Evolving authentication design considerations for the Internet of biometric things (IoBT)

The Internet of Things (IoT) is a design implementation of embedded system design that connects a variety of devices, sensors, and physical objects to a larger connected network (e.g. the Internet) which requires human-to-human or human-to-computer interaction. While the IoT is expected to expand the user's connectivity and everyday convenience, there are serious security considerations that come into account when using the IoT for distributed authentication. Furthermore the incorporation of biometrics to IoT design brings about concerns of cost and implementing a `user-friendly' design. In this paper, we focus on the use of electrocardiogram (ECG) signals to implement distributed biometrics authentication within an IoT system model. Our observations show that ECG biometrics are highly reliable, more secure, and easier to implement than other biometrics.

[1]  Burak Kantarci,et al.  Towards secure cloud-centric Internet of Biometric Things , 2015, 2015 IEEE 4th International Conference on Cloud Networking (CloudNet).

[2]  Wang Jingli,et al.  The design of teaching management system in universities based on biometrics identification and the Internet of Things technology , 2015, 2015 10th International Conference on Computer Science & Education (ICCSE).

[3]  Fatemeh Tehranipoor,et al.  DRAM based Intrinsic Physical Unclonable Functions for System Level Security , 2015, ACM Great Lakes Symposium on VLSI.

[4]  Jeffrey M. Hausdorff,et al.  Physionet: Components of a New Research Resource for Complex Physiologic Signals". Circu-lation Vol , 2000 .

[5]  John Daugman,et al.  How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.

[6]  Chun-Liang Lin,et al.  Personalized information encryption using ECG signals with chaotic functions , 2012, Inf. Sci..

[7]  John Daugman,et al.  High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[8]  斯特凡娜·布隆德奥 Biometric personal authentication , 2013 .

[9]  Jingli Wang The design of teaching management system in universities based on biometrics identification and the Internet of Things technology , 2015, ICCSE 2015.

[10]  Theodore Tryfonas,et al.  The Internet of Things: a security point of view , 2016, Internet Res..

[11]  Dimitrios Hatzinakos,et al.  ECG biometric analysis in cardiac irregularity conditions , 2009, Signal Image Video Process..

[12]  Willis J. Tompkins,et al.  A Real-Time QRS Detection Algorithm , 1985, IEEE Transactions on Biomedical Engineering.

[13]  Bsava New website: Announcing BSAVA’s new website , 2016 .

[14]  Joseph A. O'Sullivan,et al.  ECG Biometric Recognition: A Comparative Analysis , 2012, IEEE Transactions on Information Forensics and Security.

[15]  Yacine Challal,et al.  A Systemic Approach for IoT Security , 2013, 2013 IEEE International Conference on Distributed Computing in Sensor Systems.

[16]  Mark Mohammad Tehranipoor,et al.  Hardware security meets biometrics for the age of IoT , 2016, 2016 IEEE International Symposium on Circuits and Systems (ISCAS).

[17]  Dimitrios Hatzinakos,et al.  ECG Pattern Analysis for Emotion Detection , 2012, IEEE Transactions on Affective Computing.

[18]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[19]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[20]  Mark Mohammad Tehranipoor,et al.  Highly Reliable Key Generation From Electrocardiogram (ECG) , 2017, IEEE Transactions on Biomedical Engineering.

[21]  L. Biel,et al.  ECG analysis: a new approach in human identification , 1999, IMTC/99. Proceedings of the 16th IEEE Instrumentation and Measurement Technology Conference (Cat. No.99CH36309).

[22]  Jiankun Hu,et al.  ECG-Based Authentication , 2010, Handbook of Information and Communication Security.

[23]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[24]  Fatemeh Tehranipoor,et al.  Robust hardware true random number generators using DRAM remanence effects , 2016, 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[25]  M. Grgic,et al.  A survey of biometric recognition methods , 2004, Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine.

[26]  Hong Liu,et al.  Cyber-Physical-Social Based Security Architecture for Future Internet of Things , 2012, IOT 2012.

[27]  Ola Pettersson,et al.  ECG analysis: a new approach in human identification , 2001, IEEE Trans. Instrum. Meas..

[28]  T AndreaRinaldi Biometrics ’ new identity — measuring more physical and biological traits Research into the characteristics that are unique to an individual is addressing the need to correctly identify people in a variety of medical , social and security contexts , 2015 .

[29]  Fatemeh Tehranipoor,et al.  A novel way to authenticate untrusted Integrated Circuits , 2015, 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).