Possession250.pp.com
250.pp.com 时间:2021-03-22 阅读:(
)
ScientificResearchJournal(SCIRJ),Volume2,Issue1,January201443ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalImprovingtheSecurityofMANETsOrientedMilitaryIntelligenceusingBiometricsAuthenticationTechnologiesJuliusN.
Obidinnu1(obijulius@yahoo.
com)AyeiE.
Ibor2(ayei.
ibor@gmail.
com)S.
O.
O.
Duke3(orokduke2003@yahoo.
com)1,2,3:DepartmentofComputerScience,CrossRiverUniversityofTechnology,Calabar,NigeriaAbstract-Inmanypartsoftheworld,themilitaryhasbeenverybusyinrecenttimesengaginginterrorandotherrelatedwars.
Thisrequiresthatmenandmaterialshavetobelocatedindifferentpartsoftheirstrategicgeographiccentres.
Andinordertoensureafastcommunicationwiththesebases,themilitaryoftendeploysMobileAd-hocNetworks(MANETs).
MANETscarrysuchintelligenceinformationas:deploymentinformation,readinessinformation,andorderofbattleplanstotheirvariousbases.
Thenatureoftheseinformationissuchthatanycompromiseonthemcouldbedisastroustothecoursesofactionofthebases.
ThispaperidentifiesuserauthenticationasakeyissueinstrengtheningsecurityconcernsinMANETs.
Thepaperfurtheradoptsbiometricstechnologiesasthetrendingoptionsforthepurposeofobtainingatruerreflectionoftheidentitiesoftheusersofad-hocnetworks.
Thispapertherefore,reviewsvariousbiometricstechnologyimplementationstrategiesavailable,andrecommendstheadoptionofone,oracombinationofthembymilitarybases.
Thebenefitsprovidedbythistechnologyarealsopresented.
IndexTerms-MilitaryBase,BiometricsTechnology,Authentication,MANET,InformationsecurityI.
INTRODUCTIONMostmilitarybasesrequiretheuseofMobileAd-hocNetworks(MANETs)toestablishcommunicationsbetweenthelargenumbersofmobiledevicesdeployedinthebattlefield[17].
Itistherefore,instructivetostatethatthecomputersystemsinmilitaryMANETscontainsensitiveinformation,whichoftenmakesthemattractivetargetstounauthorisedaccesses.
Tittel,ChappleandStewartin[21]providealistofsomeofthesensitiveinformation,whichalsoincludesmilitarydescriptiveintelligencesuchas:deploymentinformation,readinessinformation,andorderofbattleplans.
Illegalaccesstotheseclassesofmilitaryintelligencecouldcompromiseinvestigations,disruptmilitaryplanning,andthreatennationalsecurity.
Atalltimestherefore,itiscrucialthatthecomputersystemsinmilitaryMANETsshouldbeprotectedfromintruders.
Consequently,thispaperreviewsoneofthecriticalsecurityprotectionstepsthatensuresthatonlyauthorisedpersonnelgainaccesstothesystemsinthemilitaryMANETs.
Consequently,weadoptthepositionof[15],whoidentifiesuserauthenticationasoneofthekeyissuesinmanagingsecurityconcernsinMANETs.
Andintheopinionofthereferredauthor,accesstoad-hocnetworksisdynamicandcontext-sensitive,therebymakingusers'authenticationtobeontheflywithtemporaryaccesstoresources.
Accordingly,informationleakageonmilitaryintelligencecouldoccurintheprocess.
Theseinformationleakagescanbeavoided.
Therefore,[16]advocatesthattheexactidentitiesoftheusersofthead-hocnetworks'shouldbeaccuratelyverifiableatanyinstanceofitsusage.
Theadvocacyintheprecedingparagraphservesasthemotivationforthispaper,whichreviewsexistingauthenticationprocesses,andidentifiesthebiometricstechnologiesasthetrendingoptionsforthepurposeofobtainingatruerreflectionoftheidentitiesoftheusersofad-hocnetworks.
Thispapertherefore,reviewsvariousbiometricstechnologyimplementationstrategiesavailable,andrecommendstheadoptionofoneoracombinationofthembymilitarybases.
II.
IMPORTANCEOFAUTHENTICATIONINMILITARYMANETsWikipediain[22]definesamobilead-hocnetwork(MANET)asawireless,self-configuring,infrastructure-lessnetworkofmobiledevices,deployedoftentimesforaninterimpurpose.
Andtheyareimportanttothemilitarybecausetheypossessthefeaturesofquicksetup,takedown,andmobilityfeatures.
MANETsaretherefore,especiallyusefultothemilitary,sincetheyserveaschannelsthroughwhichtheycommunicateinordertostrategize,command,control,andoperatetheirforcesintheirrespectiveenvironments,inland,sea,orair[20].
However,communicationswithinMANETrequireshavinglegalaccesstothedevices,asanythingtothecontrarywillleadtoinformationleakageonmilitaryintelligencetotheopponents.
Andavailabilityofmilitaryintelligenceinthehandsofanenemyisabadomenforsuchamilitarybase.
Consequently,itbecomesnecessarytoensurethattheidentityofapersonordevicethatattemptstogainaccesstothenetworkshouldbeauthenticated.
Itistherefore,inlinewiththispositionthat[20]identifiesauthenticationasthefirstlineofdefenceinsecuringMANETnetworks.
Authenticationisanyprocessbywhichasystemverifiestheidentityofauserwhowishestoaccessit[6].
AuthenticationisimportantinMANETs,asitensuressecureconnectionswitharequestingentityintoanetwork[2].
AndauthenticationinScientificResearchJournal(SCIRJ),Volume2,Issue1,January201444ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalMANETscanbebasedondifferentmechanisms.
Wediscussthesemechanismsinthenextsection.
III.
AUTHENTICATIONMECHANISMSAllowingaccesstoonlyauthorisedusersanddisallowingaccesstotheunauthorisedonesisafundamentalaspectofauthentication.
Authenticationprocessesarebasedlargelyonthreemethods.
Thesemethodsinclude:Whatweknow–passwords,pincodesandotherpersonaldetailscanbeusedtoidentifyusersofaparticularsystemWhatwehave–tokenssuchassmartcardsorkeyfobarealsousedforuserauthenticationWhatweare–here,biometricfeaturessuchasfingerprintscans,irisscans,palmbiometricsaredeployedforallowingaccesstocontrolledenvironments[23],[17],[16]and[12].
Authenticationby'whatweknow'and'whatwehave'increasesthelikelihoodofidentitytheftastheuseofpasswordsortokensisnotnecessarilytiedtotheidentityoftherealownerofthepasswordortoken[5].
Inhisstudy,[17]highlightsthatthereareconsequencesattributedtosettingupcommunicationwithauserthathasanunknownidentity.
Aknowledgefactorsuchasapasswordisnotentirelysecureasitcanbeeasilyguessed,interceptedortransferredtoanotheruser[23].
IntheeventofUserAdivulginghisauthenticationparametersuchasapasswordtoUserBintentionallyoraccidentally,itwillbedifficulttocapturetheidentityoftheloggedinuser.
Moreso,simplepasswordscanbeeasilyguessedorcrackedthroughbruteforceordictionaryattackswhilecomplexonescaneasilybeforgotten.
Thoughtherearevariousmechanismstoprotectpasswordssuchasresettingthemregularlyorusingpasswordshints,authenticationwiththeuseofpasswordsisfastbecomingproblematicduetothesophisticatednatureoftechnologyandthepervasiveInternetthatallowsaccesstoallcategoriesofinformation,someofwhichhavefarreachingimpactondigitalassets[3].
NandiniandRaviKumarin[14]describe'whatusershave'asknowledgebasedauthenticationalsocalledpossessionfactors.
Possessionfactorshavefoundwidespreadusageinrecenttimes,astheyhaveaddedanotherlevelofsecuritytoauthentication.
Mostof'whatusershave'technologiesarebasedonatwofactorauthenticationmechanism,withPINsorpasswordsassecondaryauthenticationfeatures.
Usingasmartcardorkeyfob,forinstance,isagreatwaytoenhanceprivacy.
Mostofthesmartcardshavetheuser'sinformationengravedinthemwithpeculiarattributesthatmapstheidentityoftheusertothecard.
Thoughthiscreatesasenseofsecurityforthenumeroususersacrosstheglobe,theuseoftokensissubjecttoreplayandactiveattacks[13],[25].
However,possessionfactorscanbelost,stolenordamaged[12].
Insuchasituation,replacingthemisnecessary.
Butthereisthepossibilityofusingthemtocommitcrimebeforetheycanberetrieved.
Thiscancreateproblemsfortheowner.
Sinceacardownermayhavehisnameengravedonacard,usingitbyamalicioususer,iflost,willstillrecordatransactionagainstthecardowner.
Thisisaserioussecurityconcern.
Letusassumethatasmartcardthatgrantsaccesstoamilitarydatabasefallsintothehandsofanenemysoldierorgroupofsoldiers.
Inthesamevein,letusassumethatthiscardbelongstoasystemadministratorthathasrootorsystemprivilegesinacontrolledsystem.
Thestatedscenariocanleadtosevereconsequencesincludingdivulgenceofmilitaryintelligence,interceptionofmilitaryoperations,distortionordeletionofsensitiveclassifieddataaswellaslossofenormousdigitalassetssuchasfilesandeventhecompletedatabase.
Amoresecuredwayofhardeningthesecurityofthesysteminthisscenarioisbydeployingamechanismthatallowstheuseofthephysiologicalfeaturesoftheauthoriseduser.
Shanetalin[25]assertsthattheuseofbiometricsisunderpinnedbymeasurablephysiologicaltraitsandbehaviouralcharacteristicsthatserveasidentityparametersforanindividual.
Thisassertionimpliesthattheuseofbiometricsisnotsubjecttoauthenticationillssuchasrepudiation,impersonationandidentityspoofing,sinceeachindividual'sphysiologicaltraitsareuniquetotheindividualandarenottransferable.
ChettyandWagnerin[3]agreethatbiometricauthenticationisbecominganinevitableaspectofinformationtechnologywiththeubiquitousnatureofcomputersystemsandnetworksacrosstheglobe.
Aselaboratedin[16],biometricsdoesnothavetoberememberedduringtheauthenticationprocessastheyareinherentfeaturesoftheindividualthatisbeingauthenticated.
Thisisincontrasttotheuseofpasswordsandtokenssuchassmartcards,whicharesubjecttotheft,sharingandloss([12],[14].
Relatedly,IchinoandYamazakiin[8]discusstheefficacyofbiometricauthenticationspecificallyunderpinnedbysoftbiometrics.
Inthestudy,theyclassifiedsoftbiometricsonthebasisoffacial,bodyandaccessorytraits.
Furthermore,theyassertthat,thoughsoftbiometricsmaynotbedistinctiveenoughtoidentifyindividualsuniquely,itcanbevaluableforenhancingbiometricauthenticationthroughthecategorisationofthecollectedtraits,suchaseyecolourandheightranges.
Inthesameway,[18]investigatestherobustnessofbiometricsforidentityverificationandaccesscontrol.
Sincebiometricfeaturesareintrinsictotheindividualtheyidentity,theypositthatforgettingorforgingthemlikepasswordsordocumentsisunlikely.
Theiranalysisofsecurebiometricswasleveragedbythedesignofanappropriatetrainingprocedureformatchingastoredbiometricsignalwithaprobeforonwarddecisionmakingduringauthentication.
Similarly,[1]proposedanencryptedirisauthenticationsystemforidentifyingandauthenticatingusersofawirelesssensornetworks.
Mostmilitaryoperationsaredependentonthedeploymentofwirelesssensornetworks(WSNs)forcommandandcontrol.
SinceWSNsaresimpletoimplementandmanage,usingbiometricsforidentificationandauthenticationprocesseswillenforceahighlysecureaccesscontrolsystemonthefly.
Authenticationthroughphysiologicaltraitssuchasfingertouches,facemovementorpalmprintwasdiscussedforpaymentsystemsin[10].
Thismethodofmakingpaymentscanbeenhancedtoallowforsecureauthenticationprocessesinmilitarysites.
MultimodalScientificResearchJournal(SCIRJ),Volume2,Issue1,January201445ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalbiometricauthenticationisalsoimportantforenhancingoperationalsecurity.
Asdiscussedin[5],multimodalbiometricsissuitableformobiledevicesincludingPersonalDigitalAssistants(PDAs),smartphonesandmobilesphones.
Sincethesedevicesareportable,theyaresubjecttolossandtheft.
Protectingthem,therefore,requirestheuseofanenhancedsecuritymechanismsuchasbiometricauthentication.
Theyproposedtheuseofteethimageandvoiceforauthentication.
Itisaknownfactthatthemilitarydeploysthelargestuseofmobiledevices,mostofwhichareembeddedsystemswithtacticsandmilitaryintelligence.
Ifauthenticationtosuchdevicesisleveragedbyteethimageandvoice,itwillbecomecomputationallydifficulttocircumventthesecurityofsuchadeviceintheeventofitsloss,theftormisplacement.
Biometricauthentication,therefore,ismoresecureinaccesscontrolmanagementaswellasidentityverificationespeciallyforcontrolleddomainswheretheexactidentityoftheuserbeingauthenticatedandallowedaccesstodigitalresourcescannotbecompromised.
IV.
APPLICABLEBIOMETRICTECHNOLOGYThebiometrictechnologyisleveragedbyanumberofmethodologiesthatcanbedeployedintherealisationofbiometricauthentication.
Someofthese,asdiscussedin[7]and[17]includethefollowing:a.
Palmbiometricsb.
Fingerprintauthenticationc.
Voicerecognitiond.
Signatureverificatione.
Irisscanandf.
FacialrecognitionAllofthesearenecessary.
However,thispaperfocusesonthefirstthreeabove:palmbiometrics,fingerprintauthenticationandvoicerecognition.
A.
PalmBiometricsPalmbiometricsisbasedontheuseofbiometrictraitsextractedfromthepalm(curvatureofthepalm,widthofthepalm,lengthoffingers,thicknessofthepalm,principallines,wrinkles,deltapointsetc[7])toverifytheidentityofapersoninacontrolledenvironment.
Theuseofpalmbiometrics,onitself,cannotguaranteeanefficientuseridentificationsystemwithoutbeingaugmentedbyotheridentificationmethodssuchastheuseofpersonalidentificationnumbers(PIN)asthehumanhandisnotunique.
Thereliabilityprovidedbypalmbiometricsinthecontextofverificationandauthenticationisconsiderablyhigh.
Nonrepudiationisenhancedasausercannotdenythataphysiologicaltraitsuchasapalmprintimagedoesnotbelongtohim/heronceloggedin.
Trackingusers'accessandtheuseofresourcescanbecontrolled.
Also,thereismoreconvenienceforusersandsystemadministratorsasincidencesofpasswordoridentificationcardtheftorlossmaynotbeobtainabletherebyenhancingefficiency.
Someofthekeyweaknessofpalmbiometricsisthatthesensordata,ifusedindependentlyofotherbiometricsources,canbenoisy.
Also,thehumanhandisnotcompletelyuniqueandassuchmaylackindividualityanduniversalityinrepresentingtheidentityofaparticularindividual.
Injuriesonthepalmaswellasgummypalmsmayleadtopoortemplatequalityculminatinginpoorperformancebythebiometricsystem.
Palmbiometricsshouldthereforebeusedincombinationwithotherbiometricsourcessuchasfingerprints,irisscansandvoicerecognitiontoprovideanefficientmultimodalauthenticationsystem.
Thoughpalmbiometricsdemonstratessomeweaknessesinitsimplementation,ithasagoodnumberofstrengthsasfollows:i.
Itcanbesuitableforoutdoorenvironmentssuchasmilitarysitesandcanbeusedtomanageahighthroughputofpeople.
ii.
Itprovidesafriendlyuserinterfacethatisrobustandintegrateseasilywiththeexistingaswellasthirdpartysystems.
iii.
Givesroomforeasymaintenanceandstorageasithasasmalltemplatesizethatcanbeintegratedinalargedatabase.
iv.
Itisinexpensivetoimplementandoffersexcellentreturnoninvestmentaswellaswidespreadacceptance.
v.
Highlyreliableandaccurate.
vi.
Itprovideseffectivesecurity,whichismorerobustwhencomparedtotraditionalmethodssuchastheuseofpasswordsandidentificationcards.
vii.
Sincethebiometricfeaturesextractedduringenrolmentareinherenttoaparticularindividual,fraudandrepudiationcanbeeliminatedduringauthentication.
Thismaynotbeunconnectedwiththefactthatoncestored,palmbiometrictraitsarenottransferable;thatis,theycannotbeshared,stolen,lostorforgotten.
B.
FingerprintAuthenticationThereisaproliferationintheuseoffingerprintauthenticationinrecenttimes[11],[4].
Thiscanbeseeninmostmobilephoneserviceproviders.
Theuseoffingerprintsforidentificationandverificationisborneoutofthefactthatthepatternsofridgesandfurrowsthatcharacteriseanindividual'sfinger(mostespeciallythesurfaceofthefingertip)areuniquetoeachindividual[23],[9].
Fingerprintdevicesallowausertoaccessacontrolledenvironmentthroughfingerprintscans.
Podioin[16]maintainsthattheusermerelyplaceshisfingertipontheappropriatedevicetobeidentifiedandauthenticated.
Thispaveswayforsecureaccesscontrolandnetworkauthenticationmechanism.
However,fingerprintbiometricscanbegiventotheweaknessesofpalmbiometricsespeciallywhenthereisanaccumulationofskinoilsordirtonthesurfacesofsensorplates.
Theresultanteffectmaybefalserejectioninwhichcaseavaliduserfingerprintscanisrejectedasillegitimate.
Falseacceptancecanalsobeobtainableherewhereaninvalidfingerprintscanisacceptedasvalidforagivenusertransaction[7].
C.
VoiceRecognitionVoicerecognitionisbasedonthedistinctrateandpitchofsoundsproducedbythehumanvoice[19],aswellasotherScientificResearchJournal(SCIRJ),Volume2,Issue1,January201446ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalacousticfeaturesofspeechincludingtheshapeofthethroat,speakingstyleandsizeofthemouth[16].
Kounoudesetalin[12]mentionthatvoiceauthenticationisprecededbytheextractionofvoiceprints,whicharestoredduringtheenrolmentphaseandmatchedwithrawspeechdatacapturedbyvoicerecognitiondevicessuchasavoicespeakerormicrophone.
Xiaoin[17]identifiestwotypesoftechnologiesforvoicebiometricsnamelyvoicescansandspeechrecognition.
Themaindistinctionbetweenthetwotechnologiesisthatwhilevoicescansuseapre-storedvoicesampleoftheusertoauthenticateandverifytheidentityoftheuser,speechrecognitiondependsonwordsandsentencesfromanaudiosignal,whichformtheinputtoavoicerecognitiondevice.
ZhangandAbdullain[24]proposedavoicebiometricstechniquebasedonhumanauditorymodelsandindependentcomponentanalysis.
Theauditorymodelswerefoundtoachievebetteridentificationrateswithhighrobustnesstonoise.
Furthermore,Rashidetalin[19]implementedasecuritysystemthatallowsforvoicepatternsastheaccesscontrolkeytherebyenhancingtheaccuracyoftheauthenticationprocesssincevoicepatternsasseentobedistinctperindividual.
Thedesignoftheproposedauditorymodels,accesscontrolmechanism,andvoicerecognitionsystemissuitablefordeploymentinmilitarycontrolledenvironments.
Onemajoradvantageofvoicebiometricsisthatitdoesnotrequirephysicalcontactwiththeauthenticatingdevicethoughitcanbesubjecttobackgroundnoise,whichmayleadtoahighrateoffalserejection[12].
However,voicetemplates,ashighlightedin[16]aresmallinsizebasicallylessthan16kilobytesandcanberepresentedusingneuralnetworks,decisiontrees,patternmatchingalgorithmsandhiddenMarkovmodels.
V.
BIOMETRICAUTHENTICATIONPROCESSBiometricauthenticationisprecededbyanenrolmentprocedure.
Theenrolmentprocessrequirestheinitialcaptureofthebiometrictraits.
Asstatedin[11]and[23],thecapturedtraitsarepre-processedforfeatureextractionandstoredastemplatesintheauthenticatingdeviceordatabase.
Theperformanceofthebiometricsampleduringauthenticationisdependentonthequalityofthecapturedtemplate.
Figure1isarepresentationofaBiometricAuthenticationProcess.
Fig.
1:RepresentationofaBiometricAuthenticationprocessVerificationisanindispensableaspectofbiometricauthentication[16].
Auserwhosebiometricsamplehasbeenenrolledcanonlybeallowedaccesstoasystemsuchasduringaloginsessionbyverification.
Duringverification,thestoredbiometrictemplateiscomparedwiththesamplepresentedbytheuseratthepointofauthentication.
Accessisallowedwhenamatchisfoundandintheeventofamismatch,accessisdenied.
Verificationleadstoidentificationandusuallyinvolvesaone-to-manyorone-to-onematchingofthestoredtemplateinthedatabasewiththecapturedsample[25].
VI.
CONCLUSIONOneofthekeyissuesinmanagingauser'saccesstocriticalresourcesistheabilitytoallowonlytheauthorisedusersofasystemtosuchresources.
Overtheyears,identityspoofing,maninthemiddle,replayandactiveattackshaveleftmostmilitarybasespronetotheleakageofclassifiedinformationandintelligenceaswellasthecircumventionofestablishedsecurityprocedures.
Theconsequencesofsecuritybreachesaregraveandcanleadtolossoflives,propertyandrevenue.
Asseeninmostthirdworldcounties,whereterrorismisontheincrease,leakageofsensitiveinformationcancripplethebedrockofaneconomy.
Tothisend,providingadequateandenhancedauthenticationmechanismstocontrolledenvironmentscannotbeoveremphasised.
Onecanvividlyassessthatauthenticationthroughauser'sphysiologicalfeaturescancreateasenseofsecurity.
Thisisbecausethephysicalpresenceoftheuserincludinganaspectofhistraitswillbeinvolvedinidentifyinghim.
Biometrictraitsareinvariantinrepresentationandassuchclaimacertaindegreeofuniquenessanduniversality.
Thefingerprintimageofoneusercannotbeusedintheplaceofanotheruser.
Thisisauniversaltruth.
Consequently,itishighlyefficienttodeploybiometricauthenticationifthesystemadministratorisinterestedinmappingtheusersofasystemtotheirrealidentities.
Passwordandtokenauthenticationcannotguaranteenon-repudiation.
WecannotclaimthatauserwhologsintoaScientificResearchJournal(SCIRJ),Volume2,Issue1,January201447ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalsystemistheownerofthepasswordortokensuchassmartcardusedtogainaccesstothesystem.
Passwordsandtokenscanbelost,stolen,andarealsotransferable.
Withbiometricauthentication,suchweaknessescanbecontrolledsincetheusers'physiologicalandbehaviouraltraitsareunique,whichrequiresthephysicalpresenceoftheuseratthepointofauthenticationleveragedbytheuseoflivebiometricsamplesforidentificationandverification.
Thispaperhasbeenabletohighlighttheefficacyofbiometricauthenticationincriticalenvironmentssuchasthemilitary.
Thefocusonfutureworkshouldbeonbiometrictemplatesecurity.
Thisisborneoutofthefactthatacompromisedbiometrictemplate,whichisintrinsicallyinvariant,canleadtotheconstructionofartificialbiometrictemplatesthroughreverseengineeringifsuchatemplatefallsintothehandsofamalicioususer.
REFERENCES[1]Althobaiti,O.
;Al-Rodhaan,M.
;Al-Dhelaan,A.
,(2012)"Biometricaccesscontrolforwirelessnodes,"ComputationalAspectsofSocialNetworks(CASoN),2012FourthInternationalConferenceon,vol.
,no.
,pp.
167,174,21-23[2]Balfanz,D.
,Smetters,D.
K.
,Stewart,P.
,andChiWong,H.
(2002).
TalkingToStrangers:AuthenticationinAd-HocWirelessNetwork,ProceedingsofNetworkandDistributedSystemSecuritySymposium2002(NDSS'02),SanDiego,CA,February,2002.
[3]Chetty,G.
;Wagner,M.
,(2006)"Multi-LevelLivenessVerificationforFace-VoiceBiometricAuthentication,"BiometricConsortiumConference,2006BiometricsSymposium:SpecialSession,vol.
,no.
,pp.
1,6[4]Darwish,A.
A.
;Zaki,W.
M.
;Saad,O.
M.
;Nassar,N.
M.
;Schaefer,G.
,(2010)"HumanAuthenticationUsingFaceandFingerprintBiometrics,"ComputationalIntelligence,CommunicationSystemsandNetworks(CICSyN),2010SecondInternationalConferenceon,vol.
,no.
,pp.
274,278[5]Dong-JuKim;Kwang-SeokHong,(2008)"Multimodalbiometricauthenticationusingteethimageandvoiceinmobileenvironment,"ConsumerElectronics,IEEETransactionson,vol.
54,no.
4,pp.
1790,1797[6]HitachiIDSystemsInc.
(2014).
DefinitionofAuthentication.
Availableat:http://hitachi-id.
com/concepts/authentication.
html(Accessed:12January2014)[7]Yan,H.
&Long,D.
(2008)"ANovelBimodalIdentificationApproachBasedonHand-Print,"ImageandSignalProcessing,2008.
CISP'08.
Congresson,vol.
4,no.
,pp.
506,510[8]Ichino,M.
;Yamazaki,Y.
,(2013)"SoftBiometricsandItsApplicationtoSecurityandBusiness,"BiometricsandKanseiEngineering(ICBAKE),2013InternationalConferenceon,vol.
,no.
,pp.
314,319[9]Isa,M.
R.
M.
;Yahaya,Y.
H.
;Halip,M.
H.
M.
;Khairuddin,M.
A.
;Maskat,K.
,(2010)"ThedesignoffingerprintbiometricauthenticationonsmartcardforPULAPOTmainentrancesystem,"InformationTechnology(ITSim),2010InternationalSymposiumin,vol.
3,no.
,pp.
1,4[10]Yang,J.
(2010)"BiometricsVerificationTechniquesCombingwithDigitalSignatureforMultimodalBiometricsPaymentSystem,"Managementofe-Commerceande-Government(ICMeCG),2010FourthInternationalConferenceon,vol.
,no.
,pp.
405,410[11]Kannavara,R.
;Bourbakis,N.
G.
,(2009)"Fingerprintbiometricauthenticationbasedonlocalglobalgraphs,"Aerospace&ElectronicsConference(NAECON),ProceedingsoftheIEEE2009National,vol.
,no.
,pp.
200,204[12]Kounoudes,Anastasis;Kekatos,V.
;Mavromoustakos,S.
,(2006)"VoiceBiometricAuthenticationforEnhancingInternetServiceSecurity,"InformationandCommunicationTechnologies,2006.
ICTTA'06.
2nd,vol.
1,no.
,pp.
1020,1025[13]Dang,L.
,Kou,W.
,Xiao,Y.
(2005)"Animprovedschemeforunilateralasymmetricsmartcardauthentication,"AdvancedInformationNetworkingandApplications,2005.
AINA2005.
19thInternationalConferenceon,vol.
2,no.
,pp.
265,268vol.
2[14]Nandini,C.
;RaviKumar,C.
N.
,(2007)"Multi-BiometricsApproachforFacialRecognition,"ConferenceonComputationalIntelligenceandMultimediaApplications,2007.
InternationalConferenceon,vol.
2,no.
,pp.
417,422[15]Ngai,E.
C.
-H.
;Lyu,M.
R.
;Chin,R.
T.
,(2004)"Anauthenticationserviceagainstdishonestusersinmobileadhocnetworks,"AerospaceConference,2004.
Proceedings.
2004IEEE,vol.
2,no.
,pp.
1275,1285Vol.
2[16]Podio,F.
L.
,(2002)"Personalauthenticationthroughbiometrictechnologies,"NetworkedAppliances,2002.
Gaithersburg.
Proceedings.
2002IEEE4thInternationalWorkshopon,vol.
,no.
,pp.
57,66[17]Xiao,Q.
(2004)"Abiometricauthenticationapproachforhighsecurityad-hocnetworks,"InformationAssuranceWorkshop,2004.
ProceedingsfromtheFifthAnnualIEEESMC,vol.
,no.
,pp.
250,256[18]Rane,S.
;YeWang;Draper,S.
C.
;Ishwar,P.
,(2013)"SecureBiometrics:Concepts,AuthenticationArchitectures,andChallenges,"SignalProcessingMagazine,IEEE,vol.
30,no.
5,pp.
51,64[19]Rashid,R.
A.
;Mahalin,N.
H.
;Sarijari,M.
A.
;AbdulAziz,A.
A.
,(2008)"Securitysystemusingbiometrictechnology:DesignandimplementationofVoiceRecognitionSystem(VRS),"ComputerandCommunicationEngineering,2008.
ICCCE2008.
InternationalConferenceon,vol.
,no.
,pp.
898,902[20]Tang,H.
,Salmanian,M.
&Chang,C.
(2007).
StrongAuthenticationforTacticalMobileAdHocNetworks.
DefenceResearchandDevelopmentCanadaOttawaTM2007-146ScientificResearchJournal(SCIRJ),Volume2,Issue1,January201448ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournal[21]Tittel,E.
,Chapple,M.
&Stewart,J.
M.
(2003).
CertifiedInformationSystemsSecurityProfessional.
CA:SYBEXInc.
[22]Wikipedia(2014).
Mobileadhocnetwork.
Availableat:http://en.
wikipedia.
org/wiki/Mobile_ad_hoc_networks(Accessed:11January2014).
[23]Yahaya,Y.
H.
;Isa,M.
;Aziz,M.
I.
,(2009)"FingerprintBiometricsAuthenticationonSmartCard,"ComputerandElectricalEngineering,2009.
ICCEE'09.
SecondInternationalConferenceon,vol.
2,no.
,pp.
671,673[24]Zhang,Y.
&Abdulla,W.
H.
,(2008)"VoiceasaRobustBiometrics,"FutureGenerationCommunicationandNetworking,2008.
FGCN'08.
SecondInternationalConferenceon,vol.
3,no.
,pp.
41,46[25]ShanAo;WeiyinRen;ShoulianTang,(2008)"AnalysisandReflectionontheSecurityofBiometricsSystem,"WirelessCommunications,NetworkingandMobileComputing,2008.
WiCOM'08.
4thInternationalConference,vol.
,no.
,pp.
1,5
hostkvm怎么样?hostkvm是一家国内老牌主机商家,商家主要销售KVM架构的VPS,目前有美国、日本、韩国、中国香港等地的服务,站长目前还持有他家香港CN2线路的套餐,已经用了一年多了,除了前段时间香港被整段攻击以外,一直非常稳定,是做站的不二选择,目前商家针对香港云地和韩国机房的套餐进行7折优惠,其他套餐为8折,商家支持paypal和支付宝付款。点击进入:hostkvm官方网站地址hos...
? ? ? ?创梦网络怎么样,创梦网络公司位于四川省达州市,属于四川本地企业,资质齐全,IDC/ISP均有,从创梦网络这边租的服务器均可以****,属于一手资源,高防机柜、大带宽、高防IP业务,另外创梦网络近期还会上线四川联通大带宽,四川联通高防IP,一手整CIP段,四川电信,联通高防机柜,CN2专线相关业务。成都优化线路,机柜租用、服务器云服务器租用,适合建站做游戏,不须要在套CDN,全国访问快...
美国服务器哪家平台好?美国服务器无需备案,即开即用,上线快。美国服务器多数带防御,且有时候项目运营的时候,防御能力是用户考虑的重点,特别是网站容易受到攻击的行业。现在有那么多美国一年服务器,哪家的美国云服务器好呢?美国服务器用哪家好?这里推荐易探云,有美国BGP、美国CN2、美国高防、美国GIA等云服务器,线路优化的不错。易探云刚好就是做香港及美国云服务器的主要商家之一,我们来看一下易探云美国云服...
250.pp.com为你推荐
沙滩捡12块石头价值近百万圣经中约旦河边的十二个石头neworientalbecoming什么么意思特朗普取消访问丹麦特朗普访华后还会去那里?阿丽克丝·布莱肯瑞吉唐吉诃德·多弗朗明哥知道什么秘密百度关键词价格查询百度竞价关键词价格查询,帮忙查几个词儿点击一次多少钱,thanks同ip网站同IP的两个网站,做单向链接,会不会被K掉??www.qq530.com谁能给我一个听歌的网站?www.119mm.com看电影上什么网站??789se.comhttp://gv789.com/index.php这个网站可信吗?是真的还是假的!杨丽晓博客杨丽晓是怎么 出道的
m3型虚拟主机 过期域名查询 河南vps bash漏洞 轻博客 租空间 panel1 重庆双线服务器托管 Updog cxz 监控服务器 东莞服务器托管 万网服务器 privatetracker 湖南铁通 websitepanel 架设代理服务器 赵荣 主机系统 免费空间申请 更多