Fusion of biometrics and blockchain - an integrated platform for aviation security and authentication

被引:0
作者
Malek, Obaidul [1 ]
Ahmed, Munir [1 ]
Matin, Mohammad [2 ]
Islam, Zaherul [1 ]
机构
[1] CyberDash CryptoMetr LLC, Aldie, VA 20105 USA
[2] Univ Denver, Dept Elect & Comp Engn, Denver, CO 80208 USA
来源
DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES VI | 2022年 / 12117卷
关键词
blockchain; cryptography; encryption; biometrics; aviation; cybersecurity; confidentiality; integrity; availability; authentication; fusion;
D O I
10.1117/12.2624966
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Aviation fundamentally depends on well structured and rigorous record keeping frameworks. The demand for accurate data is continuously increasing for both operational and security processes, particularly in civil aviation. The principal challenge for civil aviation is protecting and sharing sensitive information, while guarding itself against the identity of illegitimate users. The emergence of blockchain and biometrics has given rise to a new direction of technological innovation, which has potential to solve the challenges fundamentally affecting the aviation sector. The proposed algorithm is designed to extract multimodal physiological biometrics, fusion with cryptographic hash to create 1024-bit (256 hex) hash in blockchain vector subspace. The primary challenge of this research is to incorporate biometrics attributes within a blockchain hash function, making data available to all authorized aviation entities, and protecting sensitive PII Information against privacy, security, and unlinkability attacks. Blockchain and biometric systems provide security measures on their own. In conjunction with asymmetric encryption, the data becomes more secure when live human physiological attributes are required to unlock a secret key, as it will be incorporated with every transaction of civil aviation. The stochastic model will provide variabilities in the estimation of unique cipher key. Biometrics is the only part of the process of encrypting data which ensures unique digital identity with the presence of live users. On the other side, the time and difficulty of guessing a secret key along with global accessibility of universal data set in real time, are what makes the proposed model the most robust and cryptographically secure, integrated cybersecurity platform.
引用
收藏
页数:11
相关论文
共 10 条
  • [1] Acquista A., 2020, J AIR LAW COMMERCE S, V85
  • [2] AIQ, PASS EXP WHY IS IT I
  • [3] Aleshi A., 2019, 2019 IEEE INT S TECH, P1, DOI DOI 10.1109/HST47167.2019.9032943
  • [4] Gheorghe P., 2020, ROMANIAN CYBER SECUR, V2
  • [5] IATA, 2018, CISC VIS NETW IND GL
  • [6] Biometrics in Cyber Security
    Kour, Jaspreet
    Hanmandlu, M.
    Ansari, A. Q.
    [J]. DEFENCE SCIENCE JOURNAL, 2016, 66 (06) : 600 - 604
  • [7] Malek O., 2014, ELSEVIER NEUROCOMPUT, V148, P294
  • [8] Teodorovi S., 2016, NBPNauka Bezb. Polic, V21, P139, DOI [10.5937/nbp1602139T, DOI 10.5937/NBP1602139T]
  • [9] Yaga D., NISTIR 8202 BLOCKCHA, DOI [10.6028/NIST.IR.8202:BlockchainTechnologyOverview(arxiv.org, DOI 10.6028/NIST.IR.8202:BLOCKCHAINTECHNOLOGYOVERVIEW(ARXIV.ORG]
  • [10] An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends
    Zheng, Zibin
    Xie, Shaoan
    Dai, Hongning
    Chen, Xiangping
    Wang, Huaimin
    [J]. 2017 IEEE 6TH INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS 2017), 2017, : 557 - 564