Research Article

Security-Level Improvement of IoT-Based Systems Using Biometric Features

Table 2

Related works in the field of IoT security.

Reference paperYearContribution

[17]2021In this solution, a lightweight algorithm based on block cryptography is used to provide security in fog computing.
[19]2020A two-step encryption solution is provided to secure the data stored in the cloud. In this solution, the main data are divided into two parts, which are encrypted by a common key.
[22]2020In this article, the authors provide an overview of the most important cryptographic solutions that can be used in fog computing. The results of these studies indicate the need for algorithms and solutions that can create a kind of compromise between security and service quality parameters.
[24]2020A framework for use in health care systems along with machine learning for decision-making based on patient data is provided. Also, blockchain has been used to secure the data stream.
[26]2020This paper first examines the infrastructure, protocol, and application of the Internet of Things. Then, security problems in the IoT environment are expressed. It also identifies some emerging techniques that can be used to address IoT security issues. In this study, the authors conclude that machine learning, blockchain, and artificial intelligence are the new approaches to solving the problem of IoT security.
[14]2020The authors provided a system including a microcontroller with android application that has features for history control and speech recognition. For securing this system, they are using a unique biometric and speech authentication mechanism.
[15]2019Authors in this paper provided a low-cost biometric system for IoT devices that used limited resources to reduce memory and computation costs. The proposed system utilizes an algorithm based on the block logic operation to reduce biometric property measurement.
[21]2019A number of symmetric cryptographic algorithms have been investigated in terms of performance. Solutions in terms of runtime parameters and memory consumption have been investigated. The purpose of this study was to determine the capabilities and limitations of each cryptographic algorithm.
[18]2018In this research, an encryption system based on AES algorithm and asynchronous key transfer system for data exchange is presented. This solution can be used to secure infrastructure with limited processing resources.
[20]2018Blockchain has been used as a security solution based on cloud computing. To ensure data security, data are stored in the form of blockchain blocks.