Biometrics for Internet-of-Things Security: A Review

The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securin...

Full description

Saved in:
Bibliographic Details
Published inSensors (Basel, Switzerland) Vol. 21; no. 18; p. 6163
Main Authors Yang, Wencheng, Wang, Song, Sahri, Nor Masri, Karie, Nickson M., Ahmed, Mohiuddin, Valli, Craig
Format Journal Article
LanguageEnglish
Published Switzerland MDPI AG 14.09.2021
MDPI
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions.
AbstractList The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions.
The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions.The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions.
Author Sahri, Nor Masri
Wang, Song
Valli, Craig
Ahmed, Mohiuddin
Yang, Wencheng
Karie, Nickson M.
AuthorAffiliation 1 Security Research Institute, School of Science, Edith Cowan University, Cyber Security Cooperative Research Centre, Joondalup, WA 6027, Australia; masri.sahri@gmail.com (N.M.S.); n.karie@ecu.edu.au (N.M.K.); mohiuddin.ahmed@ecu.edu.au (M.A.); c.valli@ecu.edu.au (C.V.)
2 School of Engineering and Mathematical Sciences, La Trobe University, Melbourne, VIC 3086, Australia; song.wang@latrobe.edu.au
AuthorAffiliation_xml – name: 2 School of Engineering and Mathematical Sciences, La Trobe University, Melbourne, VIC 3086, Australia; song.wang@latrobe.edu.au
– name: 1 Security Research Institute, School of Science, Edith Cowan University, Cyber Security Cooperative Research Centre, Joondalup, WA 6027, Australia; masri.sahri@gmail.com (N.M.S.); n.karie@ecu.edu.au (N.M.K.); mohiuddin.ahmed@ecu.edu.au (M.A.); c.valli@ecu.edu.au (C.V.)
Author_xml – sequence: 1
  givenname: Wencheng
  orcidid: 0000-0001-7800-2215
  surname: Yang
  fullname: Yang, Wencheng
– sequence: 2
  givenname: Song
  surname: Wang
  fullname: Wang, Song
– sequence: 3
  givenname: Nor Masri
  orcidid: 0000-0003-2030-8881
  surname: Sahri
  fullname: Sahri, Nor Masri
– sequence: 4
  givenname: Nickson M.
  surname: Karie
  fullname: Karie, Nickson M.
– sequence: 5
  givenname: Mohiuddin
  orcidid: 0000-0002-4559-4768
  surname: Ahmed
  fullname: Ahmed, Mohiuddin
– sequence: 6
  givenname: Craig
  surname: Valli
  fullname: Valli, Craig
BackLink https://www.ncbi.nlm.nih.gov/pubmed/34577370$$D View this record in MEDLINE/PubMed
BookMark eNplkU1v1DAQhi1URD_gwB9AkbjQQ6g9nsQOh0qlKrBSJSQoZ8t1JluvsnaxnaL-e7JsW7XlZMt-5pnRvPtsJ8RAjL0V_KOUHT_KIIRuRStfsD2BgLUG4DuP7rtsP-cV5yCl1K_YrsRGKan4HsPPPq6pJO9yNcRULUKhFKjUcagvrnxY5uonuSn5cvupOql-0I2nP6_Zy8GOmd7cnQfs15ezi9Nv9fn3r4vTk_PaNbIpNfSqb50YJFGHFggsuK6XQlnuEK11QFZhSwBC885xbFvZtwCgQDbaDfKALbbePtqVuU5-bdOtidabfw8xLY1NxbuRjAIuuwFh7qgRVa8Jle4uB-ygF87B7Dreuq6nyzX1jkJJdnwiffoT_JVZxhujUYFWOAs-3AlS_D1RLmbts6NxtIHilA3MK0XULcoZff8MXcUphXlVG6ptuEDcCN89nuhhlPtwZuBoC7gUc040GOeLLT5uBvSjEdxs4jcP8c8Vh88q7qX_s38BZnOr9w
CitedBy_id crossref_primary_10_3390_app122111182
crossref_primary_10_1007_s12652_024_04872_1
crossref_primary_10_1109_OJCS_2022_3183003
crossref_primary_10_3390_s25061649
crossref_primary_10_1145_3632624
crossref_primary_10_1109_ACCESS_2023_3239387
crossref_primary_10_1063_5_0080942
crossref_primary_10_3390_s24144621
crossref_primary_10_3390_s25020455
crossref_primary_10_1177_17543371241229521
crossref_primary_10_1021_acsaelm_4c01868
crossref_primary_10_1088_2040_8986_ad6e9b
crossref_primary_10_1109_ACCESS_2022_3143210
crossref_primary_10_3390_s23073566
crossref_primary_10_1109_TIM_2024_3457967
crossref_primary_10_32604_cmc_2024_047870
crossref_primary_10_1109_JIOT_2022_3190020
crossref_primary_10_1109_LED_2022_3208560
crossref_primary_10_1016_j_jisa_2022_103317
crossref_primary_10_3390_app14020534
crossref_primary_10_3390_electronics13142849
crossref_primary_10_3390_electronics11040513
crossref_primary_10_1049_cit2_12283
crossref_primary_10_32604_cmc_2024_047625
crossref_primary_10_1155_2022_4336822
crossref_primary_10_3390_s22010066
crossref_primary_10_4018_IJISP_322102
crossref_primary_10_1016_j_mtadv_2023_100426
crossref_primary_10_1039_D1CC06384G
crossref_primary_10_1016_j_jisa_2024_103748
crossref_primary_10_1088_1402_4896_ad3b3d
crossref_primary_10_1038_s41598_025_86603_w
crossref_primary_10_1109_JIOT_2023_3285796
crossref_primary_10_4236_jis_2024_152006
crossref_primary_10_3390_computers11030047
crossref_primary_10_1002_eahr_500130
crossref_primary_10_3390_jmmp8060274
crossref_primary_10_1002_wwp2_12151
crossref_primary_10_1016_j_jisa_2024_103852
crossref_primary_10_48084_etasr_6400
crossref_primary_10_1109_JIOT_2024_3408031
crossref_primary_10_2139_ssrn_4706726
crossref_primary_10_3390_s22020591
crossref_primary_10_3390_bios11100398
crossref_primary_10_1016_j_iot_2024_101178
crossref_primary_10_3390_s22197609
crossref_primary_10_3390_electronics11030383
crossref_primary_10_3390_electronics12010220
crossref_primary_10_3390_s22186963
Cites_doi 10.1109/ACCESS.2019.2946400
10.1016/j.ins.2021.01.001
10.1109/ICSSA.2015.016
10.1109/ACCESS.2019.2924045
10.1007/11527923_32
10.1145/3211933.3211945
10.1109/JSEN.2018.2879929
10.1145/2968215
10.1109/ACCESS.2020.2989456
10.1007/978-3-642-38631-2_71
10.5121/ijsptm.2020.9201
10.1201/9781003339373-8
10.1002/dac.2858
10.1186/1687-417X-2011-3
10.1016/j.istr.2012.02.001
10.1016/j.jisa.2020.102704
10.1016/j.icte.2018.03.001
10.1109/ICACT.2015.7224867
10.1007/s11042-019-7617-1
10.1109/JIOT.2018.2837751
10.1109/ACCESS.2020.3021983
10.1109/ACCESS.2018.2886573
10.1109/JBHI.2018.2864796
10.1007/s11227-018-2266-0
10.1109/JPROC.2003.819611
10.1155/2017/9324035
10.1109/MCOM.2019.1800378
10.1109/UEMCON.2018.8796676
10.2991/978-94-6239-148-2_62
10.1109/CAIS.2019.8769483
10.1007/978-3-642-27552-4_123
10.1007/978-0-387-73003-5
10.1002/sec.1591
10.1016/j.ins.2012.04.009
10.1109/JIOT.2021.3050555
10.1145/2968456.2973748
10.1007/s11227-010-0512-1
10.3390/sym11020141
10.1016/j.future.2017.07.013
10.1109/ACCESS.2017.2676119
10.1016/j.patcog.2019.107054
10.1109/IWCMC.2019.8766495
10.1007/978-3-319-72359-4_55
10.1109/I-SMAC.2017.8058363
10.1007/978-3-319-28658-7_14
10.1109/ACCESS.2019.2910753
10.1109/TSE.2005.97
10.1002/sec.1419
10.1109/ICICT.2017.8320166
10.1109/ICITST.2015.7412116
10.1109/CloudNet.2015.7335286
10.1007/s11042-019-08446-8
10.3390/s21020552
10.1109/CCWC.2019.8666599
10.1109/TCSVT.2003.818349
10.1007/s11042-021-10524-9
10.1109/ICCISci.2019.8716401
10.21817/indjcse/2020/v11i5/201105213
10.13052/jcsm2245-1439.7110
10.1007/978-3-319-48947-6_6
10.1007/978-3-030-72660-7_52
10.1016/j.patcog.2018.01.026
10.1016/j.ins.2019.01.073
10.1016/j.jnca.2019.102496
10.1016/j.patcog.2021.108074
10.1109/PST.2016.7907000
10.1016/j.procs.2016.03.043
10.3390/s19132985
10.1016/j.infsof.2015.03.007
10.1016/j.patcog.2020.107735
10.3390/sym12101699
10.1109/WiSPNET48689.2020.9198342
10.5923/j.computer.20120203.06
10.1109/TIFS.2012.2215326
10.1109/DICTA51227.2020.9363426
10.1016/j.comnet.2018.11.025
10.1109/CISP.2013.6743946
10.1016/j.eswa.2013.08.040
10.1007/978-3-319-29883-2_12
10.1109/ACCESS.2016.2535120
10.1109/ETSecIoT50046.2020.00009
10.3390/s19051141
10.1109/MNET.2019.1800240
10.1109/TIFS.2015.2505630
10.1109/TIFS.2012.2215324
10.1109/JIOT.2019.2935189
10.1109/MWC.2016.7721741
10.1109/TCSVT.2003.818350
10.24200/sci.2021.54832.3936
10.1002/dac.4660
10.1109/TIE.2017.2739683
10.1109/ACCESS.2018.2844182
10.1016/j.eswa.2014.07.004
10.1007/978-981-10-8681-6_54
10.1109/TII.2019.2900665
10.1007/978-3-319-98734-7_19
10.3390/electronics7020026
ContentType Journal Article
Copyright 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
2021 by the authors. 2021
Copyright_xml – notice: 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: 2021 by the authors. 2021
DBID AAYXX
CITATION
CGR
CUY
CVF
ECM
EIF
NPM
3V.
7X7
7XB
88E
8FI
8FJ
8FK
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
COVID
DWQXO
FYUFA
GHDGH
K9.
M0S
M1P
PHGZM
PHGZT
PIMPY
PJZUB
PKEHL
PPXIY
PQEST
PQQKQ
PQUKI
PRINS
7X8
5PM
DOA
DOI 10.3390/s21186163
DatabaseName CrossRef
Medline
MEDLINE
MEDLINE (Ovid)
MEDLINE
MEDLINE
PubMed
ProQuest Central (Corporate)
Health & Medical Collection
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
Hospital Premium Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
Proquest Central
ProQuest One
Coronavirus Research Database
ProQuest Central
Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Health & Medical Complete (Alumni)
ProQuest Health & Medical Collection
Medical Database
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
MEDLINE - Academic
PubMed Central (Full Participant titles)
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
MEDLINE
Medline Complete
MEDLINE with Full Text
PubMed
MEDLINE (Ovid)
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Central China
ProQuest Central
ProQuest Health & Medical Research Collection
Health Research Premium Collection
Health and Medicine Complete (Alumni Edition)
ProQuest Central Korea
Health & Medical Research Collection
ProQuest Central (New)
ProQuest Medical Library (Alumni)
ProQuest One Academic Eastern Edition
Coronavirus Research Database
ProQuest Hospital Collection
Health Research Premium Collection (Alumni)
ProQuest Hospital Collection (Alumni)
ProQuest Health & Medical Complete
ProQuest Medical Library
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList MEDLINE

MEDLINE - Academic

CrossRef
Publicly Available Content Database
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: EIF
  name: MEDLINE
  url: https://proxy.k.utb.cz/login?url=https://www.webofscience.com/wos/medline/basic-search
  sourceTypes: Index Database
– sequence: 4
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1424-8220
ExternalDocumentID oai_doaj_org_article_72039f427d68447d8e4789bf492d1cc2
PMC8472874
34577370
10_3390_s21186163
Genre Journal Article
Review
GrantInformation_xml – fundername: Cyber Security Research Centre Limited
  grantid: None
GroupedDBID ---
123
2WC
53G
5VS
7X7
88E
8FE
8FG
8FI
8FJ
AADQD
AAHBH
AAYXX
ABDBF
ABUWG
ACUHS
ADBBV
ADMLS
AENEX
AFKRA
AFZYC
ALIPV
ALMA_UNASSIGNED_HOLDINGS
BENPR
BPHCQ
BVXVI
CCPQU
CITATION
CS3
D1I
DU5
E3Z
EBD
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
HH5
HMCUK
HYE
IAO
ITC
KQ8
L6V
M1P
M48
MODMG
M~E
OK1
OVT
P2P
P62
PHGZM
PHGZT
PIMPY
PQQKQ
PROAC
PSQYO
RNS
RPM
TUS
UKHRP
XSB
~8M
3V.
ABJCF
ARAPS
CGR
CUY
CVF
ECM
EIF
HCIFZ
KB.
M7S
NPM
PDBOC
7XB
8FK
AZQEC
COVID
DWQXO
K9.
PJZUB
PKEHL
PPXIY
PQEST
PQUKI
PRINS
7X8
5PM
PUEGO
ID FETCH-LOGICAL-c535t-2d7d6c1f3ee94a2e2a2c9d317a0c44aac2ea746e221809c04663d622272358cf3
IEDL.DBID M48
ISSN 1424-8220
IngestDate Wed Aug 27 00:27:45 EDT 2025
Thu Aug 21 14:07:48 EDT 2025
Fri Jul 11 05:22:35 EDT 2025
Fri Jul 25 20:19:06 EDT 2025
Wed Feb 19 02:09:01 EST 2025
Tue Jul 01 03:56:19 EDT 2025
Thu Apr 24 23:10:25 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 18
Keywords biometrics
security
access control
encryption
IoT
authentication
Language English
License https://creativecommons.org/licenses/by/4.0
Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c535t-2d7d6c1f3ee94a2e2a2c9d317a0c44aac2ea746e221809c04663d622272358cf3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Review-3
content type line 23
ORCID 0000-0001-7800-2215
0000-0003-2030-8881
0000-0002-4559-4768
OpenAccessLink http://journals.scholarsportal.info/openUrl.xqy?doi=10.3390/s21186163
PMID 34577370
PQID 2576501444
PQPubID 2032333
ParticipantIDs doaj_primary_oai_doaj_org_article_72039f427d68447d8e4789bf492d1cc2
pubmedcentral_primary_oai_pubmedcentral_nih_gov_8472874
proquest_miscellaneous_2577448643
proquest_journals_2576501444
pubmed_primary_34577370
crossref_citationtrail_10_3390_s21186163
crossref_primary_10_3390_s21186163
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20210914
PublicationDateYYYYMMDD 2021-09-14
PublicationDate_xml – month: 9
  year: 2021
  text: 20210914
  day: 14
PublicationDecade 2020
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Basel
PublicationTitle Sensors (Basel, Switzerland)
PublicationTitleAlternate Sensors (Basel)
PublicationYear 2021
Publisher MDPI AG
MDPI
Publisher_xml – name: MDPI AG
– name: MDPI
References ref_94
ref_93
ref_91
Petersen (ref_13) 2015; 64
ref_14
ref_12
ref_98
Gayathri (ref_34) 2020; 10
Li (ref_50) 2020; 79
ref_95
ref_18
ref_17
ref_15
Odinaka (ref_24) 2012; 7
ref_23
ref_22
Subha (ref_10) 2017; 5
ref_29
ref_28
Chuang (ref_80) 2014; 41
Jain (ref_21) 2004; 14
Choi (ref_90) 2018; 6
ref_71
ref_70
Mishra (ref_81) 2014; 41
Ometov (ref_75) 2019; 33
Hassan (ref_16) 2019; 148
Hammad (ref_96) 2018; 7
Yoon (ref_78) 2013; 63
Lu (ref_42) 2017; 77
Ebrahimi (ref_92) 2021; 8
Dhillon (ref_113) 2017; 34
Devikar (ref_25) 2016; 11
Hossain (ref_32) 2016; 23
Yang (ref_20) 2018; 6
ref_88
ref_87
ref_86
Yahuza (ref_118) 2020; 8
ref_85
Taher (ref_114) 2019; 7
ref_84
Prakash (ref_27) 2016; 9
Yang (ref_64) 2018; 78
Yang (ref_74) 2018; 5
Kolhar (ref_35) 2020; 8
Hannay (ref_119) 2005; 31
Xie (ref_76) 2016; 29
Blasco (ref_11) 2016; 49
ref_58
ref_56
Li (ref_99) 2016; 11
ref_54
ref_51
Srivastva (ref_57) 2021; 558
Meneghello (ref_19) 2019; 6
Selvi (ref_97) 2010; 2
Natgunanathan (ref_55) 2016; 4
ref_59
Karimian (ref_39) 2019; 7
Hassija (ref_115) 2019; 7
Thilagavathi (ref_33) 2018; 7
ref_61
ref_60
ref_69
ref_67
ref_66
ref_65
ref_63
Meena (ref_62) 2019; 22
Challa (ref_52) 2017; 5
ref_117
Bours (ref_68) 2012; 17
ref_116
Zheng (ref_110) 2018; 23
ref_36
(ref_72) 2003; 91
ref_111
ref_31
ref_112
Gao (ref_101) 2012; 2
Ferrara (ref_100) 2012; 7
Kakarla (ref_83) 2020; 11
ref_38
ref_37
Yang (ref_73) 2018; 74
ref_104
Zhang (ref_82) 2017; 65
ref_103
ref_106
ref_105
Zheng (ref_89) 2018; 19
ref_107
Punithavathi (ref_108) 2019; 78
ref_109
ref_47
ref_46
ref_45
ref_44
ref_43
ref_41
ref_102
ref_40
ref_1
ref_3
Lu (ref_77) 2016; 9
ref_2
Shad (ref_26) 2016; 79
ref_49
ref_48
ref_9
ref_8
Yang (ref_30) 2019; 57
ref_5
ref_4
ref_7
Wazid (ref_79) 2016; 9
ref_6
Chang (ref_53) 2012; 211
References_xml – volume: 7
  start-page: 148950
  year: 2019
  ident: ref_114
  article-title: Low-overhead remote user authentication protocol for IoT based on a fuzzy extractor and feature extraction
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2946400
– volume: 558
  start-page: 208
  year: 2021
  ident: ref_57
  article-title: PlexNet: A fast and robust ECG biometric system for human recognition
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2021.01.001
– ident: ref_70
  doi: 10.1109/ICSSA.2015.016
– volume: 7
  start-page: 82721
  year: 2019
  ident: ref_115
  article-title: A survey on IoT security: Application areas, security threats, and solution architectures
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2924045
– ident: ref_88
  doi: 10.1007/11527923_32
– ident: ref_116
  doi: 10.1145/3211933.3211945
– volume: 19
  start-page: 1186
  year: 2018
  ident: ref_89
  article-title: A Critical Analysis of ECG-based Key Distribution for Securing Wearable and Implantable Medical Devices
  publication-title: IEEE Sens. J.
  doi: 10.1109/JSEN.2018.2879929
– volume: 49
  start-page: 1
  year: 2016
  ident: ref_11
  article-title: A survey of wearable biometric recognition systems
  publication-title: ACM Comput. Surv. (CSUR)
  doi: 10.1145/2968215
– ident: ref_94
– volume: 22
  start-page: 643
  year: 2019
  ident: ref_62
  article-title: Biometric authentication in internet of things: A conceptual view
  publication-title: J. Stat. Manag. Syst.
– volume: 8
  start-page: 76541
  year: 2020
  ident: ref_118
  article-title: Systematic review on security and privacy requirements in edge computing: State of the art and future research opportunities
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2989456
– ident: ref_31
– ident: ref_51
  doi: 10.1007/978-3-642-38631-2_71
– ident: ref_41
  doi: 10.5121/ijsptm.2020.9201
– ident: ref_98
  doi: 10.1201/9781003339373-8
– volume: 29
  start-page: 478
  year: 2016
  ident: ref_76
  article-title: Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol
  publication-title: Int. J. Commun. Syst.
  doi: 10.1002/dac.2858
– volume: 10
  start-page: 255
  year: 2020
  ident: ref_34
  article-title: MARK42: The secured personal assistant using biometric traits integrated with green IOT
  publication-title: J. Green Eng.
– ident: ref_93
  doi: 10.1186/1687-417X-2011-3
– volume: 17
  start-page: 36
  year: 2012
  ident: ref_68
  article-title: Continuous keystroke dynamics: A different perspective towards biometric evaluation
  publication-title: Inf. Secur. Tech. Rep.
  doi: 10.1016/j.istr.2012.02.001
– ident: ref_103
  doi: 10.1016/j.jisa.2020.102704
– volume: 5
  start-page: 37
  year: 2018
  ident: ref_74
  article-title: Impact of feature proportion on matching performance of multi-biometric systems
  publication-title: ICT Express
  doi: 10.1016/j.icte.2018.03.001
– ident: ref_40
  doi: 10.1109/ICACT.2015.7224867
– volume: 78
  start-page: 25487
  year: 2019
  ident: ref_108
  article-title: Partial DCT-based cancelable biometric authentication with security and privacy preservation for IoT applications
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-019-7617-1
– ident: ref_45
– volume: 6
  start-page: 335
  year: 2018
  ident: ref_90
  article-title: Two-factor fuzzy commitment for unmanned IoT devices security
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2018.2837751
– volume: 8
  start-page: 163608
  year: 2020
  ident: ref_35
  article-title: A three layered decentralized IoT biometric architecture for city lockdown during COVID-19 outbreak
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3021983
– volume: 7
  start-page: 26527
  year: 2018
  ident: ref_96
  article-title: Multimodal biometric authentication systems using convolution neural network based on different level fusion of ECG and fingerprint
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2886573
– volume: 23
  start-page: 1546
  year: 2018
  ident: ref_110
  article-title: Finger-to-Heart (F2H): Authentication for Wireless Implantable Medical Devices
  publication-title: IEEE J. Biomed. Health Inform.
  doi: 10.1109/JBHI.2018.2864796
– volume: 74
  start-page: 4893
  year: 2018
  ident: ref_73
  article-title: ECB4CI: An enhanced cancelable biometric system for securing critical infrastructures
  publication-title: J. Supercomput.
  doi: 10.1007/s11227-018-2266-0
– ident: ref_3
– volume: 91
  start-page: 2021
  year: 2003
  ident: ref_72
  article-title: Comparing passwords, tokens, and biometrics for user authentication
  publication-title: Proc. IEEE
  doi: 10.1109/JPROC.2003.819611
– ident: ref_17
  doi: 10.1155/2017/9324035
– volume: 57
  start-page: 84
  year: 2019
  ident: ref_30
  article-title: A Privacy-Preserving Lightweight Biometric System for Internet-of-Things Security
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2019.1800378
– ident: ref_111
  doi: 10.1109/UEMCON.2018.8796676
– ident: ref_9
  doi: 10.2991/978-94-6239-148-2_62
– ident: ref_43
  doi: 10.1109/CAIS.2019.8769483
– ident: ref_67
– ident: ref_63
  doi: 10.1007/978-3-642-27552-4_123
– ident: ref_44
– ident: ref_65
  doi: 10.1007/978-0-387-73003-5
– volume: 9
  start-page: 4103
  year: 2016
  ident: ref_79
  article-title: Provably secure biometric-based user authentication and key agreement scheme in cloud computing
  publication-title: Secur. Commun. Netw.
  doi: 10.1002/sec.1591
– volume: 211
  start-page: 36
  year: 2012
  ident: ref_53
  article-title: Dynamically generate a long-lived private key based on password keystroke features and neural network
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2012.04.009
– volume: 8
  start-page: 10706
  year: 2021
  ident: ref_92
  article-title: Lightweight Fuzzy Extractor Based on LPN for Device and Biometric Authentication in IoT
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2021.3050555
– ident: ref_6
– ident: ref_36
  doi: 10.1145/2968456.2973748
– volume: 63
  start-page: 235
  year: 2013
  ident: ref_78
  article-title: Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem
  publication-title: J. Supercomput.
  doi: 10.1007/s11227-010-0512-1
– ident: ref_22
  doi: 10.3390/sym11020141
– volume: 5
  start-page: 37
  year: 2017
  ident: ref_10
  article-title: Biometrics in Internet of Things (IoT) Security
  publication-title: Int. J. Eng. Res. Gen. Sci.
– volume: 77
  start-page: 149
  year: 2017
  ident: ref_42
  article-title: Exploring finger vein based personal authentication for secure IoT
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2017.07.013
– volume: 5
  start-page: 3028
  year: 2017
  ident: ref_52
  article-title: Secure signature-based authenticated key establishment scheme for future IoT applications
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2676119
– ident: ref_54
  doi: 10.1016/j.patcog.2019.107054
– ident: ref_38
  doi: 10.1109/IWCMC.2019.8766495
– ident: ref_117
  doi: 10.1007/978-3-319-72359-4_55
– ident: ref_2
  doi: 10.1109/I-SMAC.2017.8058363
– ident: ref_87
  doi: 10.1007/978-3-319-28658-7_14
– volume: 7
  start-page: 49135
  year: 2019
  ident: ref_39
  article-title: Unlock your heart: Next generation biometric in resource-constrained healthcare systems and IoT
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2910753
– volume: 31
  start-page: 733
  year: 2005
  ident: ref_119
  article-title: A survey of controlled experiments in software engineering
  publication-title: IEEE Trans. Softw. Eng.
  doi: 10.1109/TSE.2005.97
– ident: ref_5
– volume: 9
  start-page: 1331
  year: 2016
  ident: ref_77
  article-title: Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment
  publication-title: Secur. Commun. Netw.
  doi: 10.1002/sec.1419
– ident: ref_7
  doi: 10.1109/ICICT.2017.8320166
– ident: ref_14
  doi: 10.1109/ICITST.2015.7412116
– ident: ref_60
  doi: 10.1109/CloudNet.2015.7335286
– volume: 9
  start-page: 1
  year: 2016
  ident: ref_27
  article-title: Establishing efficient security scheme in home IOT devices through biometric finger print technique
  publication-title: Indian J. Sci. Technol.
– volume: 79
  start-page: 11947
  year: 2020
  ident: ref_50
  article-title: Palmprint template protection scheme based on randomized cuckoo hashing and MinHash
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-019-08446-8
– ident: ref_61
– ident: ref_109
  doi: 10.3390/s21020552
– ident: ref_46
  doi: 10.1109/CCWC.2019.8666599
– ident: ref_23
– ident: ref_58
– volume: 14
  start-page: 4
  year: 2004
  ident: ref_21
  article-title: An introduction to biometric recognition
  publication-title: IEEE Trans. Circ. Syst. Video Technol.
  doi: 10.1109/TCSVT.2003.818349
– ident: ref_48
  doi: 10.1007/s11042-021-10524-9
– ident: ref_59
  doi: 10.1109/ICCISci.2019.8716401
– volume: 11
  start-page: 670
  year: 2020
  ident: ref_83
  article-title: A Secure and light-weighted Group based Authentication and Key Agreement Protocol involving ECDH for Machine Type Communications in 3GPP Networks
  publication-title: Indian J. Comput. Sci. Eng.
  doi: 10.21817/indjcse/2020/v11i5/201105213
– volume: 7
  start-page: 131
  year: 2018
  ident: ref_33
  article-title: Boosting Based Implementation of Biometric Authentication in IoT
  publication-title: J. Cyber Secur. Mobil.
  doi: 10.13052/jcsm2245-1439.7110
– volume: 34
  start-page: 255
  year: 2017
  ident: ref_113
  article-title: A lightweight biometrics based remote user authentication scheme for IoT services
  publication-title: J. Inf. Secur. Appl.
– ident: ref_71
  doi: 10.1007/978-3-319-48947-6_6
– ident: ref_15
  doi: 10.1007/978-3-030-72660-7_52
– ident: ref_69
– volume: 78
  start-page: 242
  year: 2018
  ident: ref_64
  article-title: A Fingerprint and Finger-vein Based Cancelable Multi-biometric System
  publication-title: Pattern Recognit.
  doi: 10.1016/j.patcog.2018.01.026
– ident: ref_107
  doi: 10.1016/j.ins.2019.01.073
– ident: ref_66
– ident: ref_91
  doi: 10.1016/j.jnca.2019.102496
– ident: ref_105
  doi: 10.1016/j.patcog.2021.108074
– ident: ref_95
  doi: 10.1109/PST.2016.7907000
– volume: 79
  start-page: 328
  year: 2016
  ident: ref_26
  article-title: IoT based biometrics implementation on Raspberry Pi
  publication-title: Procedia Comput. Sci.
  doi: 10.1016/j.procs.2016.03.043
– ident: ref_4
  doi: 10.3390/s19132985
– volume: 64
  start-page: 1
  year: 2015
  ident: ref_13
  article-title: Guidelines for conducting systematic mapping studies in software engineering: An update
  publication-title: Inf. Softw. Technol.
  doi: 10.1016/j.infsof.2015.03.007
– ident: ref_56
  doi: 10.1016/j.patcog.2020.107735
– ident: ref_47
  doi: 10.3390/sym12101699
– ident: ref_85
  doi: 10.1109/WiSPNET48689.2020.9198342
– volume: 2
  start-page: 37
  year: 2012
  ident: ref_101
  article-title: A study of distortion effects on fingerprint matching
  publication-title: Comput. Sci. Eng.
  doi: 10.5923/j.computer.20120203.06
– volume: 7
  start-page: 1727
  year: 2012
  ident: ref_100
  article-title: Non-invertible Minutia Cylinder-Code Representation
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2012.2215326
– ident: ref_104
  doi: 10.1109/DICTA51227.2020.9363426
– volume: 148
  start-page: 283
  year: 2019
  ident: ref_16
  article-title: Current research on Internet of Things (IoT) security: A survey
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2018.11.025
– ident: ref_8
  doi: 10.1109/CISP.2013.6743946
– volume: 41
  start-page: 1411
  year: 2014
  ident: ref_80
  article-title: An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2013.08.040
– ident: ref_106
  doi: 10.1007/978-3-319-29883-2_12
– volume: 4
  start-page: 880
  year: 2016
  ident: ref_55
  article-title: Protection of Privacy in Biometric Data
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2016.2535120
– volume: 2
  start-page: 2652
  year: 2010
  ident: ref_97
  article-title: Multimodal biometrics based authentication against dictionary attacks
  publication-title: Int. J. Comput. Sci. Eng.
– ident: ref_37
– ident: ref_102
– ident: ref_1
  doi: 10.1109/ETSecIoT50046.2020.00009
– ident: ref_18
  doi: 10.3390/s19051141
– volume: 33
  start-page: 82
  year: 2019
  ident: ref_75
  article-title: Challenges of multi-factor authentication for securing advanced IoT applications
  publication-title: IEEE Netw.
  doi: 10.1109/MNET.2019.1800240
– volume: 11
  start-page: 543
  year: 2016
  ident: ref_99
  article-title: A security-enhanced alignment-free fuzzy vault-based fingerprint cryptosystem using pair-polar minutiae structures
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2505630
– volume: 11
  start-page: 156
  year: 2016
  ident: ref_25
  article-title: IoT based biometric attendance system
  publication-title: Int. J. Adv. Res. Comput. Commun. Eng.
– volume: 7
  start-page: 1812
  year: 2012
  ident: ref_24
  article-title: ECG biometric recognition: A comparative analysis
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2012.2215324
– volume: 6
  start-page: 8182
  year: 2019
  ident: ref_19
  article-title: IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2019.2935189
– volume: 23
  start-page: 44
  year: 2016
  ident: ref_32
  article-title: Toward end-to-end biometrics-based security for IoT infrastructure
  publication-title: IEEE Wirel. Commun.
  doi: 10.1109/MWC.2016.7721741
– ident: ref_49
  doi: 10.1109/TCSVT.2003.818350
– ident: ref_84
  doi: 10.24200/sci.2021.54832.3936
– ident: ref_86
  doi: 10.1002/dac.4660
– volume: 65
  start-page: 2795
  year: 2017
  ident: ref_82
  article-title: Privacy protection for e-health systems by means of dynamic authentication and three-factor key agreement
  publication-title: IEEE Trans. Ind. Electron.
  doi: 10.1109/TIE.2017.2739683
– volume: 6
  start-page: 36939
  year: 2018
  ident: ref_20
  article-title: Securing Mobile Healthcare Data: A Smart Card based Cancelable Finger-vein Bio-Cryptosystem
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2844182
– volume: 41
  start-page: 8129
  year: 2014
  ident: ref_81
  article-title: A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2014.07.004
– ident: ref_29
  doi: 10.1007/978-981-10-8681-6_54
– ident: ref_112
  doi: 10.1109/TII.2019.2900665
– ident: ref_12
  doi: 10.1007/978-3-319-98734-7_19
– ident: ref_28
  doi: 10.3390/electronics7020026
SSID ssj0023338
Score 2.5496013
SecondaryResourceType review_article
Snippet The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment....
SourceID doaj
pubmedcentral
proquest
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Enrichment Source
StartPage 6163
SubjectTerms Access control
authentication
Biometric Identification
Biometrics
Biometry
Computer Security
Confidentiality
Cryptography
Data encryption
encryption
Internet of Things
IoT
Privacy
Review
security
Security management
Smartphones
Wearable computers
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8QwDLUQEwyIb8qXCmJgibgmvqRlAwRCDCyAxFalSSqQUA9xd_8fu-lVdwiJhbXxkNpN7Fcn7wGcaW8HOS0bkRmnBKKXolKZE0XNGZryU-Zbts9Hff-CD6_D1zmpLz4TFumBo-MuuE1Y1CiN1zmi8XlAkxdVjYX0mXPt7ks5bwamOqilCHlFHiFFoP5iTDAn15lWC9mnJen_rbL8eUByLuPcrcNaVyqmV3GKG7AUmk1YnSMQ3AK85tvzTLI_Tqn6TOP_vTARo1pERc70qROou0yv0tgI2IaXu9vnm3vR6SAIN1TDiZCeXt5ltQqhQCuDtNIVnhK_HThEa50M1qAOUjIZlyPEq5XXfMmV78G6Wu3AcjNqwh6kwXntqWaqPFP_mbqwNhvmmjZsKlUqHxI4n_mndB1JOGtVfJQEFtiVZe_KBE5708_IjPGb0TU7uTdgMuv2AYW47EJc_hXiBA5nISq7FTYuGShxTxQxgZN-mNYGNzxsE0bT1sYQ_KSiK4HdGNF-JgppUJlBAmYh1gtTXRxp3t9a_m1K6KwSsP8f73YAK5JPybAoBR7C8uRrGo6ozJlUx-0X_Q2kKPjZ
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: ProQuest Technology Collection
  dbid: 8FG
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV07T8QwDLZ4LDAg3pSXCmJgibgmuaRlQYA4EAMLILFVaZICEmoP7vj_2G2ucAixNhksu47t2Pk-gCPlTC9Ft2GJtoJJ6TgrRGJZVlKExviUuAbt807dPMrbp_5TuHAbhbHKyZnYHNSutnRHfkKJMfXApDwbvjNijaLuaqDQmIX5BCMNjXSlg-uu4BJYf7VoQgJL-5MRFjupSpSYikENVP9f-eXvMckfcWewDEshYYzPWwuvwIyvVmHxB4zgGsgLekNPUPujGHPQuL3l82NWl6zl5YzvA03daXwet-2AdXgcXD1c3rDAhsBsX_THjDvtlE1K4X0mDffccJs5DP-mZ6U0xnJvtFSec4Lkslj3KuEUPXWl17C2FBswV9WV34LYW6ccZk6FIwBAXWbGJP1U4bGNCUvhfATHE_3kNkCFE2PFW44lA6ky71QZwWG3ddjiY_y16YKU3G0gSOvmQ_3xnAcPyakfnJUojlOplNqlXuo0K0qZcZdYyyPYnZgoD342yr__iggOumX0EGp7mMrXn80ejUUopl4RbLYW7SQREheF7kWgp2w9Jer0SvX60qBwY1gnroDt_8XagQVOUzBEOiF3YW788en3MI0ZF_vNv_oFU4HxKQ
  priority: 102
  providerName: ProQuest
Title Biometrics for Internet-of-Things Security: A Review
URI https://www.ncbi.nlm.nih.gov/pubmed/34577370
https://www.proquest.com/docview/2576501444
https://www.proquest.com/docview/2577448643
https://pubmed.ncbi.nlm.nih.gov/PMC8472874
https://doaj.org/article/72039f427d68447d8e4789bf492d1cc2
Volume 21
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwdV1da9RAFL30A6Q-lPpVo3WJ4oMvo83MzUwiFOlK1yJYRF3YtzCZmahQsrq7hfrvvTdf7Mr6kofksgx3Zvaek5s5B-Cl9vY0o20jEuOUQPRSlCpxIq-4QlN9Snyj9nmlL6f4cZbOdqD32OwSuNxK7dhParq4fn37-8872vBnzDiJsr9ZEonJNAGLXdingmTYyOATDs0EqYiGtaJCm-EHcEdhaoxip-K1qtSI929DnP9-OLlWiSZHcNhByPi8nfN7sBPq-3B3TVjwAeCYT9Wz-P4yJlQat-_9wkrMK9E6dcZfO-O6t_F53DYIHsJ0cvHt_aXo_BGES1W6EtIbr11SqRBytDJIK13uCRDYU4dorZPBGtRBShbpcsSEtfKaD7_y-VhXqUewV8_r8Bji4Lz2hKVKz5KApsqtTdJM0x85QZjShwhe9fkpXCcezh4W1wWRCM5qMWQ1ghdD6K9WMWNb0JiTPASwyHVzY774XnR7puAOcV7RcLzOEI3PAposLyvMpU-ckxGc9FNU9AunYALFvVLECJ4Pj2nPcCPE1mF-08QYoqUExiI4bmd0GEm_IiIwG3O9MdTNJ_XPH40uNxV6dg948t_ffAoHkj-JYQcKPIG91eImPCNMsypHsGtmhq7Z5MMI9scXV5-_jJr3A6NmLf8Fuwj20Q
linkProvider Scholars Portal
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Nb9QwEB2VcgAOiG9CCwQEEherG3vWTpAQaoFlS0svtFJvqWM7tFKVtN2tKv4Uv5GZfNFFFbdeYyuyxp7Mm4znPYA32ttRSm4jEuOUQPRSFCpxIis5QlN8SnzD9rmjp3v4bX-8vwS_-14YvlbZfxObD7WvHf8jX2NgzDUwxI8np4JVo7i62ktotMdiK_y6oJRt9mHzM-3vWyknX3Y_TUWnKiDcWI3nQnrjtUtKFUKGVgZppcs8hVE7cojWOhmsQR2kZGorR_mjVl5zyyh3lbpS0XtvwE1UFMm5M33ydUjwFOV7LXsRDY7WZpRcpTrRaiHmNdIAV-HZf69lXopzk3twtwOo8Xp7ou7DUqgewJ1LtIUPATe4Z5-p_WcxYd64_asY5qIuRasDGv_oZPHex-txW354BHvXYqfHsFzVVXgKcXBee0JqhWfCQVNm1ibjVFOYIIBU-BDBu94-ueuoyVkh4zinFIVNmQ-mjOD1MPWk5eO4atIGG3mYwBTazYP67GfeeWTO9eespOV4nSIanwY0aVaUmEmfOCcjWO23KO_8epb_PYURvBqGySO5zGKrUJ83cwwlvQT1InjS7uiwEoU0qMwoArOw1wtLXRypjg4b1m-CEaxN8Oz_y3oJt6a737fz7c2drRW4LfkGDgte4Cosz8_Ow3OCUPPiRXNuYzi4bkf5AyOfLVw
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1bSxwxFD7YFUr7UHrVqdaOpYW-hN1JsslMoRS3ungpi7QVfBszSaYKMqPuivjX_HU9Z266Rfrm6yQM4SQn5zs5yfcBfFTODGJ0GxZpK5iUjrNMRJYlOUVojE-Rq9g-J2r7QO4eDg8X4KZ9C0PXKts9sdqoXWnpjLxPwJhqYFL28-ZaxP7m-NvZOSMFKaq0tnIa9RLZ89dXmL5Nv-5s4lx_4ny89fv7NmsUBpgdiuGMcaedslEuvE-k4Z4bbhOHIdUMrJTGWO6NlspzTjRXFnNJJZyi56P0wtTmAv_7CBY1ZUU9WBxtTfZ_dumewOyv5jISIhn0p5hqxSpSYi4CVkIB96Hbfy9p3ol64-fwrIGr4Ua9vl7Agi9ewtM7JIavQI7oBT8R_U9DRMBhfcboZ6zMWa0KGv5qRPK-hBthXYx4DQcPYqk30CvKwi9D6K1TDnFb5oh-UOeJMdEwVhg0EC5lzgfwubVPahuictLLOE0xYSFTpp0pA_jQdT2r2Tnu6zQiI3cdiFC7-lBe_Ekb_0ypGp3kOBynYim1i73UcZLlMuEuspYHsNpOUdp4-TS9XZMBrHfN6J9UdDGFLy-rPhpTYAR-ASzVM9qNREhsFHoQgJ6b67mhzrcUJ8cVBziCClIqePv_Yb2Hx-gk6Y-dyd4KPOF0HYfUL-Qq9GYXl_4d4qlZttYs3BCOHtpX_gInHTLu
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Biometrics+for+Internet-of-Things+Security%3A+A+Review&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Yang%2C+Wencheng&rft.au=Wang%2C+Song&rft.au=Sahri%2C+Nor+Masri&rft.au=Karie%2C+Nickson+M&rft.date=2021-09-14&rft.eissn=1424-8220&rft.volume=21&rft.issue=18&rft_id=info:doi/10.3390%2Fs21186163&rft_id=info%3Apmid%2F34577370&rft.externalDocID=34577370
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon