A Hybrid AES with a Chaotic Map-Based Biometric Authentication Framework for IoT and Industry 4.0

نویسندگان

چکیده

The Internet of Things (IoT) is being applied in multiple domains, including smart homes and energy management. This work aims to tighten security IoTs using fingerprint authentications avoid unauthorized access systems for safeguarding user privacy. Captured fingerprints can jeopardize the privacy personal information. To solve privacy- security-related problems IoT-based environments, Biometric Authentication Frameworks (BAFs) are proposed enable coupled with on edge consumer devices ensure biometric transmissions databases. Honeywell Advanced Encryption Security-Cryptography Measure (HAES-CM) scheme combined Hybrid Standards Chaotic Map Encryptions proposed. BAFs private secure communications between Industry 4.0’s IoT. work’s suggested scheme’s evaluations other encryption methods reveal that HAES-CM strategy outperforms others terms processing speeds.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Authentication Framework Based on Biometric and Radio Fingerprinting for the IoT in eHealth

Patient monitoring outside the hospital environment is one case for Internet of Things (IoT) in healthcare. While remote patient monitoring may improve healthcare, patient authentication is a challenge in this scenario. Authentication mechanisms that require the user to present credentials only initially do not verify the claimed identity of the patient after the initial authentication. We prop...

متن کامل

a framework for identifying and prioritizing factors affecting customers’ online shopping behavior in iran

the purpose of this study is identifying effective factors which make customers shop online in iran and investigating the importance of discovered factors in online customers’ decision. in the identifying phase, to discover the factors affecting online shopping behavior of customers in iran, the derived reference model summarizing antecedents of online shopping proposed by change et al. was us...

15 صفحه اول

A new hybrid fuzzy biometric-based image authentication model

Watermarking is one of the most known techniques for authentication, tampering detection, privacy control, etc. Concerning privacy protection of patients’ medical records, efforts have been devoted to guarantee the confidentiality of data and medical images during storage and transmission via an untrustworthy channel. Our developed watermarking system, aims at fulfilling such demands through th...

متن کامل

a new type-ii fuzzy logic based controller for non-linear dynamical systems with application to 3-psp parallel robot

abstract type-ii fuzzy logic has shown its superiority over traditional fuzzy logic when dealing with uncertainty. type-ii fuzzy logic controllers are however newer and more promising approaches that have been recently applied to various fields due to their significant contribution especially when the noise (as an important instance of uncertainty) emerges. during the design of type- i fuz...

15 صفحه اول

designing and validating a textbook evaluation questionnaire for reading comprehension ii and exploring its relationship with achievement

در هر برنامه آموزشی، مهم ترین فاکتور موثر بر موفقیت دانش آموزان کتاب درسی است (مک دونو و شاو 2003). در حقیقت ، کتاب قلب آموزش زبان انگلیسی است( شلدن 1988). به دلیل اهمیت والای کتاب به عنوان عنصر ضروری کلاس های آموزش زبان ، کتب باید به دقت ارزیابی و انتخاب شده تا از هرگونه تاثیر منفی بر دانش آموزان جلوگیری شود( لیتز). این تحقیق با طراحی پرسش نامه ارزیابی کتاب که فرصت ارزیابی معتبر را به اساتید د...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Systems

سال: 2023

ISSN: ['2079-8954']

DOI: https://doi.org/10.3390/systems11010028