• Title/Summary/Keyword: Biometric

Search Result 763, Processing Time 0.032 seconds

A Biometric-based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks

  • Chen, Ying;Ge, Yangming;Wang, Wenyuan;Yang, Fengyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1779-1798
    • /
    • 2018
  • Heterogeneous wireless sensor networks (HEWSN) is a kind of wireless sensor networks (WSN), each sensor may has different attributes, HEWSN has been widely used in many aspects. Due to sensors are deployed in unattended environments and its resource constrained feature, the design of security and efficiency balanced authentication scheme for HEWSN becomes a vital challenge. In this paper, we propose a secure and lightweight user authentication and key agreement scheme based on biometric for HEWSN. Firstly, fuzzy extractor is adopted to handle the user's biometric information. Secondly, we achieve mutual authentication and key agreement among three entities, which are user, gateway and cluster head in the four phases. Finally, formal security analysis shows that the proposed scheme defends against various security pitfalls. Additionally, comparison results with other surviving relevant schemes show that our scheme is more efficient in term of computational cost, communication cost and estimated time. Therefore, the proposed scheme is well suitable for practical application in HEWSN.

Personal Biometric Identification based on ECG Features (ECG 특징추출 기반 개인 바이오 인식)

  • Yoon, Seok-Joo;Kim, Gwang-Jun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.4
    • /
    • pp.521-526
    • /
    • 2015
  • Research on how to use the biological characteristics of human to confirm the identity of the individual is being actively conducted. Electrocardiogram(: ECG) based biometric system is difficult to counterfeit and does not cause skin irritation on the subject. It can be easily combined with conventional biometrics such as fingerprint and face recognition to give multimodal biometric systems. In this thesis, biometric identification method analysing ECG waveform characteristics from Discrete Wavelet Transform(DWT) coefficients is suggested. Feature selection is performed on the 9 coefficients of DWT using the correlation analysis. The verification is achieved by using the error back propagation neural networks. Using the proposed approach on 24 subjects of MIT-BIH QT Database, 98.88% verification rate has been obtained.

Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations

  • Bui, Quy-Anh;Lee, Wei-Bin;Lee, Jung-San;Wu, Hsiao-Ling;Liu, Jo-Yun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.437-454
    • /
    • 2020
  • According to the privacy regulations of the health insurance portability and accountability act (HIPAA), patients' control over electronic health data is one of the major concern issues. Currently, remote access authorization is considered as the best solution to guarantee the patients' control over their health data. In this paper, a new biometric-based key management scheme is proposed to facilitate remote access authorization anytime and anywhere. First, patients and doctors can use their biometric information to verify the authenticity of communication partners through real-time video communication technology. Second, a safety channel is provided in delivering their access authorization and secret data between patient and doctor. In the designed scheme, the user's public key is authenticated by the corresponding biometric information without the help of public key infrastructure (PKI). Therefore, our proposed scheme does not have the costs of certificate storage, certificate delivery, and certificate revocation. In addition, the implementation time of our proposed system can be significantly reduced.

Integration of PKI and Fingerprint for User Authentication

  • Shin, Sam-Bum;Kim, Chang-Su;Chung, Yong-Wha
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1655-1662
    • /
    • 2007
  • Although the PKl-based user authentication solution has been widely used, the security of it can be deteriorated by a simple password. This is because a long and random private key may be protected by a short and easy-to-remember password. To handle this problem, many biometric-based user authentication solutions have been proposed. However, protecting biometric data is another research issue because the compromise of the biometric data will be permanent. In this paper, we present an implementation to improve the security of the typical PKI-based authentication by protecting the private key with a fingerprint. Compared to the unilateral authentication provided by the typical biometric-based authentication, the proposed solution can provide the mutual authentication. In addition to the increased security, this solution can alleviate the privacy issue of the fingerprint data by conglomerating the fingerprint data with the private key and storing the conglomerated data in a user-carry device such as a smart card. With a 32-bit ARM7-based smart card and a Pentium 4 PC, the proposed fingerprint-based PKI authentication can be executed within 1.3second.

  • PDF

A Secure Medical Information Management System for Wireless Body Area Networks

  • Liu, Xiyao;Zhu, Yuesheng;Ge, Yu;Wu, Dajun;Zou, Beiji
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.221-237
    • /
    • 2016
  • The wireless body area networks (WBANs) consist of wearable computing devices and can support various healthcare-related applications. There exist two crucial issues when WBANs are utilized for healthcare applications. One is the protection of the sensitive biometric data transmitted over the insecure wireless channels. The other is the design of effective medical management mechanisms. In this paper, a secure medical information management system is proposed and implemented on a TinyOS-based WBAN test bed to simultaneously address these two issues. In this system, the electronic medical record (EMR) is bound to the biometric data with a novel fragile zero-watermarking scheme based on the modified visual secret sharing (MVSS). In this manner, the EMR can be utilized not only for medical management but also for data integrity checking. Additionally, both the biometric data and the EMR are encrypted, and the EMR is further protected by the MVSS. Our analysis and experimental results demonstrate that the proposed system not only protects the confidentialities of both the biometric data and the EMR but also offers reliable patient information authentication, explicit healthcare operation verification and undeniable doctor liability identification for WBANs.

Performance Evaluation of Multimodal Biometric System for Normalization Methods and Classifiers (균등화 및 분류기에 따른 다중 생체 인식 시스템의 성능 평가)

  • Go, Hyoun-Ju;Woo, Na-Young;Shin, Yong-Nyuo;Kim, Jae-Sung;Kim, Hak-Il;Chun, Myung-Geun
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.4
    • /
    • pp.377-388
    • /
    • 2007
  • In this paper, we propose a multi-modal biometric system based on face, iris and fingerprint recognition system. To effectively aggregate two systems, we use statistical distribution models based on matching values for genuine and impostor, respectively. And then, We performed reveal fusion algorithms including weighted summation, Support Vector Machine(SVM), Fisher discriminant analysis, Bayesian classifier. From the various experiments, we found that the performance of multi-modal biometric system was influenced with the normalization methods and classifiers.

Biometric technology comparison analysis for the security reinforcement of the ATM (ATM 보안 강화를 위한 생체인식기술 분석)

  • Kwon, Yong-Kwan;Cha, Jae-Sang
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.1
    • /
    • pp.16-20
    • /
    • 2016
  • In this paper, we analyze the characteristics and ATM applications for fingerprint, iris, vein recognition technology that can be applied to the ATM to reinforce security. Describe the important requirements to be considered when introducing a biometric authentication in the ATM, and were compared to each biometric authentication scheme based on these requirements. Fingerprint authentication has limitations in accuracy, iris recognition is a big weakness in user convenience, whereas vein recognition has the advantage of being hygienic, yet excellent accuracy and secrecy. Vein authentication approach is expected to be expanded to apply to ATM due to the many advantages.

The implementation of Biometric System using RF-ID (RF(RF-ID)을 이용한 Biometric System 구현에 관한 연구)

  • 김광환;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.626-629
    • /
    • 2003
  • In this paper, a system that implementation of Biometric System Using RF-ID. We organize a certification system which the security is strengthened, the information is flowed out and the presentation will do the possibility not to be abused. The loss of the credit card and problems which there is many of forgery back are happening. To solve such problems, We organized the system to use after we stored a fingerprint data at RF Card and going through certification necessary formalities. Various research to be related uses this system and is predicted. The development to common use goods will be possible through a certification procedure.

  • PDF

Fuzzy identity-based signature scheme from lattice and its application in biometric authentication

  • Zhang, Xiaojun;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2762-2777
    • /
    • 2017
  • A fuzzy identity based signature (FIBS) scheme allows a signer with identity ${\omega}$ to generate a signature which could be verified under identity ${\omega}^{\prime}$ if and only if ${\omega}$ and ${\omega}^{\prime}$ are within a certain distance of each other as judged by some metric. In this paper, we propose an efficient FIBS scheme from lattice assumption, which can resist quantum-computer attacks. Without using the Bonsai Tree technique, we utilize the lattice basis delegation technique to generate the private key, which has the advantage of keeping the lattice dimension invariant. We also prove that our proposed scheme is existentially unforgeable under an adaptive chosen message and identity attack in the random oracle model. Compared with existing scheme, our proposed scheme is much more efficient, especially in terms of communication overhead. Since our FIBS scheme possesses similar error-tolerance property, it can be well applied in post-quantum communication biometric authentication environments, where biometric identifiers such as fingerprints, voice, iris and gait are used in human identification.

An Implementation of User Identification System Using Hrbrid Biomitic Distances (복합 생체 척도 거리를 이용한 사용자 인증시스템의 구현)

  • 주동현;김두영
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.3 no.2
    • /
    • pp.23-29
    • /
    • 2002
  • In this paper we proposed the user identification system using hybrid biometric information and non-contact IC card to improve the accuracy of the system. The hybrid biometric information consists of the face image, the iris image, and the 4-digit voice password of user. And the non-contact IC card provides the base information of user If the distance between the sample hybrid biometric Information corresponding to the base information of user and the measured biometric information is less than the given threshold value, the identification is accepted. Otherwise it is rejected. Through the result of experimentation, this paper shows that the proposed method has better identification rate than the conventional identification method.

  • PDF