
Number of Journals | 34 |
Number of Issues | 1,306 |
Number of Articles | 9,427 |
Article View | 9,189,269 |
PDF Download | 5,621,868 |
The Improvement of the Iris-Based Authentication by Presenting the Wireless Sensor Network Architecture to Maintain Industrial Internet of Things Privacy | ||
مجله نوآوری های فناوری اطلاعات و ارتباطات کاربردی | ||
Volume 1, Issue 4, September 2021, Pages 35-50 PDF (1.38 M) | ||
Document Type: - | ||
Authors | ||
Keivan Borna* 1; Omid Mahdi Ebadati2; Shayan Zeynali2 | ||
1Department of Computer Science, Faculty of Mathematics and Computer Science, Kharazmi University, Tehran, Iran | ||
2Faculty of Management, Kharazmi University | ||
Receive Date: 23 June 2021, Revise Date: 15 August 2021, Accept Date: 23 August 2021 | ||
Abstract | ||
The Internet of Things provides instant access to information about the physical world and the objects within it, leading to new services and increasing efficiency and productivity. The wireless sensor network is an important network infrastructure in the Industrial Internet of Things and user authentication is used as a basic security mechanism to authenticate users to wireless sensor networks. In this article, we intend to provide a new way to improve the security of authentication using image processing. The analysis was performed by MATLAB software. The results presented in this article, which includes seven steps, have a 93% correct detection rate in pupil identification. These seven steps are: 1. Noise reduction, 2. Finding the outer border of the pupil, 3. Separating the eyelashes, 4. Finding the border of the eyelids, 5. Finding the outer border of the iris, 6. Separating the iris area and 7. Extracting the feature and encoding the pixels by the elliptic curve cryptography (ECC) method. With the measurements and experiments performed, it was found that the proposed method in identifying the eyelid border by the quadratic equation method is more efficient and faster in terms of time than the third-degree equation and the Huff parabolic conversion method. In order to extract the feature, the effective parameters in the SAIF feature extraction algorithm were examined and measured, and the optimal parameters were selected. The Sigma parameter with a value of 2.5 and the Octave parameter with a value of 4 should be considered as the best values. Also, in order to evaluate the resistance of the proposed method to error factors such as the angle, brightness and scale, the proposed method was tested and it was proved that the method has the appropriate resistance resolution in different conditions. | ||
Keywords | ||
Authentication; Wireless Sensor Networks; Privacy; Industrial Internet of Things; Image Processing | ||
References | ||
| ||
Statistics Article View: 231 PDF Download: 257 |