Affiliation:
1. Faculty of Automation, Computer Sciences, Electronics and Electrical Engineering, “Dunărea de Jos” University, Științei Street No. 2, 800210 Galați, Romania
Abstract
In the current context in which user authentication is the first line of defense against emerging attacks and can be considered a defining element of any security infrastructure, the need to adopt alternative, non-invasive, contactless, and scalable authentication mechanisms is mandatory. This paper presents initial research on the design, implementation, and evaluation of a multi-factor authentication mechanism that combines facial recognition with a fully homomorphic encryption algorithm. The goal is to minimize the risk of unauthorized access and uphold user confidentiality and integrity. The proposed device is implemented on the latest version of the Raspberry Pi and Arduino ESP 32 modules, which are wirelessly connected to the computer system. Additionally, a comprehensive evaluation, utilizing various statistical parameters, demonstrates the performance, the limitations of the encryption algorithms proposed to secure the biometric database, and also the security implications over the system resources. The research results illustrate that the Brakerski–Gentry–Vaikuntanathan algorithm can achieve higher performance and efficiency when compared to the Brakerski–Fan–Vercauteren algorithm, and proved to be the best alternative for the designed mechanism because it effectively enhances the level of security in computer systems, showing promise for deployment and seamless integration into real-world scenarios of network architectures.
Reference63 articles.
1. Chang, C.C. (2019). Privacy-Preserving Information Hiding and Its Applications. [Ph.D. Thesis, University of Warwick].
2. Department of Homeland Security (2023, September 03). Review of CBP’s Major Cybersecurity Incident during a 2019 Biometric Pilot, Available online: https://www.oig.dhs.gov/reports/2020/review-cbps-major-cybersecurity-incident-during-2019-biometric-pilot/oig-20-71-sep20.
3. Boonkrong, S. (2021). Authentication and Access Control: Practical Cryptography Methods and Tools, Apress.
4. Temoshok, D. (2022). Digital Identity Guidelines Online, National Institute of Standards and Technology.
5. Quality measures in biometric systems;Fierrez;IEEE Secur. Priv.,2022
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Ensuring Security in Smart Cities through the voice recognition system: A state of the art;Proceedings of the 7th International Conference on Networking, Intelligent Systems and Security;2024-04-18