Challenges and Opportunities of Biometric User Authentication in the Age of IoT: A Survey

Author:

Lien Chi-Wei1ORCID,Vhaduri Sudip1ORCID

Affiliation:

1. Purdue University, United States

Abstract

While the Internet of Things (IoT) devices, such as smartwatches, provide a range of services from managing financial transactions to monitoring smart homes, these devices often lead to gateways for malicious access to a user’s cyber-physical space. Biometric-based authentications are becoming popular to secure IoT devices and provide other services. However, when to use what type of biometrics remains challenging due to various factors, including sensing and computing requirements, user interaction requirements, stability over time, and application scenarios, among others. Unlike soft biometrics, e.g., gait, traditional biometrics, e.g., iris, are more stable over time but require active user input and robust sensing and computing, which limits their continuous adaptability to secure a user’s cyber-physical space. Additionally, the integration of new sensors to IoT devices brings opportunistic data types that can individually or in combination with other common biometrics to identify a user. There is a dearth of knowledge about the limitations and applications of new opportunistic biometrics and their combinations with existing biometrics obtained from single or multiple IoT-connected devices. Therefore, this article thoroughly discusses different biometrics that can be implemented on IoT devices to understand the potential of biometric authentications better.

Publisher

Association for Computing Machinery (ACM)

Subject

General Computer Science,Theoretical Computer Science

Reference196 articles.

1. Md Tanvir Al Amin, Sukarna Barua, Sudip Vhaduri, and Ashikur Rahman. 2009. Load aware broadcast in mobile ad hoc networks. In Proceedings of the IEEE International Conference on Communications (ICC’09).

2. Sudip Vhaduri, Sayanton V. Dibbo, and Chih-You Chen. 2022. Predicting a user’s demographic identity from leaked samples of health-tracking wearables and understanding associated risks. In Proceedings of the IEEE 10th International Conference on Healthcare Informatics (ICHI’22). IEEE.

3. Multi-modal biometric-based implicit authentication of wearable device users;Vhaduri Sudip;IEEE Trans. Inf. Forens. Secur.,2019

4. Alexa Muratyan, William Cheung, Sayanton V. Dibbo, and Sudip Vhaduri. 2023. Opportunistic multi-modal user authentication for health-tracking IoT wearables. In Proceedings of the 5th International Conference on Safety and Security with IoT. Springer, 1–18.

5. Sudip Vhaduri and Christian Poellabauer. 2016. Design and implementation of a remotely configurable and manageable well-being study. In Smart City 360ˆ: First EAI International Summit, Smart City 360ˆ, Bratislava, Slovakia and Toronto, Canada, October 13-16, 2015. Revised Selected Papers 1. Springer, 2016, pp. 1.

Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3