Chinese Journal of Network and Information Security ›› 2021, Vol. 7 ›› Issue (2): 126-140.doi: 10.11959/j.issn.2096-109x.2021022
• Papers • Previous Articles Next Articles
Xiang ZOU1,2, Jinsong HAN2, Yuhang QU1, Jian XIAO3, Xian XU4
Revised:
2020-09-23
Online:
2021-04-15
Published:
2021-04-01
Supported by:
CLC Number:
Xiang ZOU, Jinsong HAN, Yuhang QU, Jian XIAO, Xian XU. Passive biometric electronic lock via UHF RFID[J]. Chinese Journal of Network and Information Security, 2021, 7(2): 126-140.
[1] | CAO K , JAIN A K . Hacking mobile phones using 2D printed fingerprints[R]. Michigan State University Tech.MSU-CSE-16-2, 2016. |
[2] | MOSHNYAGA V G , SHIOYAMA J , HASHIMOTO K . A camera-based approach to prevent fingerprint hacking[C]// IEEE International Workshop on Signal Processing Systems. 2018. |
[3] | BOWYER K W , DOYLE J S . Cosmetic contact lenses and IRIS recognition spoofing[J]. Computer, 2014,47(5): 96-98. |
[4] | ERDOGMUS N , MARCEL S . Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect[C]// Proc IEEE 6th Int Conf Biometrics Theory Appl Syst. 2013. |
[5] | RUIZ-ALBACETE V , TOME-GONZALEZ P , ALONSO-FERNANDEZ F , ,et al. Direct attacks using fake images in IRIS verification[C]// Proc 1st Eur Workshop Biometrics Identity Manage. 2008. |
[6] | KIBRET B , TESHOME A K , LAI D T ,et al. Analysis of the human body as an antenna for wireless implant communication[J]. IEEE Transactions on Antennas and Propagation, 2016,64(4): 1466-1476. |
[7] | ARAI N , SASAKI K , MURAMATSU D ,et al. Variation of impedance in transmission channel of human body communication[C]// International Symposium on Medical Information and Communication Technology. 2017: 49-53. |
[8] | SHAHRIAR H , HADDAD H M , ISLAM M ,et al. An iris-based authentication framework to prevent presentation attacks[C]// Computer Software and Applications Conference. 2017: 504-509. |
[9] | MIRMOGAMADSADEGHI L , DRYGAJLO A . Palm vein recognition with local binary patterns and local derivative patterns[C]// International Joint Conference on Biometrics. 2011. |
[10] | MIURA N , NAGASAKA A , MIYATAKE T . Feature extraction of finger-vein patterns based on repeated line tracking and its application to personal identification[J]. Systems & Computers in Japan, 2004,35(7): 61-71. |
[11] | ARORA P , SRIVASTAVA S , HANMANDLU M ,et al. Robust authentication using dorsal hand vein images[J]. IEEE Intelligent Systems, 2019,34(2): 25-35. |
[12] | BOLES A , RAD P . Voice biometrics:deep learning-based voiceprint authentication system[C]// Service Oriented Software Engineering. 2017: 1-6. |
[13] | REN Y , FANG Z , LIU D ,et al. Replay attack detection based on distortion by loudspeaker for voice authentication[J]. Multimedia Tools and Applications, 2019,78(7): 8383-8396. |
[14] | YANG Y F , GUO B , WANG Z ,et al. BehaveSense:continuous authentication for security-sensitive mobile Apps using behavioral biometrics[J]. Ad Hoc Networks, 2019,84: 9-18. |
[15] | MUSALE P , BAEK D , WERELLAGAMA N ,et al. You walk,we authenticate:lightweight seamless authentication based on gait in wearable IoT systems[J]. IEEE Access, 2019: 37883-37895. |
[16] | WANG Y X , CHEN Y N , BHUIYAN M Z A ,et al. Gait-based human identification using acoustic sensor and deep neural network[J]. Future Generation Computer Systems, 2018,86: 1228-1237. |
[17] | ZENG Y , PATHAK P H , MOHAPATRA P ,et al. WiWho:wifi-based person identification in smart spaces[C]// Information Processing in Sensor networks,IPSN. 2016. |
[18] | ZHANG J , WEI B , HU W ,et al. WiFi-ID:human identification using Wi-Fi signal[C]// Distributed Computing in Sensor systems,DCOSS. 2016. |
[19] | KONG H , LU L , YU J ,et al. Finger pass:finger gesture-based continuous user authentication for smart homes using commodity Wi-Fi[C]// International Symposium on Mobile Ad Hoc Networking and Computing,MobiHoc. 2019. |
[20] | LIN F , SONG C , ZHUANG Y ,et al. Cardiac scan:A non-contact and continuous heart-based user authentication system[C]// IEEE International Conference on Mobile Computing and Networking. 2017. |
[21] | CHAUHAN J , SENEVIRATNE S , HU Y ,et al. Breathing-based authentication on resource-constrained IoT devices using recurrent neural networks[J]. IEEE Computer, 2018,51(5): 60-67. |
[22] | ZHANG L , TAN S , YANG J . Hearing your voice is not enough:an articulatory gesture based liveness detection for voice authentication[C]// ACM Conference on Computer and Communications Security,CCS. 2017. |
[23] | OH S , YANG J , BIANCHI A ,et al. Devil in a box:installing backdoors in electronic door locks[C]// Conference on Privacy Security and Trust, 2015: 139-144. |
[24] | ZHAO C , LI Z , LIU T ,et al. RF-Mehndi:a fingertip profiled RF identifier[C]// International Conference on Computer Communications,INFOCOM. 2019. |
[25] | HAN J S , QIAN C , WANG X ,et al. Twins:device-free object tracking using passive tags[C]// International Conference on Computer Communications,INFOCOM. 2014. |
[26] | DING H , HAN J S , QIAN C ,et al. Trio:utilizing tag interference for refined localization of passive RFID[C]// International Conference on Computer Communications,INFOCOM. 2018. |
[27] | LI P , AN Z L , YANG L ,et al. Towards physical-layer vibration sensing with RFIDs[C]// IEEE Conference on Computer Communications,INFOCOM. 2019. |
[1] | Yilong WANG, Zhenyu LI, Daofu GONG, Fenlin LIU. Image double fragile watermarking algorithm based on block neighborhood [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 38-48. |
[2] | Renfeng CHEN, Hongbin ZHU. Research on credit card transaction security supervision based on PU learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 73-78. |
[3] | Guanyun FENG, Cai FU, Jianqiang LYU, Lansheng HAN. Insider threat detection based on operational attention and data augmentation [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 102-112. |
[4] | Genlin XIE, Guozhen CHENG, Yawen WANG, Qingfeng WANG. Software diversity evaluating method based on gadget feature analysis [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 161-173. |
[5] | Peng HOU, Zhixin LI, Fei ZHANG, Xu SUN, Dan CHEN, Yihao CUI, Hanbing ZHANG, Yinan JIN, Hongfeng CHAI. Technology and practice of intelligent governance for financial data security [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 174-187. |
[6] | Min XIAO, Faying MAO, Yonghong HUANG, Yunfei CAO. Anonymous trust management scheme of VANET based on attribute signature [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 33-45. |
[7] | Jianlong XU, Jian LIN, Yusen LI, Zhi XIONG. Distributed user privacy preserving adjustable personalized QoS prediction model for cloud services [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 70-80. |
[8] | Xunxun CHEN, Mingzhe LI, Ning LYU, Liang HUANG. Intrinsic assurance: a systematic approach towards extensible cybersecurity [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 92-102. |
[9] | Jiashuo SONG, Zhenzhen LI, Haiyang DING, Zichen LI. Efficient and fully simulated oblivious transfer protocol on elliptic curve [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 158-166. |
[10] | Fenghua LI, Hui LI, Ben NIU, Weidong QIU. Academic connotation and research trends of privacy computing [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 1-8. |
[11] | Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG. Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 9-19. |
[12] | Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG. Two-party cooperative blind signature based on SM2 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 39-51. |
[13] | Jun LIU, Lin YUAN, Zhishang FENG. Survey of key management schemes for cluster networks [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 52-69. |
[14] | Min XIAO, Tao YAO, Yuanni LIU, Yonghong HUANG. Dynamic and efficient vehicular cloud management scheme with privacy protection [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 70-83. |
[15] | Jiaying LIN, Wenbo ZHOU, Weiming ZHANG, Nenghai YU. Lip forgery detection via spatial-frequency domain combination [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 146-155. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|