Possession250.pp.com

250.pp.com  时间:2021-03-22  阅读:()
ScientificResearchJournal(SCIRJ),Volume2,Issue1,January201443ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalImprovingtheSecurityofMANETsOrientedMilitaryIntelligenceusingBiometricsAuthenticationTechnologiesJuliusN.
Obidinnu1(obijulius@yahoo.
com)AyeiE.
Ibor2(ayei.
ibor@gmail.
com)S.
O.
O.
Duke3(orokduke2003@yahoo.
com)1,2,3:DepartmentofComputerScience,CrossRiverUniversityofTechnology,Calabar,NigeriaAbstract-Inmanypartsoftheworld,themilitaryhasbeenverybusyinrecenttimesengaginginterrorandotherrelatedwars.
Thisrequiresthatmenandmaterialshavetobelocatedindifferentpartsoftheirstrategicgeographiccentres.
Andinordertoensureafastcommunicationwiththesebases,themilitaryoftendeploysMobileAd-hocNetworks(MANETs).
MANETscarrysuchintelligenceinformationas:deploymentinformation,readinessinformation,andorderofbattleplanstotheirvariousbases.
Thenatureoftheseinformationissuchthatanycompromiseonthemcouldbedisastroustothecoursesofactionofthebases.
ThispaperidentifiesuserauthenticationasakeyissueinstrengtheningsecurityconcernsinMANETs.
Thepaperfurtheradoptsbiometricstechnologiesasthetrendingoptionsforthepurposeofobtainingatruerreflectionoftheidentitiesoftheusersofad-hocnetworks.
Thispapertherefore,reviewsvariousbiometricstechnologyimplementationstrategiesavailable,andrecommendstheadoptionofone,oracombinationofthembymilitarybases.
Thebenefitsprovidedbythistechnologyarealsopresented.
IndexTerms-MilitaryBase,BiometricsTechnology,Authentication,MANET,InformationsecurityI.
INTRODUCTIONMostmilitarybasesrequiretheuseofMobileAd-hocNetworks(MANETs)toestablishcommunicationsbetweenthelargenumbersofmobiledevicesdeployedinthebattlefield[17].
Itistherefore,instructivetostatethatthecomputersystemsinmilitaryMANETscontainsensitiveinformation,whichoftenmakesthemattractivetargetstounauthorisedaccesses.
Tittel,ChappleandStewartin[21]providealistofsomeofthesensitiveinformation,whichalsoincludesmilitarydescriptiveintelligencesuchas:deploymentinformation,readinessinformation,andorderofbattleplans.
Illegalaccesstotheseclassesofmilitaryintelligencecouldcompromiseinvestigations,disruptmilitaryplanning,andthreatennationalsecurity.
Atalltimestherefore,itiscrucialthatthecomputersystemsinmilitaryMANETsshouldbeprotectedfromintruders.
Consequently,thispaperreviewsoneofthecriticalsecurityprotectionstepsthatensuresthatonlyauthorisedpersonnelgainaccesstothesystemsinthemilitaryMANETs.
Consequently,weadoptthepositionof[15],whoidentifiesuserauthenticationasoneofthekeyissuesinmanagingsecurityconcernsinMANETs.
Andintheopinionofthereferredauthor,accesstoad-hocnetworksisdynamicandcontext-sensitive,therebymakingusers'authenticationtobeontheflywithtemporaryaccesstoresources.
Accordingly,informationleakageonmilitaryintelligencecouldoccurintheprocess.
Theseinformationleakagescanbeavoided.
Therefore,[16]advocatesthattheexactidentitiesoftheusersofthead-hocnetworks'shouldbeaccuratelyverifiableatanyinstanceofitsusage.
Theadvocacyintheprecedingparagraphservesasthemotivationforthispaper,whichreviewsexistingauthenticationprocesses,andidentifiesthebiometricstechnologiesasthetrendingoptionsforthepurposeofobtainingatruerreflectionoftheidentitiesoftheusersofad-hocnetworks.
Thispapertherefore,reviewsvariousbiometricstechnologyimplementationstrategiesavailable,andrecommendstheadoptionofoneoracombinationofthembymilitarybases.
II.
IMPORTANCEOFAUTHENTICATIONINMILITARYMANETsWikipediain[22]definesamobilead-hocnetwork(MANET)asawireless,self-configuring,infrastructure-lessnetworkofmobiledevices,deployedoftentimesforaninterimpurpose.
Andtheyareimportanttothemilitarybecausetheypossessthefeaturesofquicksetup,takedown,andmobilityfeatures.
MANETsaretherefore,especiallyusefultothemilitary,sincetheyserveaschannelsthroughwhichtheycommunicateinordertostrategize,command,control,andoperatetheirforcesintheirrespectiveenvironments,inland,sea,orair[20].
However,communicationswithinMANETrequireshavinglegalaccesstothedevices,asanythingtothecontrarywillleadtoinformationleakageonmilitaryintelligencetotheopponents.
Andavailabilityofmilitaryintelligenceinthehandsofanenemyisabadomenforsuchamilitarybase.
Consequently,itbecomesnecessarytoensurethattheidentityofapersonordevicethatattemptstogainaccesstothenetworkshouldbeauthenticated.
Itistherefore,inlinewiththispositionthat[20]identifiesauthenticationasthefirstlineofdefenceinsecuringMANETnetworks.
Authenticationisanyprocessbywhichasystemverifiestheidentityofauserwhowishestoaccessit[6].
AuthenticationisimportantinMANETs,asitensuressecureconnectionswitharequestingentityintoanetwork[2].
AndauthenticationinScientificResearchJournal(SCIRJ),Volume2,Issue1,January201444ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalMANETscanbebasedondifferentmechanisms.
Wediscussthesemechanismsinthenextsection.
III.
AUTHENTICATIONMECHANISMSAllowingaccesstoonlyauthorisedusersanddisallowingaccesstotheunauthorisedonesisafundamentalaspectofauthentication.
Authenticationprocessesarebasedlargelyonthreemethods.
Thesemethodsinclude:Whatweknow–passwords,pincodesandotherpersonaldetailscanbeusedtoidentifyusersofaparticularsystemWhatwehave–tokenssuchassmartcardsorkeyfobarealsousedforuserauthenticationWhatweare–here,biometricfeaturessuchasfingerprintscans,irisscans,palmbiometricsaredeployedforallowingaccesstocontrolledenvironments[23],[17],[16]and[12].
Authenticationby'whatweknow'and'whatwehave'increasesthelikelihoodofidentitytheftastheuseofpasswordsortokensisnotnecessarilytiedtotheidentityoftherealownerofthepasswordortoken[5].
Inhisstudy,[17]highlightsthatthereareconsequencesattributedtosettingupcommunicationwithauserthathasanunknownidentity.
Aknowledgefactorsuchasapasswordisnotentirelysecureasitcanbeeasilyguessed,interceptedortransferredtoanotheruser[23].
IntheeventofUserAdivulginghisauthenticationparametersuchasapasswordtoUserBintentionallyoraccidentally,itwillbedifficulttocapturetheidentityoftheloggedinuser.
Moreso,simplepasswordscanbeeasilyguessedorcrackedthroughbruteforceordictionaryattackswhilecomplexonescaneasilybeforgotten.
Thoughtherearevariousmechanismstoprotectpasswordssuchasresettingthemregularlyorusingpasswordshints,authenticationwiththeuseofpasswordsisfastbecomingproblematicduetothesophisticatednatureoftechnologyandthepervasiveInternetthatallowsaccesstoallcategoriesofinformation,someofwhichhavefarreachingimpactondigitalassets[3].
NandiniandRaviKumarin[14]describe'whatusershave'asknowledgebasedauthenticationalsocalledpossessionfactors.
Possessionfactorshavefoundwidespreadusageinrecenttimes,astheyhaveaddedanotherlevelofsecuritytoauthentication.
Mostof'whatusershave'technologiesarebasedonatwofactorauthenticationmechanism,withPINsorpasswordsassecondaryauthenticationfeatures.
Usingasmartcardorkeyfob,forinstance,isagreatwaytoenhanceprivacy.
Mostofthesmartcardshavetheuser'sinformationengravedinthemwithpeculiarattributesthatmapstheidentityoftheusertothecard.
Thoughthiscreatesasenseofsecurityforthenumeroususersacrosstheglobe,theuseoftokensissubjecttoreplayandactiveattacks[13],[25].
However,possessionfactorscanbelost,stolenordamaged[12].
Insuchasituation,replacingthemisnecessary.
Butthereisthepossibilityofusingthemtocommitcrimebeforetheycanberetrieved.
Thiscancreateproblemsfortheowner.
Sinceacardownermayhavehisnameengravedonacard,usingitbyamalicioususer,iflost,willstillrecordatransactionagainstthecardowner.
Thisisaserioussecurityconcern.
Letusassumethatasmartcardthatgrantsaccesstoamilitarydatabasefallsintothehandsofanenemysoldierorgroupofsoldiers.
Inthesamevein,letusassumethatthiscardbelongstoasystemadministratorthathasrootorsystemprivilegesinacontrolledsystem.
Thestatedscenariocanleadtosevereconsequencesincludingdivulgenceofmilitaryintelligence,interceptionofmilitaryoperations,distortionordeletionofsensitiveclassifieddataaswellaslossofenormousdigitalassetssuchasfilesandeventhecompletedatabase.
Amoresecuredwayofhardeningthesecurityofthesysteminthisscenarioisbydeployingamechanismthatallowstheuseofthephysiologicalfeaturesoftheauthoriseduser.
Shanetalin[25]assertsthattheuseofbiometricsisunderpinnedbymeasurablephysiologicaltraitsandbehaviouralcharacteristicsthatserveasidentityparametersforanindividual.
Thisassertionimpliesthattheuseofbiometricsisnotsubjecttoauthenticationillssuchasrepudiation,impersonationandidentityspoofing,sinceeachindividual'sphysiologicaltraitsareuniquetotheindividualandarenottransferable.
ChettyandWagnerin[3]agreethatbiometricauthenticationisbecominganinevitableaspectofinformationtechnologywiththeubiquitousnatureofcomputersystemsandnetworksacrosstheglobe.
Aselaboratedin[16],biometricsdoesnothavetoberememberedduringtheauthenticationprocessastheyareinherentfeaturesoftheindividualthatisbeingauthenticated.
Thisisincontrasttotheuseofpasswordsandtokenssuchassmartcards,whicharesubjecttotheft,sharingandloss([12],[14].
Relatedly,IchinoandYamazakiin[8]discusstheefficacyofbiometricauthenticationspecificallyunderpinnedbysoftbiometrics.
Inthestudy,theyclassifiedsoftbiometricsonthebasisoffacial,bodyandaccessorytraits.
Furthermore,theyassertthat,thoughsoftbiometricsmaynotbedistinctiveenoughtoidentifyindividualsuniquely,itcanbevaluableforenhancingbiometricauthenticationthroughthecategorisationofthecollectedtraits,suchaseyecolourandheightranges.
Inthesameway,[18]investigatestherobustnessofbiometricsforidentityverificationandaccesscontrol.
Sincebiometricfeaturesareintrinsictotheindividualtheyidentity,theypositthatforgettingorforgingthemlikepasswordsordocumentsisunlikely.
Theiranalysisofsecurebiometricswasleveragedbythedesignofanappropriatetrainingprocedureformatchingastoredbiometricsignalwithaprobeforonwarddecisionmakingduringauthentication.
Similarly,[1]proposedanencryptedirisauthenticationsystemforidentifyingandauthenticatingusersofawirelesssensornetworks.
Mostmilitaryoperationsaredependentonthedeploymentofwirelesssensornetworks(WSNs)forcommandandcontrol.
SinceWSNsaresimpletoimplementandmanage,usingbiometricsforidentificationandauthenticationprocesseswillenforceahighlysecureaccesscontrolsystemonthefly.
Authenticationthroughphysiologicaltraitssuchasfingertouches,facemovementorpalmprintwasdiscussedforpaymentsystemsin[10].
Thismethodofmakingpaymentscanbeenhancedtoallowforsecureauthenticationprocessesinmilitarysites.
MultimodalScientificResearchJournal(SCIRJ),Volume2,Issue1,January201445ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalbiometricauthenticationisalsoimportantforenhancingoperationalsecurity.
Asdiscussedin[5],multimodalbiometricsissuitableformobiledevicesincludingPersonalDigitalAssistants(PDAs),smartphonesandmobilesphones.
Sincethesedevicesareportable,theyaresubjecttolossandtheft.
Protectingthem,therefore,requirestheuseofanenhancedsecuritymechanismsuchasbiometricauthentication.
Theyproposedtheuseofteethimageandvoiceforauthentication.
Itisaknownfactthatthemilitarydeploysthelargestuseofmobiledevices,mostofwhichareembeddedsystemswithtacticsandmilitaryintelligence.
Ifauthenticationtosuchdevicesisleveragedbyteethimageandvoice,itwillbecomecomputationallydifficulttocircumventthesecurityofsuchadeviceintheeventofitsloss,theftormisplacement.
Biometricauthentication,therefore,ismoresecureinaccesscontrolmanagementaswellasidentityverificationespeciallyforcontrolleddomainswheretheexactidentityoftheuserbeingauthenticatedandallowedaccesstodigitalresourcescannotbecompromised.
IV.
APPLICABLEBIOMETRICTECHNOLOGYThebiometrictechnologyisleveragedbyanumberofmethodologiesthatcanbedeployedintherealisationofbiometricauthentication.
Someofthese,asdiscussedin[7]and[17]includethefollowing:a.
Palmbiometricsb.
Fingerprintauthenticationc.
Voicerecognitiond.
Signatureverificatione.
Irisscanandf.
FacialrecognitionAllofthesearenecessary.
However,thispaperfocusesonthefirstthreeabove:palmbiometrics,fingerprintauthenticationandvoicerecognition.
A.
PalmBiometricsPalmbiometricsisbasedontheuseofbiometrictraitsextractedfromthepalm(curvatureofthepalm,widthofthepalm,lengthoffingers,thicknessofthepalm,principallines,wrinkles,deltapointsetc[7])toverifytheidentityofapersoninacontrolledenvironment.
Theuseofpalmbiometrics,onitself,cannotguaranteeanefficientuseridentificationsystemwithoutbeingaugmentedbyotheridentificationmethodssuchastheuseofpersonalidentificationnumbers(PIN)asthehumanhandisnotunique.
Thereliabilityprovidedbypalmbiometricsinthecontextofverificationandauthenticationisconsiderablyhigh.
Nonrepudiationisenhancedasausercannotdenythataphysiologicaltraitsuchasapalmprintimagedoesnotbelongtohim/heronceloggedin.
Trackingusers'accessandtheuseofresourcescanbecontrolled.
Also,thereismoreconvenienceforusersandsystemadministratorsasincidencesofpasswordoridentificationcardtheftorlossmaynotbeobtainabletherebyenhancingefficiency.
Someofthekeyweaknessofpalmbiometricsisthatthesensordata,ifusedindependentlyofotherbiometricsources,canbenoisy.
Also,thehumanhandisnotcompletelyuniqueandassuchmaylackindividualityanduniversalityinrepresentingtheidentityofaparticularindividual.
Injuriesonthepalmaswellasgummypalmsmayleadtopoortemplatequalityculminatinginpoorperformancebythebiometricsystem.
Palmbiometricsshouldthereforebeusedincombinationwithotherbiometricsourcessuchasfingerprints,irisscansandvoicerecognitiontoprovideanefficientmultimodalauthenticationsystem.
Thoughpalmbiometricsdemonstratessomeweaknessesinitsimplementation,ithasagoodnumberofstrengthsasfollows:i.
Itcanbesuitableforoutdoorenvironmentssuchasmilitarysitesandcanbeusedtomanageahighthroughputofpeople.
ii.
Itprovidesafriendlyuserinterfacethatisrobustandintegrateseasilywiththeexistingaswellasthirdpartysystems.
iii.
Givesroomforeasymaintenanceandstorageasithasasmalltemplatesizethatcanbeintegratedinalargedatabase.
iv.
Itisinexpensivetoimplementandoffersexcellentreturnoninvestmentaswellaswidespreadacceptance.
v.
Highlyreliableandaccurate.
vi.
Itprovideseffectivesecurity,whichismorerobustwhencomparedtotraditionalmethodssuchastheuseofpasswordsandidentificationcards.
vii.
Sincethebiometricfeaturesextractedduringenrolmentareinherenttoaparticularindividual,fraudandrepudiationcanbeeliminatedduringauthentication.
Thismaynotbeunconnectedwiththefactthatoncestored,palmbiometrictraitsarenottransferable;thatis,theycannotbeshared,stolen,lostorforgotten.
B.
FingerprintAuthenticationThereisaproliferationintheuseoffingerprintauthenticationinrecenttimes[11],[4].
Thiscanbeseeninmostmobilephoneserviceproviders.
Theuseoffingerprintsforidentificationandverificationisborneoutofthefactthatthepatternsofridgesandfurrowsthatcharacteriseanindividual'sfinger(mostespeciallythesurfaceofthefingertip)areuniquetoeachindividual[23],[9].
Fingerprintdevicesallowausertoaccessacontrolledenvironmentthroughfingerprintscans.
Podioin[16]maintainsthattheusermerelyplaceshisfingertipontheappropriatedevicetobeidentifiedandauthenticated.
Thispaveswayforsecureaccesscontrolandnetworkauthenticationmechanism.
However,fingerprintbiometricscanbegiventotheweaknessesofpalmbiometricsespeciallywhenthereisanaccumulationofskinoilsordirtonthesurfacesofsensorplates.
Theresultanteffectmaybefalserejectioninwhichcaseavaliduserfingerprintscanisrejectedasillegitimate.
Falseacceptancecanalsobeobtainableherewhereaninvalidfingerprintscanisacceptedasvalidforagivenusertransaction[7].
C.
VoiceRecognitionVoicerecognitionisbasedonthedistinctrateandpitchofsoundsproducedbythehumanvoice[19],aswellasotherScientificResearchJournal(SCIRJ),Volume2,Issue1,January201446ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalacousticfeaturesofspeechincludingtheshapeofthethroat,speakingstyleandsizeofthemouth[16].
Kounoudesetalin[12]mentionthatvoiceauthenticationisprecededbytheextractionofvoiceprints,whicharestoredduringtheenrolmentphaseandmatchedwithrawspeechdatacapturedbyvoicerecognitiondevicessuchasavoicespeakerormicrophone.
Xiaoin[17]identifiestwotypesoftechnologiesforvoicebiometricsnamelyvoicescansandspeechrecognition.
Themaindistinctionbetweenthetwotechnologiesisthatwhilevoicescansuseapre-storedvoicesampleoftheusertoauthenticateandverifytheidentityoftheuser,speechrecognitiondependsonwordsandsentencesfromanaudiosignal,whichformtheinputtoavoicerecognitiondevice.
ZhangandAbdullain[24]proposedavoicebiometricstechniquebasedonhumanauditorymodelsandindependentcomponentanalysis.
Theauditorymodelswerefoundtoachievebetteridentificationrateswithhighrobustnesstonoise.
Furthermore,Rashidetalin[19]implementedasecuritysystemthatallowsforvoicepatternsastheaccesscontrolkeytherebyenhancingtheaccuracyoftheauthenticationprocesssincevoicepatternsasseentobedistinctperindividual.
Thedesignoftheproposedauditorymodels,accesscontrolmechanism,andvoicerecognitionsystemissuitablefordeploymentinmilitarycontrolledenvironments.
Onemajoradvantageofvoicebiometricsisthatitdoesnotrequirephysicalcontactwiththeauthenticatingdevicethoughitcanbesubjecttobackgroundnoise,whichmayleadtoahighrateoffalserejection[12].
However,voicetemplates,ashighlightedin[16]aresmallinsizebasicallylessthan16kilobytesandcanberepresentedusingneuralnetworks,decisiontrees,patternmatchingalgorithmsandhiddenMarkovmodels.
V.
BIOMETRICAUTHENTICATIONPROCESSBiometricauthenticationisprecededbyanenrolmentprocedure.
Theenrolmentprocessrequirestheinitialcaptureofthebiometrictraits.
Asstatedin[11]and[23],thecapturedtraitsarepre-processedforfeatureextractionandstoredastemplatesintheauthenticatingdeviceordatabase.
Theperformanceofthebiometricsampleduringauthenticationisdependentonthequalityofthecapturedtemplate.
Figure1isarepresentationofaBiometricAuthenticationProcess.
Fig.
1:RepresentationofaBiometricAuthenticationprocessVerificationisanindispensableaspectofbiometricauthentication[16].
Auserwhosebiometricsamplehasbeenenrolledcanonlybeallowedaccesstoasystemsuchasduringaloginsessionbyverification.
Duringverification,thestoredbiometrictemplateiscomparedwiththesamplepresentedbytheuseratthepointofauthentication.
Accessisallowedwhenamatchisfoundandintheeventofamismatch,accessisdenied.
Verificationleadstoidentificationandusuallyinvolvesaone-to-manyorone-to-onematchingofthestoredtemplateinthedatabasewiththecapturedsample[25].
VI.
CONCLUSIONOneofthekeyissuesinmanagingauser'saccesstocriticalresourcesistheabilitytoallowonlytheauthorisedusersofasystemtosuchresources.
Overtheyears,identityspoofing,maninthemiddle,replayandactiveattackshaveleftmostmilitarybasespronetotheleakageofclassifiedinformationandintelligenceaswellasthecircumventionofestablishedsecurityprocedures.
Theconsequencesofsecuritybreachesaregraveandcanleadtolossoflives,propertyandrevenue.
Asseeninmostthirdworldcounties,whereterrorismisontheincrease,leakageofsensitiveinformationcancripplethebedrockofaneconomy.
Tothisend,providingadequateandenhancedauthenticationmechanismstocontrolledenvironmentscannotbeoveremphasised.
Onecanvividlyassessthatauthenticationthroughauser'sphysiologicalfeaturescancreateasenseofsecurity.
Thisisbecausethephysicalpresenceoftheuserincludinganaspectofhistraitswillbeinvolvedinidentifyinghim.
Biometrictraitsareinvariantinrepresentationandassuchclaimacertaindegreeofuniquenessanduniversality.
Thefingerprintimageofoneusercannotbeusedintheplaceofanotheruser.
Thisisauniversaltruth.
Consequently,itishighlyefficienttodeploybiometricauthenticationifthesystemadministratorisinterestedinmappingtheusersofasystemtotheirrealidentities.
Passwordandtokenauthenticationcannotguaranteenon-repudiation.
WecannotclaimthatauserwhologsintoaScientificResearchJournal(SCIRJ),Volume2,Issue1,January201447ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalsystemistheownerofthepasswordortokensuchassmartcardusedtogainaccesstothesystem.
Passwordsandtokenscanbelost,stolen,andarealsotransferable.
Withbiometricauthentication,suchweaknessescanbecontrolledsincetheusers'physiologicalandbehaviouraltraitsareunique,whichrequiresthephysicalpresenceoftheuseratthepointofauthenticationleveragedbytheuseoflivebiometricsamplesforidentificationandverification.
Thispaperhasbeenabletohighlighttheefficacyofbiometricauthenticationincriticalenvironmentssuchasthemilitary.
Thefocusonfutureworkshouldbeonbiometrictemplatesecurity.
Thisisborneoutofthefactthatacompromisedbiometrictemplate,whichisintrinsicallyinvariant,canleadtotheconstructionofartificialbiometrictemplatesthroughreverseengineeringifsuchatemplatefallsintothehandsofamalicioususer.
REFERENCES[1]Althobaiti,O.
;Al-Rodhaan,M.
;Al-Dhelaan,A.
,(2012)"Biometricaccesscontrolforwirelessnodes,"ComputationalAspectsofSocialNetworks(CASoN),2012FourthInternationalConferenceon,vol.
,no.
,pp.
167,174,21-23[2]Balfanz,D.
,Smetters,D.
K.
,Stewart,P.
,andChiWong,H.
(2002).
TalkingToStrangers:AuthenticationinAd-HocWirelessNetwork,ProceedingsofNetworkandDistributedSystemSecuritySymposium2002(NDSS'02),SanDiego,CA,February,2002.
[3]Chetty,G.
;Wagner,M.
,(2006)"Multi-LevelLivenessVerificationforFace-VoiceBiometricAuthentication,"BiometricConsortiumConference,2006BiometricsSymposium:SpecialSession,vol.
,no.
,pp.
1,6[4]Darwish,A.
A.
;Zaki,W.
M.
;Saad,O.
M.
;Nassar,N.
M.
;Schaefer,G.
,(2010)"HumanAuthenticationUsingFaceandFingerprintBiometrics,"ComputationalIntelligence,CommunicationSystemsandNetworks(CICSyN),2010SecondInternationalConferenceon,vol.
,no.
,pp.
274,278[5]Dong-JuKim;Kwang-SeokHong,(2008)"Multimodalbiometricauthenticationusingteethimageandvoiceinmobileenvironment,"ConsumerElectronics,IEEETransactionson,vol.
54,no.
4,pp.
1790,1797[6]HitachiIDSystemsInc.
(2014).
DefinitionofAuthentication.
Availableat:http://hitachi-id.
com/concepts/authentication.
html(Accessed:12January2014)[7]Yan,H.
&Long,D.
(2008)"ANovelBimodalIdentificationApproachBasedonHand-Print,"ImageandSignalProcessing,2008.
CISP'08.
Congresson,vol.
4,no.
,pp.
506,510[8]Ichino,M.
;Yamazaki,Y.
,(2013)"SoftBiometricsandItsApplicationtoSecurityandBusiness,"BiometricsandKanseiEngineering(ICBAKE),2013InternationalConferenceon,vol.
,no.
,pp.
314,319[9]Isa,M.
R.
M.
;Yahaya,Y.
H.
;Halip,M.
H.
M.
;Khairuddin,M.
A.
;Maskat,K.
,(2010)"ThedesignoffingerprintbiometricauthenticationonsmartcardforPULAPOTmainentrancesystem,"InformationTechnology(ITSim),2010InternationalSymposiumin,vol.
3,no.
,pp.
1,4[10]Yang,J.
(2010)"BiometricsVerificationTechniquesCombingwithDigitalSignatureforMultimodalBiometricsPaymentSystem,"Managementofe-Commerceande-Government(ICMeCG),2010FourthInternationalConferenceon,vol.
,no.
,pp.
405,410[11]Kannavara,R.
;Bourbakis,N.
G.
,(2009)"Fingerprintbiometricauthenticationbasedonlocalglobalgraphs,"Aerospace&ElectronicsConference(NAECON),ProceedingsoftheIEEE2009National,vol.
,no.
,pp.
200,204[12]Kounoudes,Anastasis;Kekatos,V.
;Mavromoustakos,S.
,(2006)"VoiceBiometricAuthenticationforEnhancingInternetServiceSecurity,"InformationandCommunicationTechnologies,2006.
ICTTA'06.
2nd,vol.
1,no.
,pp.
1020,1025[13]Dang,L.
,Kou,W.
,Xiao,Y.
(2005)"Animprovedschemeforunilateralasymmetricsmartcardauthentication,"AdvancedInformationNetworkingandApplications,2005.
AINA2005.
19thInternationalConferenceon,vol.
2,no.
,pp.
265,268vol.
2[14]Nandini,C.
;RaviKumar,C.
N.
,(2007)"Multi-BiometricsApproachforFacialRecognition,"ConferenceonComputationalIntelligenceandMultimediaApplications,2007.
InternationalConferenceon,vol.
2,no.
,pp.
417,422[15]Ngai,E.
C.
-H.
;Lyu,M.
R.
;Chin,R.
T.
,(2004)"Anauthenticationserviceagainstdishonestusersinmobileadhocnetworks,"AerospaceConference,2004.
Proceedings.
2004IEEE,vol.
2,no.
,pp.
1275,1285Vol.
2[16]Podio,F.
L.
,(2002)"Personalauthenticationthroughbiometrictechnologies,"NetworkedAppliances,2002.
Gaithersburg.
Proceedings.
2002IEEE4thInternationalWorkshopon,vol.
,no.
,pp.
57,66[17]Xiao,Q.
(2004)"Abiometricauthenticationapproachforhighsecurityad-hocnetworks,"InformationAssuranceWorkshop,2004.
ProceedingsfromtheFifthAnnualIEEESMC,vol.
,no.
,pp.
250,256[18]Rane,S.
;YeWang;Draper,S.
C.
;Ishwar,P.
,(2013)"SecureBiometrics:Concepts,AuthenticationArchitectures,andChallenges,"SignalProcessingMagazine,IEEE,vol.
30,no.
5,pp.
51,64[19]Rashid,R.
A.
;Mahalin,N.
H.
;Sarijari,M.
A.
;AbdulAziz,A.
A.
,(2008)"Securitysystemusingbiometrictechnology:DesignandimplementationofVoiceRecognitionSystem(VRS),"ComputerandCommunicationEngineering,2008.
ICCCE2008.
InternationalConferenceon,vol.
,no.
,pp.
898,902[20]Tang,H.
,Salmanian,M.
&Chang,C.
(2007).
StrongAuthenticationforTacticalMobileAdHocNetworks.
DefenceResearchandDevelopmentCanadaOttawaTM2007-146ScientificResearchJournal(SCIRJ),Volume2,Issue1,January201448ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournal[21]Tittel,E.
,Chapple,M.
&Stewart,J.
M.
(2003).
CertifiedInformationSystemsSecurityProfessional.
CA:SYBEXInc.
[22]Wikipedia(2014).
Mobileadhocnetwork.
Availableat:http://en.
wikipedia.
org/wiki/Mobile_ad_hoc_networks(Accessed:11January2014).
[23]Yahaya,Y.
H.
;Isa,M.
;Aziz,M.
I.
,(2009)"FingerprintBiometricsAuthenticationonSmartCard,"ComputerandElectricalEngineering,2009.
ICCEE'09.
SecondInternationalConferenceon,vol.
2,no.
,pp.
671,673[24]Zhang,Y.
&Abdulla,W.
H.
,(2008)"VoiceasaRobustBiometrics,"FutureGenerationCommunicationandNetworking,2008.
FGCN'08.
SecondInternationalConferenceon,vol.
3,no.
,pp.
41,46[25]ShanAo;WeiyinRen;ShoulianTang,(2008)"AnalysisandReflectionontheSecurityofBiometricsSystem,"WirelessCommunications,NetworkingandMobileComputing,2008.
WiCOM'08.
4thInternationalConference,vol.
,no.
,pp.
1,5

百纵科技(1399元/月)香港CN2站群232IP

湖南百纵科技有限公司是一家具有ISP ICP 电信增值许可证的正规公司,多年不断转型探索现已颇具规模,公司成立于2009年 通过多年经营积累目前已独具一格,公司主要经营有国内高防服务器,香港服务器,美国服务器,站群服务器,东南亚服务器租用,国内香港美国云服务器,以及全球专线业务!活动方案:主营:1、美国CN2云服务器,美国VPS,美国高防云主机,美国独立服务器,美国站群服务器,美国母机。2、香港C...

IonSwitch:$1.75/月KVM-1GB/10G SSD/1TB/爱达荷州

IonSwitch是一家2016年成立的国外VPS主机商,部落上一次分享的信息还停留在2019年,主机商提供基于KVM架构的VPS产品,数据中心之前在美国西雅图,目前是美国爱达荷州科德阿伦(美国西北部,西接华盛顿州和俄勒冈州),为新建的自营数据中心。商家针对新数据中心运行及4号独立日提供了一个5折优惠码,优惠后最低1GB内存套餐每月仅1.75美元起。下面列出部分套餐配置信息。CPU:1core内存...

spinservers($179/月),1Gbps不限流量服务器,双E5-2630Lv3/64GB/1.6T SSD/圣何塞机房

中秋节快到了,spinservers针对中国用户准备了几款圣何塞机房特别独立服务器,大家知道这家服务器都是高配,这次推出的机器除了配置高以外,默认1Gbps不限制流量,解除了常规机器10TB/月的流量限制,价格每月179美元起,机器自动化上架,一般30分钟内,有基本自助管理功能,带IPMI,支持安装Windows或者Linux操作系统。配置一 $179/月CPU:Dual Intel Xeon E...

250.pp.com为你推荐
咏春大师被ko八极拳大师真的被咏春叶问打败了吗?八极咏春比优劣如何?谢谢.留学生认证留学生学历认证的意义是什么?李子柒年入1.6亿李子柒男朋友是谁,李子柒父母怎么去世的?甲骨文不满赔偿工作不满半年被辞退,请问赔偿金是怎么算的?陈嘉垣电视剧《反黑》里面,雷太太女儿扮演者是谁?rawtools相机中的RAW是什么意思?www.baitu.com韩国片爱人.欲望的观看地址javbibi日文里的bibi是什么意思杨丽晓博客杨丽晓哪一年出生的?广告法请问违反了广告法,罚款的标准是什么
高防直连vps 亚洲小于500m ibox官网 中国电信测速网 umax120 免费的asp空间 tracker服务器 塔式服务器 游戏服务器 卡巴下载 ddos是什么 国内免备案空间 56折扣网 个人web服务器 1000元电脑主机配置 杭州机动车摇号申请网站 自住型商品房申请网站 联想789 789小游戏 英国伦敦大学 更多