Iranian Journal of Information Processing and Management

Iranian Journal of Information Processing and Management

A Method for FIDO Management trough Biometric Technology in IOT

Authors
Abstract
Internet of Things (IOT) is a newly developed concept in the world of technology and communication which provides the ability to transfer technological information to everything, including human, animals, or objects, through communication networks such as internet or intranet. Biometric technology offers various applications. The main objective is to provide an appropriate alternative for control systems with traditional access. It is also utilized for personal protection or corporate finance. Simultaneous application of Biometric technology and Fast Identity Online (FIDO) may advance interaction with objects and authentication of those who want to access crucial information. Furthermore, the authentication of individuals is a more accurate and faster process. Whereas in the traditional techniques, this process is much more costly and time-consuming. This article presents a new approach for utilizing biometric technology in IOT, in order to manage biometric in IOT. The results demonstrate fingerprint biometry obtains the highest priority as compared to other biometric techniques used in IOT, while it imposes the lowest implementation costs. Moreover, it provides a high level of security for the system management.
Keywords

Aggarwal, C. C., & Wang, H. 2011. Text mining in social networks. In Social network data analytics (pp. 353-378). Springer, Boston, MA. Alur, R., E. Berger, A. W. Drobnis, L. Fix, K. Fu, G. D. Hager, D. Lopresti, K. Nahrstedt, E. Mynatt, S. Patel, J. Rexford, J. A. Stankovic, and B. Zorn. 2016. Systems Computing Challenges in the Internet of Things. https://arxiv.org/abs/1604.02980 (accessed Sep. 22, 2017). Daqiang, Z., G. Minyi, Z. Jingyu, K. Dazhou and C. Jiannong. 2010. Context reasoning using extended evidence theory in pervasive computing environments, Future Generation Computer Systems 26 (2): 207-216. Dijkman, R. M., B. Sprenkels, T. Peeters, and A. Janssen. 2015. Business models for the Internet of Things. International Journal of Information Management 35 (6): 672-678. Di Nardo, J. V. 2008. Biometric Technologies: Functionality, Emerging Trends, and Vulnerabilities. Journal of Applied Security Research 4 (1-2): 194-216. Eleonora, E. 2014. The Internet of Things vision: Key features, applications and open issues. Computer Communications 54: 1-31. Eunhwa, J., and K. Hong. 2015. Biometric verification based on facial profile images for mobile security. Journal of Systems and Information Technology 17 (1): 91-100. Farooq, M. U., M. Waseem, A. Khairi, and S. Mazhar. 2015. A Critical Analysis on the Security, Concerns of Internet of Things (IoT). International Journal of Computer Applications 111 (7): 1-6. Giroux, S., and H. Pigot. 2005. From smart homes to smart care: ICOST 2005. Washington: IOS Press. Han, S. S. 2005. Global city making in Singapore: a real estate perspective. Progress in Planning, 64 (2), 69-175. In, L., and L. Kyoochun. 2015. The Internet of things: Applications, investments, and challenges for enterprises. Business Horizons 58 (4): 431-440. Jain, A., K. Nandakumar, and A. Ross. 2005. Score normalization in multimodal biometric systems. Pattern Recognition 38 (12): 2270-2285. Nataliia, L., & Elena, F. (2015). Internet of things as a symbolic resource of power. Procedia-Social and Behavioral Sciences, 166, 521-525. O’droma, M., and I. Ganchev. 2010. The creation of a ubiquitous consumer wireless world through strategic ITU-T standardization, IEEE Communications Magazine 48 (10): 158–165. Srivastava, L. 2004. Japan’s ubiquitous mobile information society. Info 6 (4): 234–251. Ulrich, G., G. Peter, J. Benjamin, and L. Dennis. 2012. Multimedia content identification through smart meter power usage profiles. Proceedings of the International Conference on Information and Knowledge Engineering (IKE). Athens: 1-8. Venier, S. 2009. Ethical aspects of biometric identification technologies in a multicultural society. AECME annual meeting. Venice, 10–11 September. Verma, I., & Jain, S. K. (2015, March). Biometrics security system: A review of multimodal biometrics based techniques for generating crypto-key. In Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on (pp. 1189-1192). IEEE Villalbaa, A., J. L. Pe´reza, D. Carreraa, C. Pedrinacib, and L. Panzierab. 2015. servIoTicy and iServe: A Scalable Platform for Mining the IoT, Procedia Computer Science 52: 1022-1027. Xia, F., L. T. Yang, L. Wang, and A. Vinel. 2012. Internet of things. International Journal of Communication Systems 25 (9): 1101–1102. Zeng, D., S. Guo, and Z. Cheng. 2011. The web of things: a survey, Journal of Communications 6 (6): 424–438. Zhang, D., Zhang, D., Xiong, H., Hsu, C. H., & Vasilakos, A. V. (2014). BASA: building mobile Ad-Hoc social networks on top of android. IEEE Network, 28 (1), 4-9. Zhang, D., J. Zhou, M. Guo, J. Cao, and T. Li. 2011. tag-free activity sensing using RFID tag arrays. IEEE Transactions on Parallel and Distributed Systems 22 (4): 558–570.

  • Receive Date 10 December 2022
  • Revise Date 14 February 2023