Biometric Cryptosystem Scheme for Internet of Things using Fuzzy Commitment principle

Recently, the ensuring security by biometric authentication/identification presents a big challenge for network designers. This precious biometric information have to be itself protected against fraudulent uses, especially during the remote authentication and data exchange in wireless mesh networks such as the Internet of Things (IoT). This paper presents a securing biometric cryptosystem for IoT based on fuzzy commitment principle which is suitable of the connected things due to their low processing and memorization capacity. Our scheme, which is based on fingerprint modalities, can be decomposed into two parts. Firstly, at the sender side, a biometric feature vector is extracted using DWT technique and then the data is encrypted in order to transmit via internet. Secondly, at the receiver side, an authentication protocol was used to authenticate the things and decrypt the received data. The obtained results, using a popular fingerprint dataset, show that the proposed scheme is more secure, fast and points at increased authentication accuracy.

[1]  Dario Maio,et al.  Direct Gray-Scale Minutiae Detection In Fingerprints , 1997, IEEE Trans. Pattern Anal. Mach. Intell..

[2]  Marco Gamassi,et al.  Fingerprint local analysis for high-performance minutiae extraction , 2005, IEEE International Conference on Image Processing 2005.

[3]  Kavita Tewari,et al.  Fingerprint Recognition and feature extraction using transform domain techniques , 2015, 2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014).

[4]  Sasa Adamovic,et al.  Fuzzy commitment scheme for generation of cryptographic keys based on iris biometrics , 2017, IET Biom..

[5]  M. Hossein Ahmadzadegan,et al.  Security challenges in internet of things: survey , 2017, 2017 IEEE Conference on Wireless Sensors (ICWiSe).

[6]  Thuc Dinh Nguyen,et al.  Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme , 2015, International Journal of Information Security.

[7]  Ingrid Moerman,et al.  IETF Standardization in the Field of the Internet of Things (IoT): A Survey , 2013, J. Sens. Actuator Networks.

[8]  Chao Gao,et al.  Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System , 2017, IEEE Internet of Things Journal.

[9]  Jian Chen,et al.  Radio Frequency Fingerprint Extraction of Radio Emitter Based on I/Q Imbalance , 2017 .

[10]  T. Amornraksa,et al.  A fingerprint matching method using DCT features , 2005, IEEE International Symposium on Communications and Information Technology, 2005. ISCIT 2005..

[11]  Annies Joshy,et al.  Design and implementation of an IoT based secure biometric authentication system , 2017, 2017 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES).

[12]  Anil K. Jain,et al.  Fingerprint Classification Using Orientation Field Flow Curves , 2004, ICVGIP.

[13]  S. Srinivasan,et al.  A survey on biometric based authentication in cloud computing , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).

[14]  Mark Mohammad Tehranipoor,et al.  Hardware security meets biometrics for the age of IoT , 2016, 2016 IEEE International Symposium on Circuits and Systems (ISCAS).

[15]  Ricardo Neisse,et al.  DIAT: A Scalable Distributed Architecture for IoT , 2015, IEEE Internet of Things Journal.

[16]  Naveed Riaz,et al.  Biometric template security: an overview , 2018 .

[17]  Ammar Rayes,et al.  Internet of Things Security and Privacy , 2017 .

[18]  Suela Kodra Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .

[19]  Arjan Kuijper,et al.  Quantifying privacy and security of biometric fuzzy commitment , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[20]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[21]  Zhao Yong,et al.  DCT fingerprint classifier based group fingerprint , 2014, 2014 International Conference on Audio, Language and Image Processing.

[22]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[23]  Evgeny M. Khorov,et al.  A survey on IEEE 802.11ah: An enabling networking technology for smart cities , 2015, Comput. Commun..

[24]  Du Yuanfeng,et al.  A Fingerprint Recognition Algorithm Based on Principal Component Analysis , 2006, TENCON 2006 - 2006 IEEE Region 10 Conference.