Enhancing Network Access Control using Multi-Modal Biometric Authentication Framework

Authors

  • Abdelnasser Mohammed Computer Science Department, Applied College, Northern Border University, Arar, Saudi Arabia | Department of Mathematics and Computer Science, Faculty of Science, Port Said University, Egypt
  • Ahmed Salama Department of Mathematics and Computer Science, Faculty of Science, Port Said University, Egypt
  • Nasser Shebka Computer Science Department, Applied College, Northern Border University, Arar, Saudi Arabia
  • Amr Ismail Department of Mathematics and Computer Science, Faculty of Science, Port Said University, Egypt | Department of Cybersecurity, College of Engineering and Information Technology, Buraydah Private Colleges, Buraydah, Saudi Arabia
Volume: 15 | Issue: 1 | Pages: 20144-20150 | February 2025 | https://doi.org/10.48084/etasr.9554

Abstract

This study presents an innovative multi-modal biometric authentication framework that integrates Deep Learning (DL) techniques with zero-trust architecture principles for enhanced network access control. The framework employs a three-tier fusion strategy (feature-level, score-level, and decision-level) incorporating facial, fingerprint, and iris recognition modalities. The system architecture implements a sophisticated multi-layered approach utilizing the ResNet-50 based Convolutional Neural Network (CNN) architecture for facial recognition, CNN-based minutiae extraction for fingerprint processing, and 2D Gabor wavelets with DL-based feature extraction for iris analysis. The experimental validation using established datasets, namely Labeled Faces in the Wild (LFW), CelebA, FVC2004, NIST SD14, CASIA Iris V4, and UBIRIS v2, demonstrates exceptional performance with 99.47% authentication accuracy, 0.02% False Acceptance Rate (FAR), and 0.15% False Rejection Rate (FRR). The framework resulted in a 68% reduction in fraudulent access attempts. It achieved a mean authentication time of 235 ms (SD=28 ms), representing a 45% improvement over traditional systems. The resource efficiency analysis showed significant reductions in system overhead: 32% in CPU utilization, 28% in memory consumption, and 45% in network bandwidth requirements. The scalability testing confirmed a linear performance scaling up to 100,000 concurrent authentication requests. The statistical test of significance through t-test confirmed the framework's significant improvements over existing solutions (p-value<0.001). This study establishes an effective framework to address network access control challenges across various sectors, particularly in high-security environments requiring robust authentication mechanisms.

Keywords:

biometric authentication, deep learning, zero-trust architecture, multi-modal fusion, network security

Downloads

Download data is not yet available.

References

S. Ahmadi, "Zero Trust Architecture in Cloud Networks: Application, Challenges and Future Opportunities," Journal of Engineering Research and Reports, vol. 26, no. 2, pp. 215–228, Feb. 2024.

N. Nahar, K. Andersson, O. Schelén, and S. Saguna, "A Survey on Zero Trust Architecture: Applications and Challenges of 6G Networks," IEEE Access, vol. 12, pp. 94753–94764, 2024.

A. Roy, A. Dhar, and S. S. Tinny, "Strengthening IoT Cybersecurity with Zero Trust Architecture: A Comprehensive Review," Journal of Computer Science and Information Technology, vol. 1, no. 1, pp. 25–50, Sep. 2024.

K. Ramezanpour and J. Jagannath, "Intelligent zero trust architecture for 5G/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN," Computer Networks, vol. 217, Nov. 2022, Art. no. 109358.

H. Joshi, "Emerging Technologies Driving Zero Trust Maturity Across Industries," IEEE Open Journal of the Computer Society, pp. 1–12, Nov. 2024.

K. Patil, B. Desai, I. Mehta, and A. Patil, "A Contemporary Approach: Zero Trust Architecture for Cloud-Based Fintech Services," Innovative Computer Sciences Journal, vol. 9, no. 1, Nov. 2023.

M. A. Azad, S. Abdullah, J. Arshad, H. Lallie, and Y. H. Ahmed, "Verify and trust: A multidimensional survey of zero-trust security in the age of IoT," Internet of Things, vol. 27, Oct. 2024, Art. no. 101227.

P. Phiayura and S. Teerakanok, "A Comprehensive Framework for Migrating to Zero Trust Architecture," IEEE Access, vol. 11, pp. 19487–19511, 2023.

S. C. Llobregat, "Design of a Data Analysis Platform as a Multitenant Service in the Cloud: An Approach towards Scalability and Adaptability," M.S thesis, Dept. of Computer Systems and Computation, Technical University of Valencia, Spain, 2024.

S. Dargan and M. Kumar, "A comprehensive survey on the biometric recognition systems based on physiological and behavioral modalities," Expert Systems with Applications, vol. 143, Apr. 2020, Art. no. 113114.

L. Luo, P. Li, and X. Yan, "Deep Learning-Based Building Extraction from Remote Sensing Images: A Comprehensive Review," Energies, vol. 14, no. 23, Dec. 2021, Art. no. 7982.

H. Purohit and P. K. Ajmera, "Optimal feature level fusion for secured human authentication in multimodal biometric system," Machine Vision and Applications, vol. 32, no. 1, Jan. 2021, Art. no. 24.

P. Raj, S. Vanga, and A. Chaudhary, Cloud-native Computing: How to Design, Develop, and Secure Microservices and Event-Driven Applications, Hoboken, NJ, USA: John Wiley & Sons, 2022.

U. Sumalatha, K. K. Prakasha, S. Prabhu, and V. C. Nayak, "A Comprehensive Review of Unimodal and Multimodal Fingerprint Biometric Authentication Systems: Fusion, Attacks, and Template Protection," IEEE Access, vol. 12, pp. 64300–64334, 2024.

N. Bala, R. Gupta, and A. Kumar, "Multimodal biometric system based on fusion techniques: a review," Information Security Journal: A Global Perspective, vol. 31, no. 3, pp. 289–337, May 2022.

S. Tiwari, R. Raja, R. S. Wadawadagi, K. Naithani, H. Raja, and D. Ingle, "Emerging Biometric Modalities and Integration Challenges," in Online Identity - An Essential Guide, R. Raja and A. K. Dewangan, Eds. London, UK: IntechOpen, 2024, ch. 4.

R. Fabré Solà, "Edge AI on a Deep-Learning based Real-Time Face Identification and Attributes Recognition System," M.S. thesis, Polytechnic University of Catalonia, Barcelona, Spain, 2022.

S. Chopparapu and J. B. Seventline, "An Efficient Multi-modal Facial Gesture-based Ensemble Classification and Reaction to Sound Framework for Large Video Sequences," Engineering, Technology & Applied Science Research, vol. 13, no. 4, pp. 11263–11270, Aug. 2023.

Y. Yin, S. He, R. Zhang, H. Chang, X. Han, and J. Zhang, "Deep Learning for Iris Recognition: A Review." arXiv, Mar. 15, 2023.

A. O. Aljahdali, A. Habibullah, and H. Aljohani, "Efficient and Secure Access Control for IoT-based Environmental Monitoring," Engineering, Technology & Applied Science Research, vol. 13, no. 5, pp. 11807–11815, Oct. 2023.

G. B. Huang, M. Mattar, T. Berg, and E. Learned-Miller, "Labeled Faces in the Wild: A Database for Studying Face Recognition in Unconstrained Environments," in Workshop on Faces in "Real-Life" Images: Detection, Alignment, and Recognition, Marseille, France, 2008.

Z. Liu, P. Luo, X. Wang, and X. Tang, "Deep Learning Face Attributes in the Wild," in 2015 IEEE International Conference on Computer Vision, Santiago, Chile, 2015, pp. 3730–3738.

D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain, "FVC2004: Third Fingerprint Verification Competition," in Proceedings of 1st International Conference on Biometric Authentication, Hong Kong, China, 2004, pp. 1–7.

C. I. Watson, "NIST Special Database 14 Mated Fingerprint Cards Pairs 2 Version 2." [Online]. Available: https://www.nist.gov/system/files/documents/srd/Spec-db-14.pdf.

L. Omelina, J. Goga, J. Pavlovicova, M. Oravec, and B. Jansen, "A survey of iris datasets," Image and Vision Computing, vol. 108, Apr. 2021, Art. no. 104109.

M. R. Sumi, P. Das, A. Hossain, S. Dey, and S. Schuckers, "A Comprehensive Evaluation of Iris Segmentation on Benchmarking Datasets," Sensors, vol. 24, no. 21, Nov. 2024, Art. no. 7079.

M. S. A. Razak, S. P. A. Gothandapani, N. Kamal, and K. Chellappan, "Presenting the Secure Collapsible Makerspace with Biometric Authentication," Engineering, Technology & Applied Science Research, vol. 14, no. 1, pp. 12880–12886, Feb. 2024.

L. Mohammadpour, T. C. Ling, C. S. Liew, and A. Aryanfar, "A Survey of CNN-Based Network Intrusion Detection," Applied Sciences, vol. 12, no. 16, Aug. 2022, Art. no. 8162.

B. Pal, S. Mahajan, and S. Jain, "A Comparative Study of Traditional Image Fusion Techniques with a Novel Hybrid Method," in 2020 International Conference on Computational Performance Evaluation, Shillong, India, 2020, pp. 820–825.

S. Mai, Y. Zeng, and H. Hu, "Multimodal Information Bottleneck: Learning Minimal Sufficient Unimodal and Multimodal Representations," IEEE Transactions on Multimedia, vol. 25, pp. 4121–4134, 2023.

A. Hattab and A. Behloul, "Face-Iris multimodal biometric recognition system based on deep learning," Multimedia Tools and Applications, vol. 83, no. 14, pp. 43349–43376, Apr. 2024.

A. K. Yadav and T. Srinivasulu, "Fusion of Multimodal Biometrics of Fingerprint, Iris and Hand Written Signatures Traits using Deep Learning Technique," Turkish Journal of Computer and Mathematics Education, vol. 12, no. 11, pp. 1627–1638, May 2021.

N. Alay and H. H. Al-Baity, "Deep Learning Approach for Multimodal Biometric Recognition System Based on Fusion of Iris, Face, and Finger Vein Traits," Sensors, vol. 20, no. 19, Oct. 2020, Art. no. 5523.

Downloads

How to Cite

[1]
Mohammed, A., Salama, A., Shebka, N. and Ismail, A. 2025. Enhancing Network Access Control using Multi-Modal Biometric Authentication Framework. Engineering, Technology & Applied Science Research. 15, 1 (Feb. 2025), 20144–20150. DOI:https://doi.org/10.48084/etasr.9554.

Metrics

Abstract Views: 136
PDF Downloads: 118

Metrics Information

Most read articles by the same author(s)