Comments on a recently proposed Privacy Preserving Lightweight Biometric Authentication System for IoT Security

In this paper, we show that a recently published lightweight adaptation of a Fingerprint matching algorithm called the Minutia Cylinder-Code may not be secure as intruders may be able to illegitimately yet successfully authenticate themselves to the system under consideration. We also show that the lightweight adaptation has other privacy related vulnerabilities that make it unsuitable for use in Biometrics. We make it clear that we are neither investigating nor commenting on the security of the original Minutia Cylinder-Code algorithm by itself, rather we highlight the vulnerabilities of the lightweight adaptation. In the process of doing this, we provide a high-level overview of the role of one-way functions in cryptography and biometrics to provide a context to the aforementioned lightweight algorithm and its deficiencies.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/21/2022

Evaluation of User Perception on Biometric Fingerprint System

Biometric systems involve security assurance to make our system highly s...
research
06/01/2020

Security Smells in Android

The ubiquity of smartphones, and their very broad capabilities and usage...
research
05/27/2022

Locally Authenticated Privacy-preserving Voice Input

Increasing use of our biometrics (e.g., fingerprints, faces, or voices) ...
research
06/03/2019

An overview of memristive cryptography

Smaller, smarter and faster edge devices in the Internet of things era d...
research
12/21/2022

Secure and Privacy Preserving Proxy Biometrics Identities

With large-scale adaption to biometric based applications, security and ...
research
01/20/2021

The (in)security of some recently proposed lightweight key distribution schemes

Two recently published papers propose some very simple key distribution ...

Please sign up or login with your details

Forgot password? Click here to reset