{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:40:02Z","timestamp":1772725202136,"version":"3.50.1"},"reference-count":33,"publisher":"Wiley","license":[{"start":{"date-parts":[[2022,2,26]],"date-time":"2022-02-26T00:00:00Z","timestamp":1645833600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Sensors"],"published-print":{"date-parts":[[2022,2,26]]},"abstract":"<jats:p>When milliards of smart devices are connected to the Internet using the Internet of Things (IoT), robust security methods are required to deliver current information to the objects. Using IoT, the user can be accessed via smart device applications at any time and any place, which challenges IoT security and privacy. From security point of view, users and smart devices should have secure communication channel and digital ID. Authentication is the first step towards any security action. Biometric-based authentication can ensure higher security for developing secure access. In this paper, fingerprint is used as the biometric factor. After scanning the fingerprint using the cellphone\u2019s camera, the image is transmitted to the authentication system. Since the comparison time increases after increasing the database volume, instead of storing the scanned fingerprint image, some key features of the scanned fingerprint are extracted and transmitted to the learning system of the convolutional neural network for detection and authentication and stored in the database. In the user authentication phase, the authentication keys are identified and the passcodes for the user of interest are extracted, and zero code is sent to the forged people; finally, the passcode is examined to check if the user is legal or illegal. In this step, the legal codes for fuzzy encoding of the image and text information are activated, and encryption is carried out in multiple steps depending on the number of members. The final code is compressed using Huffman coding and used for transmission to the network or storage. The proposed method is tested in MATLAB, and the results show that an excellent security is achieved using this cascade encryption method. Conclusively, the proposed hybrid coding technique reduces the information volume by 15.9%.<\/jats:p>","DOI":"10.1155\/2022\/4336822","type":"journal-article","created":{"date-parts":[[2022,2,26]],"date-time":"2022-02-26T15:35:07Z","timestamp":1645889707000},"page":"1-15","source":"Crossref","is-referenced-by-count":8,"title":["A Real-Time Biometric Encryption Scheme Based on Fuzzy Logic for IoT"],"prefix":"10.1155","volume":"2022","author":[{"given":"Masoud","family":"Moradi","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Ilam Branch, Islamic Azad University, Ilam, Iran"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7215-0807","authenticated-orcid":true,"given":"Masoud","family":"Moradkhani","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Arak Branch, Islamic Azad University, Arak, Iran"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohammad Bagher","family":"Tavakoli","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Ilam Branch, Islamic Azad University, Ilam, Iran"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2021226"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-71041-9","volume-title":"Handbook of Biometrics","author":"A. K. Jain","year":"2008"},{"key":"3","volume-title":"Security in Next Generation Mobile Payment Systems: A Comprehensive Survey","author":"W. Ahmed","year":"2021"},{"key":"4","first-page":"457","article-title":"Vulnerability analysis of iPhone 6","author":"W. Yang"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.3390\/s21186163"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.3390\/s21103466"},{"key":"7","first-page":"1","article-title":"Biometric cryptosystem scheme for Internet of Things using fuzzy commitment principle","author":"A. Bentahar"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.06.007"},{"key":"9","first-page":"174","article-title":"IoT device fingerprint using deep learning","author":"S. Aneja"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1080\/09720510.2019.1609722"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1337"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.5937\/vojtehg69-32007"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.3390\/fi13050117"},{"key":"14","first-page":"1","article-title":"Fingerprinting analog IoT sensors for secret-free authentication","author":"F. Lorenz"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.3389\/frobt.2021.685966"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.3390\/electronics7020026"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1002\/eng2.12226"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/3805058"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.3390\/sym13010129"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.3390\/s20216158"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.04.182"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.11.007"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2020.106911"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.02.002"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1952.273898"},{"key":"26","volume-title":"JPEG Compression","author":"B. O\u2019Hanen","year":"2005"},{"key":"27","unstructured":"KaurP.Compression using fractional Fourier transform, a thesis submitted in the partial fulfillment of requirement for the award of the degree of master of engineering in electronics and communicationDeemed University"},{"issue":"15","key":"28","first-page":"36004","article-title":"Comparative study between LM-DH technique and Huffman coding","volume":"10","author":"A. Odat","year":"2015","journal-title":"International Journal of Applied Engineering Research"},{"issue":"9","key":"29","first-page":"211","article-title":"Trust-based service selection in public cloud computing using fuzzy modifed VIKOR method","volume":"7","author":"H. M. Alabool","year":"2013","journal-title":"Australian Journal of Basic and Applied Sciences"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.01.010"},{"key":"31","article-title":"Providing an Adaptive Routing along with a Hybrid Selection Strategy to Increase Efficiency in NoC-Based Neuromorphic Systems","author":"M. Trik","year":"2021","journal-title":"Computational Intelligence and Neuroscience"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2017.014994"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2325891"}],"container-title":["Journal of Sensors"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2022\/4336822.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2022\/4336822.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2022\/4336822.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,26]],"date-time":"2022-02-26T15:35:15Z","timestamp":1645889715000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/js\/2022\/4336822\/"}},"subtitle":[],"editor":[{"given":"Yanqiong","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"editor","vocabulary":"crossref"}]}],"short-title":[],"issued":{"date-parts":[[2022,2,26]]},"references-count":33,"alternative-id":["4336822","4336822"],"URL":"https:\/\/doi.org\/10.1155\/2022\/4336822","relation":{},"ISSN":["1687-7268","1687-725X"],"issn-type":[{"value":"1687-7268","type":"electronic"},{"value":"1687-725X","type":"print"}],"subject":[],"published":{"date-parts":[[2022,2,26]]}}}