Journal of Machine and Computing


An Improvised Finger Vein Patterns Attribute Based Recommendation Technique for Remote Authentication Using Key Value Distribution



Journal of Machine and Computing

Received On : 02 April 2025

Revised On : 16 June 2025

Accepted On : 18 July 2025

Published On : 05 October 2025

Volume 05, Issue 04

Pages : 2150-2159


Abstract


Authentication and remote validation is a challenging task, the process of authentication via finger vein values is a challenging task for IoT values customization. In this paper, we have developed an improvised Attribute Based Recommendation (ABR) technique for extracting the finger vein attributes and processing via IoT administrator gateway for processing and mapping the key attributes of dynamically collected finger veins. Based on the recommendation, the attributes correlation is extracted and key value pattern is generated with synchronization from user backend via secure channel. The end user further extracts the attribute key values and encodes the authentication from access via remote authentication. The proposed technique has secured an accuracy of 97% under open channel IoT authentication and 94% in a closed channel communication.


Keywords


Remote IoT Authentication, Finger Vein Pattern Extraction, IoT, Key Value Encoding, Attribute Recommendation.


  1. M. Azrour, J. Mabrouki, A. Guezzaz, and Y. Farhaoui, “New enhanced authentication protocol for Internet of Things,” Big Data Mining and Analytics, vol. 4, no. 1, pp. 1–9, Mar. 2021, doi: 10.26599/bdma.2020.9020010.
  2. P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, “Two-phase authentication protocol for wireless sensor networks in distributed IoT applications,” 2014 IEEE Wireless Communications and Networking Conference (WCNC), pp. 2728–2733, Apr. 2014, doi: 10.1109/wcnc.2014.6952860.
  3. M. A. Ferrag, L. A. Maglaras, H. Janicke, J. Jiang, and L. Shu, “Authentication Protocols for Internet of Things: A Comprehensive Survey,” Security and Communication Networks, vol. 2017, pp. 1–41, 2017, doi: 10.1155/2017/6562953.
  4. A. K. Agrahari, S. Varma, and S. Venkatesan, “Two factor authentication protocol for IoT based healthcare monitoring system,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, no. 12, pp. 16081–16098, Apr. 2022, doi: 10.1007/s12652-022-03834-9.
  5. M. A. Mobarhan and M. Salamah, “REPS-AKA5: A robust group-based authentication protocol for IoT applications in LTE system,” Internet of Things, vol. 22, p. 100700, Jul. 2023, doi: 10.1016/j.iot.2023.100700.
  6. R. Vinoth and L. J. Deborah, “An efficient key agreement and authentication protocol for secure communication in industrial IoT applications,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, no. 3, pp. 1431–1443, Apr. 2021, doi: 10.1007/s12652-021-03167-z.
  7. K. Alhusayni, R. Wazirali, M. AlAkhras, M. Almasri, and S. Alhazmi, “A Multi-Stage Secure IoT Authentication Protocol,” Computer Systems Science and Engineering, vol. 45, no. 1, pp. 459–481, 2023, doi: 10.32604/csse.2023.028536.
  8. Z. Chen et al., “FSMFA: Efficient firmware-secure multi-factor authentication protocol for IoT devices,” Internet of Things, vol. 21, p. 100685, Apr. 2023, doi: 10.1016/j.iot.2023.100685.
  9. X. Li, S. Liu, S. Kumari, and C.-M. Chen, “PSAP-WSN: A Provably Secure Authentication Protocol for 5G-Based Wireless Sensor Networks,” Computer Modeling in Engineering & Sciences, vol. 135, no. 1, pp. 711–732, 2023, doi: 10.32604/cmes.2022.022667.
  10. Z. A.-A. Mohammad Fneish, M. El-Hajj, and K. Samrouth, “Survey on IoT Multi-Factor Authentication Protocols: A Systematic Literature Review,” 2023 11th International Symposium on Digital Forensics and Security (ISDFS), pp. 1–7, May 2023, doi: 10.1109/isdfs58141.2023.10131870.
  11. H. Yang, P. Fang, and Z. Hao, “A GAN-based Method for Generating Finger Vein Dataset,” 2020 3rd International Conference on Algorithms, Computing and Artificial Intelligence, pp. 1–6, Dec. 2020, doi: 10.1145/3446132.3446150.

CRediT Author Statement


The authors confirm contribution to the paper as follows:

Conceptualization: Sujani G and Sreerama Reddy GM; Methodology: Sujani G; Writing- Original Draft Preparation: Sreerama Reddy GM; Visualization: Sujani G; Investigation: Sujani G and Sreerama Reddy GM; Supervision: Sreerama Reddy GM; Validation: Sujani G; Writing- Reviewing and Editing: Sujani G and Sreerama Reddy GM; All authors reviewed the results and approved the final version of the manuscript.


Acknowledgements


Author(s) thanks to Dr. Sreerama Reddy GM for this research completion and support.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Sujani G and Sreerama Reddy GM, “An Improvised Finger Vein Patterns Attribute Based Recommendation Technique for Remote Authentication Using Key Value Distribution”, Journal of Machine and Computing, vol.5, no.4, pp. 2150-2159, October 2025, doi: 10.53759/7669/jmc202505166.


Copyright


© 2025 Sujani G and Sreerama Reddy GM. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.