Biometrics for Internet-of-Things Security: A Review
The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securin...
Saved in:
Published in | Sensors (Basel, Switzerland) Vol. 21; no. 18; p. 6163 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
Switzerland
MDPI AG
14.09.2021
MDPI |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions. |
---|---|
AbstractList | The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions. The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions.The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions. |
Author | Sahri, Nor Masri Wang, Song Valli, Craig Ahmed, Mohiuddin Yang, Wencheng Karie, Nickson M. |
AuthorAffiliation | 1 Security Research Institute, School of Science, Edith Cowan University, Cyber Security Cooperative Research Centre, Joondalup, WA 6027, Australia; masri.sahri@gmail.com (N.M.S.); n.karie@ecu.edu.au (N.M.K.); mohiuddin.ahmed@ecu.edu.au (M.A.); c.valli@ecu.edu.au (C.V.) 2 School of Engineering and Mathematical Sciences, La Trobe University, Melbourne, VIC 3086, Australia; song.wang@latrobe.edu.au |
AuthorAffiliation_xml | – name: 2 School of Engineering and Mathematical Sciences, La Trobe University, Melbourne, VIC 3086, Australia; song.wang@latrobe.edu.au – name: 1 Security Research Institute, School of Science, Edith Cowan University, Cyber Security Cooperative Research Centre, Joondalup, WA 6027, Australia; masri.sahri@gmail.com (N.M.S.); n.karie@ecu.edu.au (N.M.K.); mohiuddin.ahmed@ecu.edu.au (M.A.); c.valli@ecu.edu.au (C.V.) |
Author_xml | – sequence: 1 givenname: Wencheng orcidid: 0000-0001-7800-2215 surname: Yang fullname: Yang, Wencheng – sequence: 2 givenname: Song surname: Wang fullname: Wang, Song – sequence: 3 givenname: Nor Masri orcidid: 0000-0003-2030-8881 surname: Sahri fullname: Sahri, Nor Masri – sequence: 4 givenname: Nickson M. surname: Karie fullname: Karie, Nickson M. – sequence: 5 givenname: Mohiuddin orcidid: 0000-0002-4559-4768 surname: Ahmed fullname: Ahmed, Mohiuddin – sequence: 6 givenname: Craig surname: Valli fullname: Valli, Craig |
BackLink | https://www.ncbi.nlm.nih.gov/pubmed/34577370$$D View this record in MEDLINE/PubMed |
BookMark | eNplkU1v1DAQhi1URD_gwB9AkbjQQ6g9nsQOh0qlKrBSJSQoZ8t1JluvsnaxnaL-e7JsW7XlZMt-5pnRvPtsJ8RAjL0V_KOUHT_KIIRuRStfsD2BgLUG4DuP7rtsP-cV5yCl1K_YrsRGKan4HsPPPq6pJO9yNcRULUKhFKjUcagvrnxY5uonuSn5cvupOql-0I2nP6_Zy8GOmd7cnQfs15ezi9Nv9fn3r4vTk_PaNbIpNfSqb50YJFGHFggsuK6XQlnuEK11QFZhSwBC885xbFvZtwCgQDbaDfKALbbePtqVuU5-bdOtidabfw8xLY1NxbuRjAIuuwFh7qgRVa8Jle4uB-ygF87B7Dreuq6nyzX1jkJJdnwiffoT_JVZxhujUYFWOAs-3AlS_D1RLmbts6NxtIHilA3MK0XULcoZff8MXcUphXlVG6ptuEDcCN89nuhhlPtwZuBoC7gUc040GOeLLT5uBvSjEdxs4jcP8c8Vh88q7qX_s38BZnOr9w |
CitedBy_id | crossref_primary_10_3390_app122111182 crossref_primary_10_1007_s12652_024_04872_1 crossref_primary_10_1109_OJCS_2022_3183003 crossref_primary_10_3390_s25061649 crossref_primary_10_1145_3632624 crossref_primary_10_1109_ACCESS_2023_3239387 crossref_primary_10_1063_5_0080942 crossref_primary_10_3390_s24144621 crossref_primary_10_3390_s25020455 crossref_primary_10_1177_17543371241229521 crossref_primary_10_1021_acsaelm_4c01868 crossref_primary_10_1088_2040_8986_ad6e9b crossref_primary_10_1109_ACCESS_2022_3143210 crossref_primary_10_3390_s23073566 crossref_primary_10_1109_TIM_2024_3457967 crossref_primary_10_32604_cmc_2024_047870 crossref_primary_10_1109_JIOT_2022_3190020 crossref_primary_10_1109_LED_2022_3208560 crossref_primary_10_1016_j_jisa_2022_103317 crossref_primary_10_3390_app14020534 crossref_primary_10_3390_electronics13142849 crossref_primary_10_3390_electronics11040513 crossref_primary_10_1049_cit2_12283 crossref_primary_10_32604_cmc_2024_047625 crossref_primary_10_1155_2022_4336822 crossref_primary_10_3390_s22010066 crossref_primary_10_4018_IJISP_322102 crossref_primary_10_1016_j_mtadv_2023_100426 crossref_primary_10_1039_D1CC06384G crossref_primary_10_1016_j_jisa_2024_103748 crossref_primary_10_1088_1402_4896_ad3b3d crossref_primary_10_1038_s41598_025_86603_w crossref_primary_10_1109_JIOT_2023_3285796 crossref_primary_10_4236_jis_2024_152006 crossref_primary_10_3390_computers11030047 crossref_primary_10_1002_eahr_500130 crossref_primary_10_3390_jmmp8060274 crossref_primary_10_1002_wwp2_12151 crossref_primary_10_1016_j_jisa_2024_103852 crossref_primary_10_48084_etasr_6400 crossref_primary_10_1109_JIOT_2024_3408031 crossref_primary_10_2139_ssrn_4706726 crossref_primary_10_3390_s22020591 crossref_primary_10_3390_bios11100398 crossref_primary_10_1016_j_iot_2024_101178 crossref_primary_10_3390_s22197609 crossref_primary_10_3390_electronics11030383 crossref_primary_10_3390_electronics12010220 crossref_primary_10_3390_s22186963 |
Cites_doi | 10.1109/ACCESS.2019.2946400 10.1016/j.ins.2021.01.001 10.1109/ICSSA.2015.016 10.1109/ACCESS.2019.2924045 10.1007/11527923_32 10.1145/3211933.3211945 10.1109/JSEN.2018.2879929 10.1145/2968215 10.1109/ACCESS.2020.2989456 10.1007/978-3-642-38631-2_71 10.5121/ijsptm.2020.9201 10.1201/9781003339373-8 10.1002/dac.2858 10.1186/1687-417X-2011-3 10.1016/j.istr.2012.02.001 10.1016/j.jisa.2020.102704 10.1016/j.icte.2018.03.001 10.1109/ICACT.2015.7224867 10.1007/s11042-019-7617-1 10.1109/JIOT.2018.2837751 10.1109/ACCESS.2020.3021983 10.1109/ACCESS.2018.2886573 10.1109/JBHI.2018.2864796 10.1007/s11227-018-2266-0 10.1109/JPROC.2003.819611 10.1155/2017/9324035 10.1109/MCOM.2019.1800378 10.1109/UEMCON.2018.8796676 10.2991/978-94-6239-148-2_62 10.1109/CAIS.2019.8769483 10.1007/978-3-642-27552-4_123 10.1007/978-0-387-73003-5 10.1002/sec.1591 10.1016/j.ins.2012.04.009 10.1109/JIOT.2021.3050555 10.1145/2968456.2973748 10.1007/s11227-010-0512-1 10.3390/sym11020141 10.1016/j.future.2017.07.013 10.1109/ACCESS.2017.2676119 10.1016/j.patcog.2019.107054 10.1109/IWCMC.2019.8766495 10.1007/978-3-319-72359-4_55 10.1109/I-SMAC.2017.8058363 10.1007/978-3-319-28658-7_14 10.1109/ACCESS.2019.2910753 10.1109/TSE.2005.97 10.1002/sec.1419 10.1109/ICICT.2017.8320166 10.1109/ICITST.2015.7412116 10.1109/CloudNet.2015.7335286 10.1007/s11042-019-08446-8 10.3390/s21020552 10.1109/CCWC.2019.8666599 10.1109/TCSVT.2003.818349 10.1007/s11042-021-10524-9 10.1109/ICCISci.2019.8716401 10.21817/indjcse/2020/v11i5/201105213 10.13052/jcsm2245-1439.7110 10.1007/978-3-319-48947-6_6 10.1007/978-3-030-72660-7_52 10.1016/j.patcog.2018.01.026 10.1016/j.ins.2019.01.073 10.1016/j.jnca.2019.102496 10.1016/j.patcog.2021.108074 10.1109/PST.2016.7907000 10.1016/j.procs.2016.03.043 10.3390/s19132985 10.1016/j.infsof.2015.03.007 10.1016/j.patcog.2020.107735 10.3390/sym12101699 10.1109/WiSPNET48689.2020.9198342 10.5923/j.computer.20120203.06 10.1109/TIFS.2012.2215326 10.1109/DICTA51227.2020.9363426 10.1016/j.comnet.2018.11.025 10.1109/CISP.2013.6743946 10.1016/j.eswa.2013.08.040 10.1007/978-3-319-29883-2_12 10.1109/ACCESS.2016.2535120 10.1109/ETSecIoT50046.2020.00009 10.3390/s19051141 10.1109/MNET.2019.1800240 10.1109/TIFS.2015.2505630 10.1109/TIFS.2012.2215324 10.1109/JIOT.2019.2935189 10.1109/MWC.2016.7721741 10.1109/TCSVT.2003.818350 10.24200/sci.2021.54832.3936 10.1002/dac.4660 10.1109/TIE.2017.2739683 10.1109/ACCESS.2018.2844182 10.1016/j.eswa.2014.07.004 10.1007/978-981-10-8681-6_54 10.1109/TII.2019.2900665 10.1007/978-3-319-98734-7_19 10.3390/electronics7020026 |
ContentType | Journal Article |
Copyright | 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. 2021 by the authors. 2021 |
Copyright_xml | – notice: 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: 2021 by the authors. 2021 |
DBID | AAYXX CITATION CGR CUY CVF ECM EIF NPM 3V. 7X7 7XB 88E 8FI 8FJ 8FK ABUWG AFKRA AZQEC BENPR CCPQU COVID DWQXO FYUFA GHDGH K9. M0S M1P PHGZM PHGZT PIMPY PJZUB PKEHL PPXIY PQEST PQQKQ PQUKI PRINS 7X8 5PM DOA |
DOI | 10.3390/s21186163 |
DatabaseName | CrossRef Medline MEDLINE MEDLINE (Ovid) MEDLINE MEDLINE PubMed ProQuest Central (Corporate) Health & Medical Collection ProQuest Central (purchase pre-March 2016) Medical Database (Alumni Edition) Hospital Premium Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials Proquest Central ProQuest One Coronavirus Research Database ProQuest Central Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Health & Medical Complete (Alumni) ProQuest Health & Medical Collection Medical Database ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef MEDLINE Medline Complete MEDLINE with Full Text PubMed MEDLINE (Ovid) Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Central China ProQuest Central ProQuest Health & Medical Research Collection Health Research Premium Collection Health and Medicine Complete (Alumni Edition) ProQuest Central Korea Health & Medical Research Collection ProQuest Central (New) ProQuest Medical Library (Alumni) ProQuest One Academic Eastern Edition Coronavirus Research Database ProQuest Hospital Collection Health Research Premium Collection (Alumni) ProQuest Hospital Collection (Alumni) ProQuest Health & Medical Complete ProQuest Medical Library ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) MEDLINE - Academic |
DatabaseTitleList | MEDLINE MEDLINE - Academic CrossRef Publicly Available Content Database |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: EIF name: MEDLINE url: https://proxy.k.utb.cz/login?url=https://www.webofscience.com/wos/medline/basic-search sourceTypes: Index Database – sequence: 4 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1424-8220 |
ExternalDocumentID | oai_doaj_org_article_72039f427d68447d8e4789bf492d1cc2 PMC8472874 34577370 10_3390_s21186163 |
Genre | Journal Article Review |
GrantInformation_xml | – fundername: Cyber Security Research Centre Limited grantid: None |
GroupedDBID | --- 123 2WC 53G 5VS 7X7 88E 8FE 8FG 8FI 8FJ AADQD AAHBH AAYXX ABDBF ABUWG ACUHS ADBBV ADMLS AENEX AFKRA AFZYC ALIPV ALMA_UNASSIGNED_HOLDINGS BENPR BPHCQ BVXVI CCPQU CITATION CS3 D1I DU5 E3Z EBD ESX F5P FYUFA GROUPED_DOAJ GX1 HH5 HMCUK HYE IAO ITC KQ8 L6V M1P M48 MODMG M~E OK1 OVT P2P P62 PHGZM PHGZT PIMPY PQQKQ PROAC PSQYO RNS RPM TUS UKHRP XSB ~8M 3V. ABJCF ARAPS CGR CUY CVF ECM EIF HCIFZ KB. M7S NPM PDBOC 7XB 8FK AZQEC COVID DWQXO K9. PJZUB PKEHL PPXIY PQEST PQUKI PRINS 7X8 5PM PUEGO |
ID | FETCH-LOGICAL-c535t-2d7d6c1f3ee94a2e2a2c9d317a0c44aac2ea746e221809c04663d622272358cf3 |
IEDL.DBID | M48 |
ISSN | 1424-8220 |
IngestDate | Wed Aug 27 00:27:45 EDT 2025 Thu Aug 21 14:07:48 EDT 2025 Fri Jul 11 05:22:35 EDT 2025 Fri Jul 25 20:19:06 EDT 2025 Wed Feb 19 02:09:01 EST 2025 Tue Jul 01 03:56:19 EDT 2025 Thu Apr 24 23:10:25 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 18 |
Keywords | biometrics security access control encryption IoT authentication |
Language | English |
License | https://creativecommons.org/licenses/by/4.0 Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c535t-2d7d6c1f3ee94a2e2a2c9d317a0c44aac2ea746e221809c04663d622272358cf3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 ObjectType-Review-3 content type line 23 |
ORCID | 0000-0001-7800-2215 0000-0003-2030-8881 0000-0002-4559-4768 |
OpenAccessLink | http://journals.scholarsportal.info/openUrl.xqy?doi=10.3390/s21186163 |
PMID | 34577370 |
PQID | 2576501444 |
PQPubID | 2032333 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_72039f427d68447d8e4789bf492d1cc2 pubmedcentral_primary_oai_pubmedcentral_nih_gov_8472874 proquest_miscellaneous_2577448643 proquest_journals_2576501444 pubmed_primary_34577370 crossref_citationtrail_10_3390_s21186163 crossref_primary_10_3390_s21186163 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20210914 |
PublicationDateYYYYMMDD | 2021-09-14 |
PublicationDate_xml | – month: 9 year: 2021 text: 20210914 day: 14 |
PublicationDecade | 2020 |
PublicationPlace | Switzerland |
PublicationPlace_xml | – name: Switzerland – name: Basel |
PublicationTitle | Sensors (Basel, Switzerland) |
PublicationTitleAlternate | Sensors (Basel) |
PublicationYear | 2021 |
Publisher | MDPI AG MDPI |
Publisher_xml | – name: MDPI AG – name: MDPI |
References | ref_94 ref_93 ref_91 Petersen (ref_13) 2015; 64 ref_14 ref_12 ref_98 Gayathri (ref_34) 2020; 10 Li (ref_50) 2020; 79 ref_95 ref_18 ref_17 ref_15 Odinaka (ref_24) 2012; 7 ref_23 ref_22 Subha (ref_10) 2017; 5 ref_29 ref_28 Chuang (ref_80) 2014; 41 Jain (ref_21) 2004; 14 Choi (ref_90) 2018; 6 ref_71 ref_70 Mishra (ref_81) 2014; 41 Ometov (ref_75) 2019; 33 Hassan (ref_16) 2019; 148 Hammad (ref_96) 2018; 7 Yoon (ref_78) 2013; 63 Lu (ref_42) 2017; 77 Ebrahimi (ref_92) 2021; 8 Dhillon (ref_113) 2017; 34 Devikar (ref_25) 2016; 11 Hossain (ref_32) 2016; 23 Yang (ref_20) 2018; 6 ref_88 ref_87 ref_86 Yahuza (ref_118) 2020; 8 ref_85 Taher (ref_114) 2019; 7 ref_84 Prakash (ref_27) 2016; 9 Yang (ref_64) 2018; 78 Yang (ref_74) 2018; 5 Kolhar (ref_35) 2020; 8 Hannay (ref_119) 2005; 31 Xie (ref_76) 2016; 29 Blasco (ref_11) 2016; 49 ref_58 ref_56 Li (ref_99) 2016; 11 ref_54 ref_51 Srivastva (ref_57) 2021; 558 Meneghello (ref_19) 2019; 6 Selvi (ref_97) 2010; 2 Natgunanathan (ref_55) 2016; 4 ref_59 Karimian (ref_39) 2019; 7 Hassija (ref_115) 2019; 7 Thilagavathi (ref_33) 2018; 7 ref_61 ref_60 ref_69 ref_67 ref_66 ref_65 ref_63 Meena (ref_62) 2019; 22 Challa (ref_52) 2017; 5 ref_117 Bours (ref_68) 2012; 17 ref_116 Zheng (ref_110) 2018; 23 ref_36 (ref_72) 2003; 91 ref_111 ref_31 ref_112 Gao (ref_101) 2012; 2 Ferrara (ref_100) 2012; 7 Kakarla (ref_83) 2020; 11 ref_38 ref_37 Yang (ref_73) 2018; 74 ref_104 Zhang (ref_82) 2017; 65 ref_103 ref_106 ref_105 Zheng (ref_89) 2018; 19 ref_107 Punithavathi (ref_108) 2019; 78 ref_109 ref_47 ref_46 ref_45 ref_44 ref_43 ref_41 ref_102 ref_40 ref_1 ref_3 Lu (ref_77) 2016; 9 ref_2 Shad (ref_26) 2016; 79 ref_49 ref_48 ref_9 ref_8 Yang (ref_30) 2019; 57 ref_5 ref_4 ref_7 Wazid (ref_79) 2016; 9 ref_6 Chang (ref_53) 2012; 211 |
References_xml | – volume: 7 start-page: 148950 year: 2019 ident: ref_114 article-title: Low-overhead remote user authentication protocol for IoT based on a fuzzy extractor and feature extraction publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2946400 – volume: 558 start-page: 208 year: 2021 ident: ref_57 article-title: PlexNet: A fast and robust ECG biometric system for human recognition publication-title: Inf. Sci. doi: 10.1016/j.ins.2021.01.001 – ident: ref_70 doi: 10.1109/ICSSA.2015.016 – volume: 7 start-page: 82721 year: 2019 ident: ref_115 article-title: A survey on IoT security: Application areas, security threats, and solution architectures publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2924045 – ident: ref_88 doi: 10.1007/11527923_32 – ident: ref_116 doi: 10.1145/3211933.3211945 – volume: 19 start-page: 1186 year: 2018 ident: ref_89 article-title: A Critical Analysis of ECG-based Key Distribution for Securing Wearable and Implantable Medical Devices publication-title: IEEE Sens. J. doi: 10.1109/JSEN.2018.2879929 – volume: 49 start-page: 1 year: 2016 ident: ref_11 article-title: A survey of wearable biometric recognition systems publication-title: ACM Comput. Surv. (CSUR) doi: 10.1145/2968215 – ident: ref_94 – volume: 22 start-page: 643 year: 2019 ident: ref_62 article-title: Biometric authentication in internet of things: A conceptual view publication-title: J. Stat. Manag. Syst. – volume: 8 start-page: 76541 year: 2020 ident: ref_118 article-title: Systematic review on security and privacy requirements in edge computing: State of the art and future research opportunities publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2989456 – ident: ref_31 – ident: ref_51 doi: 10.1007/978-3-642-38631-2_71 – ident: ref_41 doi: 10.5121/ijsptm.2020.9201 – ident: ref_98 doi: 10.1201/9781003339373-8 – volume: 29 start-page: 478 year: 2016 ident: ref_76 article-title: Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol publication-title: Int. J. Commun. Syst. doi: 10.1002/dac.2858 – volume: 10 start-page: 255 year: 2020 ident: ref_34 article-title: MARK42: The secured personal assistant using biometric traits integrated with green IOT publication-title: J. Green Eng. – ident: ref_93 doi: 10.1186/1687-417X-2011-3 – volume: 17 start-page: 36 year: 2012 ident: ref_68 article-title: Continuous keystroke dynamics: A different perspective towards biometric evaluation publication-title: Inf. Secur. Tech. Rep. doi: 10.1016/j.istr.2012.02.001 – ident: ref_103 doi: 10.1016/j.jisa.2020.102704 – volume: 5 start-page: 37 year: 2018 ident: ref_74 article-title: Impact of feature proportion on matching performance of multi-biometric systems publication-title: ICT Express doi: 10.1016/j.icte.2018.03.001 – ident: ref_40 doi: 10.1109/ICACT.2015.7224867 – volume: 78 start-page: 25487 year: 2019 ident: ref_108 article-title: Partial DCT-based cancelable biometric authentication with security and privacy preservation for IoT applications publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-019-7617-1 – ident: ref_45 – volume: 6 start-page: 335 year: 2018 ident: ref_90 article-title: Two-factor fuzzy commitment for unmanned IoT devices security publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2018.2837751 – volume: 8 start-page: 163608 year: 2020 ident: ref_35 article-title: A three layered decentralized IoT biometric architecture for city lockdown during COVID-19 outbreak publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3021983 – volume: 7 start-page: 26527 year: 2018 ident: ref_96 article-title: Multimodal biometric authentication systems using convolution neural network based on different level fusion of ECG and fingerprint publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2886573 – volume: 23 start-page: 1546 year: 2018 ident: ref_110 article-title: Finger-to-Heart (F2H): Authentication for Wireless Implantable Medical Devices publication-title: IEEE J. Biomed. Health Inform. doi: 10.1109/JBHI.2018.2864796 – volume: 74 start-page: 4893 year: 2018 ident: ref_73 article-title: ECB4CI: An enhanced cancelable biometric system for securing critical infrastructures publication-title: J. Supercomput. doi: 10.1007/s11227-018-2266-0 – ident: ref_3 – volume: 91 start-page: 2021 year: 2003 ident: ref_72 article-title: Comparing passwords, tokens, and biometrics for user authentication publication-title: Proc. IEEE doi: 10.1109/JPROC.2003.819611 – ident: ref_17 doi: 10.1155/2017/9324035 – volume: 57 start-page: 84 year: 2019 ident: ref_30 article-title: A Privacy-Preserving Lightweight Biometric System for Internet-of-Things Security publication-title: IEEE Commun. Mag. doi: 10.1109/MCOM.2019.1800378 – ident: ref_111 doi: 10.1109/UEMCON.2018.8796676 – ident: ref_9 doi: 10.2991/978-94-6239-148-2_62 – ident: ref_43 doi: 10.1109/CAIS.2019.8769483 – ident: ref_67 – ident: ref_63 doi: 10.1007/978-3-642-27552-4_123 – ident: ref_44 – ident: ref_65 doi: 10.1007/978-0-387-73003-5 – volume: 9 start-page: 4103 year: 2016 ident: ref_79 article-title: Provably secure biometric-based user authentication and key agreement scheme in cloud computing publication-title: Secur. Commun. Netw. doi: 10.1002/sec.1591 – volume: 211 start-page: 36 year: 2012 ident: ref_53 article-title: Dynamically generate a long-lived private key based on password keystroke features and neural network publication-title: Inf. Sci. doi: 10.1016/j.ins.2012.04.009 – volume: 8 start-page: 10706 year: 2021 ident: ref_92 article-title: Lightweight Fuzzy Extractor Based on LPN for Device and Biometric Authentication in IoT publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2021.3050555 – ident: ref_6 – ident: ref_36 doi: 10.1145/2968456.2973748 – volume: 63 start-page: 235 year: 2013 ident: ref_78 article-title: Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem publication-title: J. Supercomput. doi: 10.1007/s11227-010-0512-1 – ident: ref_22 doi: 10.3390/sym11020141 – volume: 5 start-page: 37 year: 2017 ident: ref_10 article-title: Biometrics in Internet of Things (IoT) Security publication-title: Int. J. Eng. Res. Gen. Sci. – volume: 77 start-page: 149 year: 2017 ident: ref_42 article-title: Exploring finger vein based personal authentication for secure IoT publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2017.07.013 – volume: 5 start-page: 3028 year: 2017 ident: ref_52 article-title: Secure signature-based authenticated key establishment scheme for future IoT applications publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2676119 – ident: ref_54 doi: 10.1016/j.patcog.2019.107054 – ident: ref_38 doi: 10.1109/IWCMC.2019.8766495 – ident: ref_117 doi: 10.1007/978-3-319-72359-4_55 – ident: ref_2 doi: 10.1109/I-SMAC.2017.8058363 – ident: ref_87 doi: 10.1007/978-3-319-28658-7_14 – volume: 7 start-page: 49135 year: 2019 ident: ref_39 article-title: Unlock your heart: Next generation biometric in resource-constrained healthcare systems and IoT publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2910753 – volume: 31 start-page: 733 year: 2005 ident: ref_119 article-title: A survey of controlled experiments in software engineering publication-title: IEEE Trans. Softw. Eng. doi: 10.1109/TSE.2005.97 – ident: ref_5 – volume: 9 start-page: 1331 year: 2016 ident: ref_77 article-title: Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment publication-title: Secur. Commun. Netw. doi: 10.1002/sec.1419 – ident: ref_7 doi: 10.1109/ICICT.2017.8320166 – ident: ref_14 doi: 10.1109/ICITST.2015.7412116 – ident: ref_60 doi: 10.1109/CloudNet.2015.7335286 – volume: 9 start-page: 1 year: 2016 ident: ref_27 article-title: Establishing efficient security scheme in home IOT devices through biometric finger print technique publication-title: Indian J. Sci. Technol. – volume: 79 start-page: 11947 year: 2020 ident: ref_50 article-title: Palmprint template protection scheme based on randomized cuckoo hashing and MinHash publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-019-08446-8 – ident: ref_61 – ident: ref_109 doi: 10.3390/s21020552 – ident: ref_46 doi: 10.1109/CCWC.2019.8666599 – ident: ref_23 – ident: ref_58 – volume: 14 start-page: 4 year: 2004 ident: ref_21 article-title: An introduction to biometric recognition publication-title: IEEE Trans. Circ. Syst. Video Technol. doi: 10.1109/TCSVT.2003.818349 – ident: ref_48 doi: 10.1007/s11042-021-10524-9 – ident: ref_59 doi: 10.1109/ICCISci.2019.8716401 – volume: 11 start-page: 670 year: 2020 ident: ref_83 article-title: A Secure and light-weighted Group based Authentication and Key Agreement Protocol involving ECDH for Machine Type Communications in 3GPP Networks publication-title: Indian J. Comput. Sci. Eng. doi: 10.21817/indjcse/2020/v11i5/201105213 – volume: 7 start-page: 131 year: 2018 ident: ref_33 article-title: Boosting Based Implementation of Biometric Authentication in IoT publication-title: J. Cyber Secur. Mobil. doi: 10.13052/jcsm2245-1439.7110 – volume: 34 start-page: 255 year: 2017 ident: ref_113 article-title: A lightweight biometrics based remote user authentication scheme for IoT services publication-title: J. Inf. Secur. Appl. – ident: ref_71 doi: 10.1007/978-3-319-48947-6_6 – ident: ref_15 doi: 10.1007/978-3-030-72660-7_52 – ident: ref_69 – volume: 78 start-page: 242 year: 2018 ident: ref_64 article-title: A Fingerprint and Finger-vein Based Cancelable Multi-biometric System publication-title: Pattern Recognit. doi: 10.1016/j.patcog.2018.01.026 – ident: ref_107 doi: 10.1016/j.ins.2019.01.073 – ident: ref_66 – ident: ref_91 doi: 10.1016/j.jnca.2019.102496 – ident: ref_105 doi: 10.1016/j.patcog.2021.108074 – ident: ref_95 doi: 10.1109/PST.2016.7907000 – volume: 79 start-page: 328 year: 2016 ident: ref_26 article-title: IoT based biometrics implementation on Raspberry Pi publication-title: Procedia Comput. Sci. doi: 10.1016/j.procs.2016.03.043 – ident: ref_4 doi: 10.3390/s19132985 – volume: 64 start-page: 1 year: 2015 ident: ref_13 article-title: Guidelines for conducting systematic mapping studies in software engineering: An update publication-title: Inf. Softw. Technol. doi: 10.1016/j.infsof.2015.03.007 – ident: ref_56 doi: 10.1016/j.patcog.2020.107735 – ident: ref_47 doi: 10.3390/sym12101699 – ident: ref_85 doi: 10.1109/WiSPNET48689.2020.9198342 – volume: 2 start-page: 37 year: 2012 ident: ref_101 article-title: A study of distortion effects on fingerprint matching publication-title: Comput. Sci. Eng. doi: 10.5923/j.computer.20120203.06 – volume: 7 start-page: 1727 year: 2012 ident: ref_100 article-title: Non-invertible Minutia Cylinder-Code Representation publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2012.2215326 – ident: ref_104 doi: 10.1109/DICTA51227.2020.9363426 – volume: 148 start-page: 283 year: 2019 ident: ref_16 article-title: Current research on Internet of Things (IoT) security: A survey publication-title: Comput. Netw. doi: 10.1016/j.comnet.2018.11.025 – ident: ref_8 doi: 10.1109/CISP.2013.6743946 – volume: 41 start-page: 1411 year: 2014 ident: ref_80 article-title: An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2013.08.040 – ident: ref_106 doi: 10.1007/978-3-319-29883-2_12 – volume: 4 start-page: 880 year: 2016 ident: ref_55 article-title: Protection of Privacy in Biometric Data publication-title: IEEE Access doi: 10.1109/ACCESS.2016.2535120 – volume: 2 start-page: 2652 year: 2010 ident: ref_97 article-title: Multimodal biometrics based authentication against dictionary attacks publication-title: Int. J. Comput. Sci. Eng. – ident: ref_37 – ident: ref_102 – ident: ref_1 doi: 10.1109/ETSecIoT50046.2020.00009 – ident: ref_18 doi: 10.3390/s19051141 – volume: 33 start-page: 82 year: 2019 ident: ref_75 article-title: Challenges of multi-factor authentication for securing advanced IoT applications publication-title: IEEE Netw. doi: 10.1109/MNET.2019.1800240 – volume: 11 start-page: 543 year: 2016 ident: ref_99 article-title: A security-enhanced alignment-free fuzzy vault-based fingerprint cryptosystem using pair-polar minutiae structures publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2015.2505630 – volume: 11 start-page: 156 year: 2016 ident: ref_25 article-title: IoT based biometric attendance system publication-title: Int. J. Adv. Res. Comput. Commun. Eng. – volume: 7 start-page: 1812 year: 2012 ident: ref_24 article-title: ECG biometric recognition: A comparative analysis publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2012.2215324 – volume: 6 start-page: 8182 year: 2019 ident: ref_19 article-title: IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2019.2935189 – volume: 23 start-page: 44 year: 2016 ident: ref_32 article-title: Toward end-to-end biometrics-based security for IoT infrastructure publication-title: IEEE Wirel. Commun. doi: 10.1109/MWC.2016.7721741 – ident: ref_49 doi: 10.1109/TCSVT.2003.818350 – ident: ref_84 doi: 10.24200/sci.2021.54832.3936 – ident: ref_86 doi: 10.1002/dac.4660 – volume: 65 start-page: 2795 year: 2017 ident: ref_82 article-title: Privacy protection for e-health systems by means of dynamic authentication and three-factor key agreement publication-title: IEEE Trans. Ind. Electron. doi: 10.1109/TIE.2017.2739683 – volume: 6 start-page: 36939 year: 2018 ident: ref_20 article-title: Securing Mobile Healthcare Data: A Smart Card based Cancelable Finger-vein Bio-Cryptosystem publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2844182 – volume: 41 start-page: 8129 year: 2014 ident: ref_81 article-title: A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2014.07.004 – ident: ref_29 doi: 10.1007/978-981-10-8681-6_54 – ident: ref_112 doi: 10.1109/TII.2019.2900665 – ident: ref_12 doi: 10.1007/978-3-319-98734-7_19 – ident: ref_28 doi: 10.3390/electronics7020026 |
SSID | ssj0023338 |
Score | 2.5496013 |
SecondaryResourceType | review_article |
Snippet | The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment.... |
SourceID | doaj pubmedcentral proquest pubmed crossref |
SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source |
StartPage | 6163 |
SubjectTerms | Access control authentication Biometric Identification Biometrics Biometry Computer Security Confidentiality Cryptography Data encryption encryption Internet of Things IoT Privacy Review security Security management Smartphones Wearable computers |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8QwDLUQEwyIb8qXCmJgibgmvqRlAwRCDCyAxFalSSqQUA9xd_8fu-lVdwiJhbXxkNpN7Fcn7wGcaW8HOS0bkRmnBKKXolKZE0XNGZryU-Zbts9Hff-CD6_D1zmpLz4TFumBo-MuuE1Y1CiN1zmi8XlAkxdVjYX0mXPt7ks5bwamOqilCHlFHiFFoP5iTDAn15lWC9mnJen_rbL8eUByLuPcrcNaVyqmV3GKG7AUmk1YnSMQ3AK85tvzTLI_Tqn6TOP_vTARo1pERc70qROou0yv0tgI2IaXu9vnm3vR6SAIN1TDiZCeXt5ltQqhQCuDtNIVnhK_HThEa50M1qAOUjIZlyPEq5XXfMmV78G6Wu3AcjNqwh6kwXntqWaqPFP_mbqwNhvmmjZsKlUqHxI4n_mndB1JOGtVfJQEFtiVZe_KBE5708_IjPGb0TU7uTdgMuv2AYW47EJc_hXiBA5nISq7FTYuGShxTxQxgZN-mNYGNzxsE0bT1sYQ_KSiK4HdGNF-JgppUJlBAmYh1gtTXRxp3t9a_m1K6KwSsP8f73YAK5JPybAoBR7C8uRrGo6ozJlUx-0X_Q2kKPjZ priority: 102 providerName: Directory of Open Access Journals – databaseName: ProQuest Technology Collection dbid: 8FG link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV07T8QwDLZ4LDAg3pSXCmJgibgmuaRlQYA4EAMLILFVaZICEmoP7vj_2G2ucAixNhksu47t2Pk-gCPlTC9Ft2GJtoJJ6TgrRGJZVlKExviUuAbt807dPMrbp_5TuHAbhbHKyZnYHNSutnRHfkKJMfXApDwbvjNijaLuaqDQmIX5BCMNjXSlg-uu4BJYf7VoQgJL-5MRFjupSpSYikENVP9f-eXvMckfcWewDEshYYzPWwuvwIyvVmHxB4zgGsgLekNPUPujGHPQuL3l82NWl6zl5YzvA03daXwet-2AdXgcXD1c3rDAhsBsX_THjDvtlE1K4X0mDffccJs5DP-mZ6U0xnJvtFSec4Lkslj3KuEUPXWl17C2FBswV9WV34LYW6ccZk6FIwBAXWbGJP1U4bGNCUvhfATHE_3kNkCFE2PFW44lA6ky71QZwWG3ddjiY_y16YKU3G0gSOvmQ_3xnAcPyakfnJUojlOplNqlXuo0K0qZcZdYyyPYnZgoD342yr__iggOumX0EGp7mMrXn80ejUUopl4RbLYW7SQREheF7kWgp2w9Jer0SvX60qBwY1gnroDt_8XagQVOUzBEOiF3YW788en3MI0ZF_vNv_oFU4HxKQ priority: 102 providerName: ProQuest |
Title | Biometrics for Internet-of-Things Security: A Review |
URI | https://www.ncbi.nlm.nih.gov/pubmed/34577370 https://www.proquest.com/docview/2576501444 https://www.proquest.com/docview/2577448643 https://pubmed.ncbi.nlm.nih.gov/PMC8472874 https://doaj.org/article/72039f427d68447d8e4789bf492d1cc2 |
Volume | 21 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwdV1da9RAFL30A6Q-lPpVo3WJ4oMvo83MzUwiFOlK1yJYRF3YtzCZmahQsrq7hfrvvTdf7Mr6kofksgx3Zvaek5s5B-Cl9vY0o20jEuOUQPRSlCpxIq-4QlN9Snyj9nmlL6f4cZbOdqD32OwSuNxK7dhParq4fn37-8872vBnzDiJsr9ZEonJNAGLXdingmTYyOATDs0EqYiGtaJCm-EHcEdhaoxip-K1qtSI929DnP9-OLlWiSZHcNhByPi8nfN7sBPq-3B3TVjwAeCYT9Wz-P4yJlQat-_9wkrMK9E6dcZfO-O6t_F53DYIHsJ0cvHt_aXo_BGES1W6EtIbr11SqRBytDJIK13uCRDYU4dorZPBGtRBShbpcsSEtfKaD7_y-VhXqUewV8_r8Bji4Lz2hKVKz5KApsqtTdJM0x85QZjShwhe9fkpXCcezh4W1wWRCM5qMWQ1ghdD6K9WMWNb0JiTPASwyHVzY774XnR7puAOcV7RcLzOEI3PAposLyvMpU-ckxGc9FNU9AunYALFvVLECJ4Pj2nPcCPE1mF-08QYoqUExiI4bmd0GEm_IiIwG3O9MdTNJ_XPH40uNxV6dg948t_ffAoHkj-JYQcKPIG91eImPCNMsypHsGtmhq7Z5MMI9scXV5-_jJr3A6NmLf8Fuwj20Q |
linkProvider | Scholars Portal |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Nb9QwEB2VcgAOiG9CCwQEEherG3vWTpAQaoFlS0svtFJvqWM7tFKVtN2tKv4Uv5GZfNFFFbdeYyuyxp7Mm4znPYA32ttRSm4jEuOUQPRSFCpxIis5QlN8SnzD9rmjp3v4bX-8vwS_-14YvlbZfxObD7WvHf8jX2NgzDUwxI8np4JVo7i62ktotMdiK_y6oJRt9mHzM-3vWyknX3Y_TUWnKiDcWI3nQnrjtUtKFUKGVgZppcs8hVE7cojWOhmsQR2kZGorR_mjVl5zyyh3lbpS0XtvwE1UFMm5M33ydUjwFOV7LXsRDY7WZpRcpTrRaiHmNdIAV-HZf69lXopzk3twtwOo8Xp7ou7DUqgewJ1LtIUPATe4Z5-p_WcxYd64_asY5qIuRasDGv_oZPHex-txW354BHvXYqfHsFzVVXgKcXBee0JqhWfCQVNm1ibjVFOYIIBU-BDBu94-ueuoyVkh4zinFIVNmQ-mjOD1MPWk5eO4atIGG3mYwBTazYP67GfeeWTO9eespOV4nSIanwY0aVaUmEmfOCcjWO23KO_8epb_PYURvBqGySO5zGKrUJ83cwwlvQT1InjS7uiwEoU0qMwoArOw1wtLXRypjg4b1m-CEaxN8Oz_y3oJt6a737fz7c2drRW4LfkGDgte4Cosz8_Ow3OCUPPiRXNuYzi4bkf5AyOfLVw |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1bSxwxFD7YFUr7UHrVqdaOpYW-hN1JsslMoRS3ungpi7QVfBszSaYKMqPuivjX_HU9Z266Rfrm6yQM4SQn5zs5yfcBfFTODGJ0GxZpK5iUjrNMRJYlOUVojE-Rq9g-J2r7QO4eDg8X4KZ9C0PXKts9sdqoXWnpjLxPwJhqYFL28-ZaxP7m-NvZOSMFKaq0tnIa9RLZ89dXmL5Nv-5s4lx_4ny89fv7NmsUBpgdiuGMcaedslEuvE-k4Z4bbhOHIdUMrJTGWO6NlspzTjRXFnNJJZyi56P0wtTmAv_7CBY1ZUU9WBxtTfZ_dumewOyv5jISIhn0p5hqxSpSYi4CVkIB96Hbfy9p3ol64-fwrIGr4Ua9vl7Agi9ewtM7JIavQI7oBT8R_U9DRMBhfcboZ6zMWa0KGv5qRPK-hBthXYx4DQcPYqk30CvKwi9D6K1TDnFb5oh-UOeJMdEwVhg0EC5lzgfwubVPahuictLLOE0xYSFTpp0pA_jQdT2r2Tnu6zQiI3cdiFC7-lBe_Ekb_0ypGp3kOBynYim1i73UcZLlMuEuspYHsNpOUdp4-TS9XZMBrHfN6J9UdDGFLy-rPhpTYAR-ASzVM9qNREhsFHoQgJ6b67mhzrcUJ8cVBziCClIqePv_Yb2Hx-gk6Y-dyd4KPOF0HYfUL-Qq9GYXl_4d4qlZttYs3BCOHtpX_gInHTLu |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Biometrics+for+Internet-of-Things+Security%3A+A+Review&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Yang%2C+Wencheng&rft.au=Wang%2C+Song&rft.au=Sahri%2C+Nor+Masri&rft.au=Karie%2C+Nickson+M&rft.date=2021-09-14&rft.eissn=1424-8220&rft.volume=21&rft.issue=18&rft_id=info:doi/10.3390%2Fs21186163&rft_id=info%3Apmid%2F34577370&rft.externalDocID=34577370 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon |