lkpglam.blogg.se

Zkemnetman fingerprint access control
Zkemnetman fingerprint access control









Hence, appropriate security measures must be taken to ensure data safety and integrity in the IIoT. These data may contain private information, such as customers’ personal information (e.g., their behavior characteristics), causing information leakage and privacy invasion. For example, a manufacturer can collect raw data from its devices (e.g., sensors) and even assets. Despite the benefits of the 5G reflected by IIoT applications, data security is a critical challenge. Therefore, industries such as manufacturing are utilising the IIoT to make machines more intelligent. The development of 5G networks greatly increases the use of IoT/IIoT devices for control, monitoring and processing purposes. 5G networks have a host of desirable features, such as high transmission rate, low latency, low energy consumption and massive machine-type communication. This transition is also known as the “Industrial Internet of Things (IIoT)” or “smart factories”. With the development of 5G mobile communication networks, industrial automation is expanding at a rapid pace. The core of the proposed system is the design of a cancelable fingerprint template, which protects original minutia features and provides privacy and security guarantee for both entity users and the message content transmitted between IIoT devices and the cloud server via 5G networks.Compared with state-of-the-art methods, the proposed authentication system shows competitive performance on six public fingerprint databases, while saving computational costs and achieving fast online matching. To address these issues, in this paper we propose a secure online fingerprint authentication system for IIoT devices over 5G networks. Moreover, traditional biometric authentication faces slow, limited database holding capacity and data transmission problems. However, most biometric authentication systems in the IIoT have no template protection, thus risking raw biometric data stored as templates in central databases or IIoT devices. Biometric-based user authentication can prevent unauthorized access to IIoT devices, thereby safeguarding data security during production.

zkemnetman fingerprint access control

The development of 5G networks has rapidly increased the use of Industrial Internet of Things (IIoT) devices for control, monitoring, and processing purposes.











Zkemnetman fingerprint access control