Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server
dc.authorid | Bashir, Ali Kashif/0000-0003-2601-9327 | |
dc.authorid | Chaudhry, Shehzad/0000-0002-9321-6956 | |
dc.authorid | Irshad, Azeem/0000-0002-1366-2834 | |
dc.authorid | Srivastava, Gautam/0000-0001-9851-4103 | |
dc.authorid | Usman, Muhammad/0000-0002-9828-0738 | |
dc.authorid | Jolfaei, Alireza/0000-0001-7818-459X | |
dc.contributor.author | Irshad, Azeem | |
dc.contributor.author | Usman, Muhammad | |
dc.contributor.author | Chaudhry, Shehzad Ashraf | |
dc.contributor.author | Bashir, Ali Kashif | |
dc.contributor.author | Jolfaei, Alireza | |
dc.contributor.author | Srivastava, Gautam | |
dc.date.accessioned | 2024-09-11T19:51:58Z | |
dc.date.available | 2024-09-11T19:51:58Z | |
dc.date.issued | 2021 | |
dc.department | İstanbul Gelişim Üniversitesi | en_US |
dc.description.abstract | Fuzzy systems can aid in diminishing uncertainty and noise from biometric security applications by providing an intelligent layer to the existing physical systems to make them reliable. In the absence of such fuzzy systems, a little random perturbation in captured human biometrics could disrupt the whole security system, which may even decline the authentication requests of legitimate entities during the protocol execution. In the literature, few fuzzy logic-based biometric authentication schemes have been presented; however, they lack significant security features including perfect forward secrecy (PFS), untraceability, and resistance to known attacks. This article, therefore, proposes a novel two-factor biometric authentication protocol enabling efficient and secure combination of physically unclonable functions, a physical object analogous to human fingerprint, with user biometrics by employing fuzzy extractor-based procedures in the loop. This combination enables the participants in the protocol to achieve PFS. The security of the proposed scheme is tested using the well-known real-or-random model. The performance analysis signifies the fact that the proposed scheme not only offers PFS, untraceability, and anonymity to the participants, but is also resilient to known attacks using light-weight symmetric operations, which makes it an imperative advancement in the category of intelligent and reliable security solutions. | en_US |
dc.identifier.doi | 10.1109/TR.2020.3021794 | |
dc.identifier.endpage | 1025 | en_US |
dc.identifier.issn | 0018-9529 | |
dc.identifier.issn | 1558-1721 | |
dc.identifier.issue | 3 | en_US |
dc.identifier.scopus | 2-s2.0-85114319201 | en_US |
dc.identifier.startpage | 1014 | en_US |
dc.identifier.uri | https://doi.org/10.1109/TR.2020.3021794 | |
dc.identifier.uri | https://hdl.handle.net/11363/7878 | |
dc.identifier.volume | 70 | en_US |
dc.identifier.wos | WOS:000692208600016 | en_US |
dc.identifier.wosquality | Q1 | en_US |
dc.indekslendigikaynak | Web of Science | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE-Inst Electrical Electronics Engineers Inc | en_US |
dc.relation.ispartof | Ieee Transactions on Reliability | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.snmz | 20240903_G | en_US |
dc.subject | Authentication | en_US |
dc.subject | Protocols | en_US |
dc.subject | Servers | en_US |
dc.subject | Password | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Iron | en_US |
dc.subject | Biometric fuzzy extractor (FE) | en_US |
dc.subject | fuzzy systems | en_US |
dc.subject | mutual authentication | en_US |
dc.subject | physical unclonable function (PUF) | en_US |
dc.subject | user access | en_US |
dc.title | Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server | en_US |
dc.type | Article | en_US |