IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cryptomodules in Wireless Networks Using Biometric Authentication: Securing Nodes in Wireless Networks

Cryptomodules in Wireless Networks Using Biometric Authentication: Securing Nodes in Wireless Networks
View Sample PDF
Author(s): Martin Drahanský (Brno University of Technology, Czech Republic), Petr Hanáček (Brno University of Technology, Czech Republic), František Zbořil (Brno University of Technology, Czech Republic), Martin Henzl (Brno University of Technology, Czech Republic), František V. Zbořil (Brno University of Technology, Czech Republic), Jaegeol Yim (Dongguk University at Gyeongju Gyeongbuk, South Korea) and Kyubark Shim (Dongguk University at Gyeongju Gyeongbuk, South Korea)
Copyright: 2016
Pages: 29
Source title: Improving Information Security Practices through Computational Intelligence
Source Author(s)/Editor(s): Wasan Awad (Ahlia University, Bahrain), El Sayed M. El-Alfy (King Fahd University of Petroleum and Minerals, Saudi Arabia) and Yousif Al-Bastaki (University of Bahrain, Bahrain)
DOI: 10.4018/978-1-4666-9426-2.ch008

Purchase

View Cryptomodules in Wireless Networks Using Biometric Authentication: Securing Nodes in Wireless Networks on the publisher's website for pricing and purchasing information.

Abstract

This chapter shows how cryptomodules can increase security of wireless sensor network and possibilities of biometric authentication against a node or the whole network. For secure operation of a wireless sensor network, security objectives such as confidentiality, integrity, and authentication must be implemented. These security objectives typically employ cryptography, therefore sensor nodes should be able to compute cryptographic algorithms and provide secure tamper-resistant storage for cryptographic keys. Use of dedicated secure hardware for this purpose and security threats are discussed. Two scenarios where the biometric authentication would be appreciated are introduced – smart home and storehouse with medicaments. Biometric generation of cryptographic keys, biometric authentication in wireless network and possible attacks on biometrics are presented. When designing and verifying communication protocols using informal techniques, some security errors may remain undetected. Formal verification methods that provide a systematic way of finding protocol flaws are discussed.

Related Content

P. Subashini, M. Krishnaveni, T. T. Dhivyaprabha, R. Shanmugavalli. © 2020. 22 pages.
Thiyagarajan P.. © 2020. 19 pages.
Thangavel M., Abiramie Shree T. G. R., Priyadharshini P., Saranya T.. © 2020. 22 pages.
Sailesh Suryanarayan Iyer, Sridaran Rajagopal. © 2020. 19 pages.
Charu Virmani, Tanu Choudhary, Anuradha Pillai, Manisha Rani. © 2020. 21 pages.
Valliammal Narayan, Barani Shaju. © 2020. 28 pages.
Vaishnavi Ambalavanan, Shanthi Bala P.. © 2020. 18 pages.
Body Bottom