Volume- 10
Issue- 4
Year- 2022
DOI: 10.55524/ijircst.2022.10.4.25 |
DOI URL: https://doi.org/10.55524/ijircst.2022.10.4.25
Crossref
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Alkubra Nusaiba Hassan , Dr. R. P. Singh
The biometric traits of any human being such as fingerprint, tongue prints, face recognition, Retina Scan, Iris recognition, etc. are unique and cannot be replicated or fabricated using modern technologically advanced processes. These unique traits are used to identify individuals for grating access to sensitive data over the cloud. In this paper, we propose a biometric authentication system based on Iris recognition to allow user identity-based data to be pushed onto the cloud for global access if the user Iris image is authenticated with the database. The real-time Iris scanner captures the Iris image and the same is imported to the MATLAB workspace for feature extraction and matching. Upon successful matching, the data is transmitted to the ThingSpeak Internet of Things (IoT) analytics platform. The IoT framework is a massive network of physical devices sharing data according to set protocols. Most IOT-enabled devices lack security protocols. Thus, biometric authentication in general and iris recognition in particular finds a perfect fit for securing data over an IoT framework.
[1] Zongqiang Zhang; Feng Xia; Mingchu Li; Jianhua Ma , “An improved iris localization for authentic system,” IEEE International conferences on internet of things, and cyber, physical and social computing,2011
[2] Yosra Ben Said, “Collaborative security for the internet of things,” Economics and Finance, Institut des Telecommunications,2013
[3] Jasvir Singh Kalsi; Sarabjeet Kaur; Bhawneet Kaur, “Efficient biometric iris recognition using gamma correction & histogram thresholding – A review,” International journal of advance electrical and electronics engineering (IJAEEE), Volume-4, Issue-3, 2015
[4] M. Shamim Hossain; Ghulam Mohammad; SK MD Mizanur Rahman; Wadood Abdul; AbdulHameed Alelaiwi; Atif Alamri, “ Toward end to end biometrics based security for IOT infrastructure," IEEE wireless communication, October, 2016
[5] Ramdan Gad; Ahmed A. Abd El-Latif; Sherif Elseuoofi; Hany M Ibrahim; Mahmoud Elmezain; Wael Said. “IOT security based on iris verification using multi-algorithm feature level fusion scheme,” IEEE, 2019
[6] Jaspreet Kaur; Shivali Puri; Varinderjit kaur, “Iris recognition using Hough’s transform gamma correction and histogram thresholding method,” International journal of engineering sciences and research technology, October, 2016
[7] Annies Joshy; Jalaja M. J, “Design and implementation of an IOT based secure biometric authentic system," IEEE, 2017
[8] WenchengYang; Michael N. Johnstone; Leslie F. Sikos; Song Wang, “Security and forensics in the internet of things: research advances and challenges,” IEEE Workshop on emerging technologies for security in IoT, 2020
[9] Reza M. Pairizi; Ali Dehghantanha; Kim Kwang Raymond Choo, “Towards better ocular recognition for secure real world applications,” IEEE, 2018
[10] Hasamuddin Mohammed; Mohammad Qayyum, “Internet of things: A study on security and privacy threats,” IEEE, 2017
[11] R.Subha, “Biometrics in internet of things (IOT) security,” International Journal of Engineering Research and General Science, Volume 5, Issue 5, September –October, 2017
[12] Ramadan Gad; Mahmoud Elmezain; AhmedAbd El- Latif, “IOT security based on iris verification using multi-algorithm feature level fusion scheme,” IEEE, 2019
[13] J.Thirumalai; Gokul. R; Ganasekaran. P; Manellore Murali. M; Jackson Jublience Joseph. L, “An IOT based bank locker security system,” International journal of engineering research and technology (IJERT), Volume 8, Issue 7, 2020
[14] Ramadan Gad; Ahmed Abd El-Latif; Mohammed Talha; M. Zorkany, “Iris recognition using multi-algorithmic approaches for cognitive internet of things (CIoT),” Future generation computer systems, December, 2018
[15] Ramadan Gad; Ahmed A. Abd El-Latif; Sherif Elseuofi; Hany M Ibrahim; Mahmoud Elmezain; Wael Said, “IoT security based on iris verification using multi-algorithm feature level fusion scheme,” IEEE, 2019
[16] Belal M. Alsellami; Prapti D. Deshmukh, “The recent trends in biometrics traits authentication based on internet of things,” IEEE, 2021
[17] M. Shamim Hossain; Ghulam Mohammad; SK MD Mizanur Rahman; Wadood Abdul; AbdulHameed Alelaiwi; Atif Alamri, “ Toward end to end biometrics based security for IOT infrastructure," IEEE wireless communication, October 2016
M.Tech Scholar, Electronics and Communication Engineering, RIMT University, Punjab, India
No. of Downloads: 23 | No. of Views: 292
Reshma S, Guganesh R, Harinee V, Senthil Rajan S.
May 2023 - Vol 11, Issue 3
Er. Eyenan Showkat, Dr. Gurinder Kaur Sodhi.
January 2023 - Vol 11, Issue 1
Safura Hameed Bhat, Ravinder Pal Singh, Monika Mehra.
January 2023 - Vol 11, Issue 1