دورية أكاديمية

Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server.

التفاصيل البيبلوغرافية
العنوان: Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server.
المؤلفون: Irshad, Azeem, Usman, Muhammad, Chaudhry, Shehzad Ashraf, Bashir, Ali Kashif, Jolfaei, Alireza, Srivastava, Gautam
المصدر: IEEE Transactions on Reliability; Sep2021, Vol. 70 Issue 3, p1014-1025, 12p
مصطلحات موضوعية: HUMAN fingerprints, BIOMETRIC identification, BIOMETRY, FUZZY systems, MULTI-factor authentication, FUZZY logic
مستخلص: Fuzzy systems can aid in diminishing uncertainty and noise from biometric security applications by providing an intelligent layer to the existing physical systems to make them reliable. In the absence of such fuzzy systems, a little random perturbation in captured human biometrics could disrupt the whole security system, which may even decline the authentication requests of legitimate entities during the protocol execution. In the literature, few fuzzy logic-based biometric authentication schemes have been presented; however, they lack significant security features including perfect forward secrecy (PFS), untraceability, and resistance to known attacks. This article, therefore, proposes a novel two-factor biometric authentication protocol enabling efficient and secure combination of physically unclonable functions, a physical object analogous to human fingerprint, with user biometrics by employing fuzzy extractor-based procedures in the loop. This combination enables the participants in the protocol to achieve PFS. The security of the proposed scheme is tested using the well-known real-or-random model. The performance analysis signifies the fact that the proposed scheme not only offers PFS, untraceability, and anonymity to the participants, but is also resilient to known attacks using light-weight symmetric operations, which makes it an imperative advancement in the category of intelligent and reliable security solutions. [ABSTRACT FROM AUTHOR]
Copyright of IEEE Transactions on Reliability is the property of IEEE and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Complementary Index
الوصف
تدمد:00189529
DOI:10.1109/TR.2020.3021794