Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Review
. 2021 Sep 14;21(18):6163.
doi: 10.3390/s21186163.

Biometrics for Internet-of-Things Security: A Review

Affiliations
Review

Biometrics for Internet-of-Things Security: A Review

Wencheng Yang et al. Sensors (Basel). .

Abstract

The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions.

Keywords: IoT; access control; authentication; biometrics; encryption; security.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
Application domains of the IoT (adapted from [7]).
Figure 2
Figure 2
Examples of common biometric traits that can be used in authentication systems for IoT (adapted from [20]).
Figure 3
Figure 3
An example of a typical biometric authentication system (adapted from [22]).
Figure 4
Figure 4
The enrollment and verification processes of (a) biometric key binding systems, and (b) biometric key generation systems (adapted from [93]). In the figure, ECC means error correction code.
Figure 4
Figure 4
The enrollment and verification processes of (a) biometric key binding systems, and (b) biometric key generation systems (adapted from [93]). In the figure, ECC means error correction code.
Figure 5
Figure 5
Eight possible attack points targeting biometric authentication systems. Two of them highlighted in the red circle are discussed in this work (adapted from [22]).

Similar articles

Cited by

References

    1. Karie N.M., Sahri N.M., Haskell-Dowland P. IoT threat detection advances, challenges and future directions; Proceedings of the 2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT); Sydney, NSW, Australia. 21–21 April 2020; pp. 22–29.
    1. Deogirikar J., Vidhate A. Security attacks in IoT: A survey; Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC); Palladam, India. 10–11 February 2017; pp. 32–37.
    1. Gurunath R., Agarwal M., Nandi A., Samanta D. An overview: Security issue in IoT network; Proceedings of the 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC); Tirunelveli, India. 29–30 October 2020; pp. 104–107.
    1. Yang W., Wang S., Hu J., Ibrahim A., Zheng G., Macedo M., Johnstone M., Valli C. A Cancelable Iris- and Steganography-based User Authentication System for the Internet of Things. Sensors. 2019;19:2985. doi: 10.3390/s19132985. - DOI - PMC - PubMed
    1. Cherapau I., Muslukhov I., Asanka N., Beznosov K. On the Impact of Touch ID on iPhone Passcodes; Proceedings of the Eleventh Symposium On Usable Privacy and Security; Pittsburgh, Pennsylvania. 20–22 July 2011; pp. 257–276.