C. Vorakulpipat, Takeshi Takahashi, Ekkachan Rattanalerdnusorn, Phithak Thaenkaew, D. Inoue
{"title":"可用和安全的基于云的物联网设备生物识别认证解决方案","authors":"C. Vorakulpipat, Takeshi Takahashi, Ekkachan Rattanalerdnusorn, Phithak Thaenkaew, D. Inoue","doi":"10.1109/ISCC.2018.8538712","DOIUrl":null,"url":null,"abstract":"Biometric authentication is increasingly recognized as an effective technique for secure authentication, but using such authentication with Internet of Things (IoT) devices is difficult. In the present paper, we propose an IoT biometric authentication solution that adopts a cloud-based IoT service platform. We present the proposed system architecture, which uses an IoT service platform and security alerting mechanisms to deal with physical and administrative constraints, including a limited Internet connection, a limited budget, a need for easy development, and a required high level of security. We also demonstrate the feasibility of the proposed solution.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Usable and Secure Cloud-based Biometric Authentication Solution for IoT Devices\",\"authors\":\"C. Vorakulpipat, Takeshi Takahashi, Ekkachan Rattanalerdnusorn, Phithak Thaenkaew, D. Inoue\",\"doi\":\"10.1109/ISCC.2018.8538712\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Biometric authentication is increasingly recognized as an effective technique for secure authentication, but using such authentication with Internet of Things (IoT) devices is difficult. In the present paper, we propose an IoT biometric authentication solution that adopts a cloud-based IoT service platform. We present the proposed system architecture, which uses an IoT service platform and security alerting mechanisms to deal with physical and administrative constraints, including a limited Internet connection, a limited budget, a need for easy development, and a required high level of security. We also demonstrate the feasibility of the proposed solution.\",\"PeriodicalId\":233592,\"journal\":{\"name\":\"2018 IEEE Symposium on Computers and Communications (ISCC)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE Symposium on Computers and Communications (ISCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCC.2018.8538712\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE Symposium on Computers and Communications (ISCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCC.2018.8538712","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Usable and Secure Cloud-based Biometric Authentication Solution for IoT Devices
Biometric authentication is increasingly recognized as an effective technique for secure authentication, but using such authentication with Internet of Things (IoT) devices is difficult. In the present paper, we propose an IoT biometric authentication solution that adopts a cloud-based IoT service platform. We present the proposed system architecture, which uses an IoT service platform and security alerting mechanisms to deal with physical and administrative constraints, including a limited Internet connection, a limited budget, a need for easy development, and a required high level of security. We also demonstrate the feasibility of the proposed solution.