Fuzzy Identification-Based Encryption for healthcare user face authentication

نویسندگان

چکیده

Background: Internet of Medical Things (IOMT) has the potential to monitor health continuously and in real-time. One main issues that arise IOMT is how securely data can be transmitted clinical team. In this project, biometric Identity-based encryption was utilized using Fuzzy-IBE (Identity-based encryption) scheme uses face features clinicians create public key. Figure 1 shows testbed setup designed improve privacy security patients’ healthcare data. Methods: The comprises an ESP32 platform sensing encrypting data, Nvidia Jetson Nano for collection decryption, Thingsboard online vital information visualization. Fuzzy Identity-Based Encryption (FIBE)1–3 legitimate users’ facial features. encrypted Edge-device (Jetson Nano) through BLE/Wi-Fi. On edge-device system, authentication mechanism verifies user's (clinician) legitimacy assess Upon user authentication, their will used generate a private decryption key decrypt received further sent core cloud (Thingsboard) storage To secure on cloud, we deployed Intrusion Detection System (IDS) model deep learning identify inter-domain stream malicious traffic. Results: testing Cryptography relied set. execution time calculated (time encrypt patient's physician's features) match at least d components ciphertext perform message decryption). experimental results are reported Table 1. Conclusion: today's age advanced telecommunication technology, cyber very important factor. work showcases secured against attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor

Encryption and authentication schemes suffice for the security of information stored or exchanged by different parties, but secure key generation and distribution is a highly non-trivial matter in cryptography. Fuzzy extractor is a security primitive, which can be used to encrypt and authenticate a message using his biometric b to reproduce extraction of an almost uniformly key from non-uniform...

متن کامل

Continuous User Authentication using Video-based Face Recognition

In order to ensure that a verified user is indeed the individual accessing a secured system over a period of time, it is necessary to constantly monitor the individual. Typical biometric systems recognize an individual at one particular time (e.g. login) and commonly require interaction with a device (e.g. using the keyboard). In this paper, we address the issue of continuous biometric verifica...

متن کامل

Permutation-based encryption, authentication and authenticated encryption

While mainstream symmetric cryptography has been dominated by block ciphers, we have proposed an alternative based on fixed-width permutations with modes built on top of the sponge and duplex construction, and our concrete proposal K . Our permutationbased approach is scalable and suitable for high-end CPUs as well as resource-constrained platforms. The la er is illustrated by the small K insta...

متن کامل

Multimodal Biometric System for User Authentication with Fuzzy Fusion of Face and Fingerprint

Abstract—The vast majority of the successful commercial biometric systems at present depend on fingerprint or face. Moreover, these biometric indicators complement one another in their strengths and advantages. While fingerprint gives exceptionally high verification precision, but still carry some verification errors. The Face recognition is second most preferred method with reasonably good acc...

متن کامل

Sensor-Based User Authentication

We study the feasibility of leveraging the sensors embedded on mobile devices to enable a user authentication mechanism that is easy for users to perform, but hard for attackers to bypass. The proposed approach lies on the fact that users perform gestures in a unique way that depends on how they hold the phone, and on their hand’s geometry, size, and flexibility. Based on this observation, we i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of emergency medicine, trauma and acute care

سال: 2022

ISSN: ['1999-7086', '1999-7094']

DOI: https://doi.org/10.5339/jemtac.2022.qhc.72