Fuzzy Identification-Based Encryption for healthcare user face authentication
نویسندگان
چکیده
Background: Internet of Medical Things (IOMT) has the potential to monitor health continuously and in real-time. One main issues that arise IOMT is how securely data can be transmitted clinical team. In this project, biometric Identity-based encryption was utilized using Fuzzy-IBE (Identity-based encryption) scheme uses face features clinicians create public key. Figure 1 shows testbed setup designed improve privacy security patients’ healthcare data. Methods: The comprises an ESP32 platform sensing encrypting data, Nvidia Jetson Nano for collection decryption, Thingsboard online vital information visualization. Fuzzy Identity-Based Encryption (FIBE)1–3 legitimate users’ facial features. encrypted Edge-device (Jetson Nano) through BLE/Wi-Fi. On edge-device system, authentication mechanism verifies user's (clinician) legitimacy assess Upon user authentication, their will used generate a private decryption key decrypt received further sent core cloud (Thingsboard) storage To secure on cloud, we deployed Intrusion Detection System (IDS) model deep learning identify inter-domain stream malicious traffic. Results: testing Cryptography relied set. execution time calculated (time encrypt patient's physician's features) match at least d components ciphertext perform message decryption). experimental results are reported Table 1. Conclusion: today's age advanced telecommunication technology, cyber very important factor. work showcases secured against attacks.
منابع مشابه
Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor
Encryption and authentication schemes suffice for the security of information stored or exchanged by different parties, but secure key generation and distribution is a highly non-trivial matter in cryptography. Fuzzy extractor is a security primitive, which can be used to encrypt and authenticate a message using his biometric b to reproduce extraction of an almost uniformly key from non-uniform...
متن کاملContinuous User Authentication using Video-based Face Recognition
In order to ensure that a verified user is indeed the individual accessing a secured system over a period of time, it is necessary to constantly monitor the individual. Typical biometric systems recognize an individual at one particular time (e.g. login) and commonly require interaction with a device (e.g. using the keyboard). In this paper, we address the issue of continuous biometric verifica...
متن کاملPermutation-based encryption, authentication and authenticated encryption
While mainstream symmetric cryptography has been dominated by block ciphers, we have proposed an alternative based on fixed-width permutations with modes built on top of the sponge and duplex construction, and our concrete proposal K . Our permutationbased approach is scalable and suitable for high-end CPUs as well as resource-constrained platforms. The la er is illustrated by the small K insta...
متن کاملMultimodal Biometric System for User Authentication with Fuzzy Fusion of Face and Fingerprint
Abstract—The vast majority of the successful commercial biometric systems at present depend on fingerprint or face. Moreover, these biometric indicators complement one another in their strengths and advantages. While fingerprint gives exceptionally high verification precision, but still carry some verification errors. The Face recognition is second most preferred method with reasonably good acc...
متن کاملSensor-Based User Authentication
We study the feasibility of leveraging the sensors embedded on mobile devices to enable a user authentication mechanism that is easy for users to perform, but hard for attackers to bypass. The proposed approach lies on the fact that users perform gestures in a unique way that depends on how they hold the phone, and on their hand’s geometry, size, and flexibility. Based on this observation, we i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of emergency medicine, trauma and acute care
سال: 2022
ISSN: ['1999-7086', '1999-7094']
DOI: https://doi.org/10.5339/jemtac.2022.qhc.72