Item request has been placed!
×
Item request cannot be made.
×

Processing Request
Biometric Cryptosystem to Secure Smart Object Communications in the Internet of Things.
Item request has been placed!
×
Item request cannot be made.
×

Processing Request
- معلومة اضافية
- نبذة مختصرة :
Smart cities are viewed as one of the strengths of developed countries. Despite its novelty, It has attracted a lot of attention, prompting major tech companies to invest in various aspects related to their design. In fact, the Internet of Things is the most important pillar of these cities, as it allows almost everything, including machines, animals, and people, to be connected to the Internet and interact with one another. Like any electronic application, the security aspect is one of the most difficult challenges in the creation and design of such networks. As a result, in this paper, we proposed a secure IoT framework based on cloud computing. In this study, we focused on the security aspect of connecting people to their objects using biometric cryptosystems. Our proposed cryptosystem uses the concepts of a chaotic system combined with hand-palm biometrics, and uses the oriented Basic Image Features (oBIF) as a feature extraction method. The user message is then encrypted using the AES algorithm, while the user template is encrypted by a proposed algorithm. [ABSTRACT FROM AUTHOR]
- نبذة مختصرة :
Copyright of Kuwait Journal of Science is the property of Kuwait University, Academic Publication Council and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
No Comments.