Unimodal and multimodal biometric sensing systems: a review

MO Oloyede, GP Hancke - IEEE access, 2016 - ieeexplore.ieee.org
Biometric systems are used for the verification and identification of individuals using their
physiological or behavioral features. These features can be categorized into unimodal and …

User authentication schemes for wireless sensor networks: A review

S Kumari, MK Khan, M Atiquzzaman - Ad Hoc Networks, 2015 - Elsevier
Wireless sensor networks (WSNs) are applicable in versatile domains ranging from very
common to those which demand crucial security concerns. The deployment of WSNs in …

On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions

D Wang, P Wang - Computer Networks, 2014 - Elsevier
Anonymity is among the important properties of two-factor authentication schemes for
wireless sensor networks (WSNs) to preserve user privacy. Though impressive efforts have …

Improved two-factor user authentication in wireless sensor networks

B Vaidya, D Makrakis… - 2010 IEEE 6th International …, 2010 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are considered due to the ubiquitous nature, ease of
deployment, and wide range of possible applications. WSNs can be deployed in unattended …

Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis

C Shepherd, K Markantonakis, N Van Heijningen… - Computers & …, 2021 - Elsevier
Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core,
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …

The fall of one, the rise of many: a survey on multi-biometric fusion methods

LM Dinca, GP Hancke - IEEE Access, 2017 - ieeexplore.ieee.org
Increasing operational and security demands changed biometrics by shifting the focus from
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …

Two‐factor mutual authentication with key agreement in wireless sensor networks

B Vaidya, D Makrakis, H Mouftah - Security and …, 2016 - Wiley Online Library
Wireless sensor networks (WSNs) are getting popular for their deployment in unattended
environments, where a registered user can log in to the network and access data collected …

A key distribution scheme using elliptic curve cryptography in wireless sensor networks

J Louw, G Niezen, TD Ramotsoela… - 2016 IEEE 14th …, 2016 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) have become increasingly popular in many applications
across a broad range of fields. Securing WSNs poses unique challenges mainly due to their …

A novel RFID distance bounding protocol based on physically unclonable functions

S Kardaş, MS Kiraz, MA Bingöl, H Demirci - RFID. Security and Privacy …, 2012 - Springer
Abstract Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (ie,
mafia, terrorist and distance frauds) when they are used for authentication purposes …

A taxonomy of various attacks on smart card–based applications and countermeasures

BB Gupta, M Quamara - Concurrency and Computation …, 2021 - Wiley Online Library
Deployment of smart card–based applications is becoming prevalent these days. Security of
these applications depends upon the nature of underlying hardware and software platforms …