Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server

dc.authoridBashir, Ali Kashif/0000-0003-2601-9327
dc.authoridChaudhry, Shehzad/0000-0002-9321-6956
dc.authoridIrshad, Azeem/0000-0002-1366-2834
dc.authoridSrivastava, Gautam/0000-0001-9851-4103
dc.authoridUsman, Muhammad/0000-0002-9828-0738
dc.authoridJolfaei, Alireza/0000-0001-7818-459X
dc.contributor.authorIrshad, Azeem
dc.contributor.authorUsman, Muhammad
dc.contributor.authorChaudhry, Shehzad Ashraf
dc.contributor.authorBashir, Ali Kashif
dc.contributor.authorJolfaei, Alireza
dc.contributor.authorSrivastava, Gautam
dc.date.accessioned2024-09-11T19:51:58Z
dc.date.available2024-09-11T19:51:58Z
dc.date.issued2021
dc.departmentİstanbul Gelişim Üniversitesien_US
dc.description.abstractFuzzy systems can aid in diminishing uncertainty and noise from biometric security applications by providing an intelligent layer to the existing physical systems to make them reliable. In the absence of such fuzzy systems, a little random perturbation in captured human biometrics could disrupt the whole security system, which may even decline the authentication requests of legitimate entities during the protocol execution. In the literature, few fuzzy logic-based biometric authentication schemes have been presented; however, they lack significant security features including perfect forward secrecy (PFS), untraceability, and resistance to known attacks. This article, therefore, proposes a novel two-factor biometric authentication protocol enabling efficient and secure combination of physically unclonable functions, a physical object analogous to human fingerprint, with user biometrics by employing fuzzy extractor-based procedures in the loop. This combination enables the participants in the protocol to achieve PFS. The security of the proposed scheme is tested using the well-known real-or-random model. The performance analysis signifies the fact that the proposed scheme not only offers PFS, untraceability, and anonymity to the participants, but is also resilient to known attacks using light-weight symmetric operations, which makes it an imperative advancement in the category of intelligent and reliable security solutions.en_US
dc.identifier.doi10.1109/TR.2020.3021794
dc.identifier.endpage1025en_US
dc.identifier.issn0018-9529
dc.identifier.issn1558-1721
dc.identifier.issue3en_US
dc.identifier.scopus2-s2.0-85114319201en_US
dc.identifier.startpage1014en_US
dc.identifier.urihttps://doi.org/10.1109/TR.2020.3021794
dc.identifier.urihttps://hdl.handle.net/11363/7878
dc.identifier.volume70en_US
dc.identifier.wosWOS:000692208600016en_US
dc.identifier.wosqualityQ1en_US
dc.indekslendigikaynakWeb of Scienceen_US
dc.language.isoenen_US
dc.publisherIEEE-Inst Electrical Electronics Engineers Incen_US
dc.relation.ispartofIeee Transactions on Reliabilityen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.snmz20240903_Gen_US
dc.subjectAuthenticationen_US
dc.subjectProtocolsen_US
dc.subjectServersen_US
dc.subjectPassworden_US
dc.subjectCryptographyen_US
dc.subjectIronen_US
dc.subjectBiometric fuzzy extractor (FE)en_US
dc.subjectfuzzy systemsen_US
dc.subjectmutual authenticationen_US
dc.subjectphysical unclonable function (PUF)en_US
dc.subjectuser accessen_US
dc.titleFuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Serveren_US
dc.typeArticleen_US

Dosyalar