Have a personal or library account? Click to login
Biometric authentication sensor with an encryption module for prevention of h/w hacking in digital custody services Cover

Biometric authentication sensor with an encryption module for prevention of h/w hacking in digital custody services

By: Soojun Lee,  Hyeopgoo Yeo and  Mingoo Kang  
Open Access
|Apr 2023

References

  1. Mingoo Kang, et al., “individual digital safe system for set-top box by use of FIDO transaction certification and multiple DID personal identification”, Korea patent 10-2021-0126039, 2021.09.24
  2. https://www.sec.gov/
  3. https://www.sec.gov/info/smallbus/secg/custody_rule-secg.htm
  4. https://fidoalliance.org/
  5. E. Klieme, J. Wilke, N. van Dornick and C. Meinel, “FIDOnuous: A FIDO2/WebAuthn Extension to Support Continuous Web Authentication,” 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1857–1867, 2020
  6. Lyastani, S. G., Schilling, M., Neumayr, M., Backes, M., & Bugiel, S. “Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Password-less Authentication,” in IEEE Symposium on Security and Privacy, pp. 268–285, May 2020
  7. Peter Smith, Nipun Srivastava, “A Market Overview of Custody for Digital Assets” Deloitte Digital Custodian Whitepaper, June 2020
  8. Mingoo Kang, Seungpil Hong. Sangchul Shin and Sangyep Nam, Digital Asset and Security, Sanghakdang, 2022
  9. Rivera-Dourado, Martiño, et al. ‘An Analysis of the Current Implementations Based on the WebAuthn and FIDO Authentication Standards.” Engineering Proceedings 7.1(56). 2021
  10. Biryukov, A., & Tikhomirov, S. “Security and privacy of mobile wallet users in Bitcoin, Dash, Monero, and Zcash.” Pervasive and Mobile Computing, 59, 101030. 2019
  11. Yeo, Hyeopgoo. “Touch fingerprint sensor based on sensor cell isolation technique with pseudo direct signaling.” International Journal on Smart Sensing and Intelligent Systems, vol.12, no.1, pp.1–9. 2019
  12. E. Rahmawati et al., “Digital signature on file using biometric fingerprint with fingerprint sensor on smartphone.” 2017 International Electronics Symposium on Engineering Technology and Applications (IES-ETA), pp. 234–238. 2017
  13. Lee, D., Kim, D. C., Kwon, D., & Kim, H. “Efficient hardware implementation of the lightweight block encryption algorithm LEA.” Sensors, vol 14(1), pp 975–994. 2014
  14. J. Sun, Q. Zhong, L. Kou, W. Wang, Q. Da and Y. Lin, “A lightweight multi-factor mobile user authentication scheme.” IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 831–836. 2018
  15. Katuk, Norliza, and Ikenna Rene Chiadighikaobi. “An Enhanced Block Pre-Processing of PRESENT Algorithm for Fingerprint Template Encryption in the Internet of Things Environment.” International Journal of Communication Networks and Information Security, 13.3 pp. 474–481. 2021
  16. Hong, D., Lee, J. K., Kim, D. C., Kwon, D., Ryu, K. H., & Lee, D. G. (2013, August). “LEA: A 128-bit block cipher for fast encryption on common processors.” In international workshop on information security applications (pp. 3–27). Springer, Cham. 2013
  17. Sonh, S. “Design of Encryption/Decryption IP for Lightweight Encryption LEA.” Journal of Internet Computing and Services, 18(5), vol 8. 2017
  18. Hong, D., Lee, J. K., Kim, D. C., Kwon, D., Ryu, K. H., & Lee, D. G. “LEA: A 128-bit block cipher for fast encryption on common processors.” In international workshop on information security applications (pp. 3–27). Springer, Cham. August 2013.
  19. D. Cho, “A Simple Fingerprint Fuzzy Vault for FIDO.” KSII Transactions on Internet and Information Systems, vol. 10, no. 11, pp. 5674–5128, 2016.
  20. Y. Chen, Y. Ge, W. Wang and F. Yang, “A Biometric-based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks.” KSII Transactions on Internet and Information Systems, vol. 12, no. 4, pp. 1779–1798, 2018
  21. Gyeong-Jin Ra and Im-Yeong Lee. 2018. “A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments.” KSII Transactions on Internet and Information Systems, 12, 2, pp 892–905. 2018
  22. Y. Zhang and X. Jia, “Fast image encryption algorithm based on substitution and diffusion.” KSII Transactions on Internet and Information Systems, vol. 12, no. 9, pp. 4487–4511, 2018
  23. https://precisebiometrics.com
Language: English
Submitted on: Nov 1, 2022
Published on: Apr 6, 2023
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2023 Soojun Lee, Hyeopgoo Yeo, Mingoo Kang, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.