 IEEE International Conference on Image Processing.

[48]  Klaus Wehrle,et al.  Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..

[49]  Tardi Tjahjadi,et al.  Silhouette-based gait recognition using Procrustes shape analysis and elliptic Fourier descriptors , 2012, Pattern Recognit..

[50]  Kyung-Sup Kwak,et al.  The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.

[51]  Hongyu Li,et al.  3D Palmprint Identification Using Block-Wise Features and Collaborative Representation , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[52]  Réjean Plamondon,et al.  Signature Verification Based on the Kinematic Theory of Rapid Human Movements , 2017, IEEE Transactions on Human-Machine Systems.

[53]  Juan I. Nieto-Hipólito,et al.  A proposal for using the internet of things concept to increase children's health awareness , 2012, CONIELECOMP 2012, 22nd International Conference on Electrical Communications and Computers.

[54]  Mohammad S. Obaidat,et al.  A robust ElGamal‐based password‐authentication protocol using smart card for client‐server communication , 2017, Int. J. Commun. Syst..

[55]  J. Wareham,et al.  A Smart City Initiative: the Case of Barcelona , 2012, Journal of the Knowledge Economy.

[56]  Youbao Tang,et al.  Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform , 2014, IEEE Transactions on Information Forensics and Security.

[57]  F. Zernike,et al.  Diffraction Theory of the Knife-Edge Test and its Improved Form, The Phase-Contrast Method , 1934 .

[58]  Neucimar Jerônimo Leite,et al.  A New Framework for Quality Assessment of High-Resolution Fingerprint Images , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[59]  Tanmoy Maitra,et al.  An Efficient Biometric and Password-Based Remote User Authentication using Smart Card for Telecare Medical Information Systems in Multi-Server Environment , 2014, Journal of Medical Systems.

[60]  Chun-Wei Tan,et al.  Accurate Iris Recognition at a Distance Using Stabilized Iris Encoding and Zernike Moments Phase Features , 2014, IEEE Transactions on Image Processing.

[61]  Bo Yang,et al.  Smart home research , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).

[62]  Weiming Shen,et al.  A home mobile healthcare system for wheelchair users , 2014, Proceedings of the 2014 IEEE 18th International Conference on Computer Supported Cooperative Work in Design (CSCWD).

[63]  Huang Yue-shan,et al.  A Community Health Service Architecture Based on the Internet of Things on Health-Care , 2013 .

[64]  Jie Chen,et al.  Fusing Local Patterns of Gabor Magnitude and Phase for Face Recognition , 2010, IEEE Transactions on Image Processing.

[65]  Antonio Iera,et al.  SIoT: Giving a Social Structure to the Internet of Things , 2011, IEEE Communications Letters.

[66]  Wenbo He,et al.  A Reservation-based Smart Parking System , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[67]  Athanasios V. Vasilakos,et al.  A Survey on Ambient Intelligence in Healthcare , 2013, Proceedings of the IEEE.

[68]  Arun Ross,et al.  Periocular Biometrics in the Visible Spectrum , 2011, IEEE Transactions on Information Forensics and Security.

[69]  R. S. H. Istepanian,et al.  The potential of Internet of m-health Things “m-IoT” for non-invasive glucose level sensing , 2011, 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[70]  Mohammad S. Obaidat,et al.  Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.

[71]  Antonio Iera,et al.  The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.

[72]  Matthew E Falagas,et al.  Counterfeit or substandard antimicrobial drugs: a review of the scientific evidence. , 2007, The Journal of antimicrobial chemotherapy.

[73]  Luca Veltri,et al.  Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview , 2013, Algorithms.

[74]  Wonjun Hwang,et al.  Face Recognition System Using Multiple Face Model of Hybrid Fourier Feature Under Uncontrolled Illumination Variation , 2011, IEEE Transactions on Image Processing.

[75]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[76]  Chun-Wei Tan,et al.  Unified Framework for Automated Iris Segmentation Using Distantly Acquired Face Images , 2012, IEEE Transactions on Image Processing.