Possession250.pp.com
250.pp.com 时间:2021-03-22 阅读:(
)
ScientificResearchJournal(SCIRJ),Volume2,Issue1,January201443ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalImprovingtheSecurityofMANETsOrientedMilitaryIntelligenceusingBiometricsAuthenticationTechnologiesJuliusN.
Obidinnu1(obijulius@yahoo.
com)AyeiE.
Ibor2(ayei.
ibor@gmail.
com)S.
O.
O.
Duke3(orokduke2003@yahoo.
com)1,2,3:DepartmentofComputerScience,CrossRiverUniversityofTechnology,Calabar,NigeriaAbstract-Inmanypartsoftheworld,themilitaryhasbeenverybusyinrecenttimesengaginginterrorandotherrelatedwars.
Thisrequiresthatmenandmaterialshavetobelocatedindifferentpartsoftheirstrategicgeographiccentres.
Andinordertoensureafastcommunicationwiththesebases,themilitaryoftendeploysMobileAd-hocNetworks(MANETs).
MANETscarrysuchintelligenceinformationas:deploymentinformation,readinessinformation,andorderofbattleplanstotheirvariousbases.
Thenatureoftheseinformationissuchthatanycompromiseonthemcouldbedisastroustothecoursesofactionofthebases.
ThispaperidentifiesuserauthenticationasakeyissueinstrengtheningsecurityconcernsinMANETs.
Thepaperfurtheradoptsbiometricstechnologiesasthetrendingoptionsforthepurposeofobtainingatruerreflectionoftheidentitiesoftheusersofad-hocnetworks.
Thispapertherefore,reviewsvariousbiometricstechnologyimplementationstrategiesavailable,andrecommendstheadoptionofone,oracombinationofthembymilitarybases.
Thebenefitsprovidedbythistechnologyarealsopresented.
IndexTerms-MilitaryBase,BiometricsTechnology,Authentication,MANET,InformationsecurityI.
INTRODUCTIONMostmilitarybasesrequiretheuseofMobileAd-hocNetworks(MANETs)toestablishcommunicationsbetweenthelargenumbersofmobiledevicesdeployedinthebattlefield[17].
Itistherefore,instructivetostatethatthecomputersystemsinmilitaryMANETscontainsensitiveinformation,whichoftenmakesthemattractivetargetstounauthorisedaccesses.
Tittel,ChappleandStewartin[21]providealistofsomeofthesensitiveinformation,whichalsoincludesmilitarydescriptiveintelligencesuchas:deploymentinformation,readinessinformation,andorderofbattleplans.
Illegalaccesstotheseclassesofmilitaryintelligencecouldcompromiseinvestigations,disruptmilitaryplanning,andthreatennationalsecurity.
Atalltimestherefore,itiscrucialthatthecomputersystemsinmilitaryMANETsshouldbeprotectedfromintruders.
Consequently,thispaperreviewsoneofthecriticalsecurityprotectionstepsthatensuresthatonlyauthorisedpersonnelgainaccesstothesystemsinthemilitaryMANETs.
Consequently,weadoptthepositionof[15],whoidentifiesuserauthenticationasoneofthekeyissuesinmanagingsecurityconcernsinMANETs.
Andintheopinionofthereferredauthor,accesstoad-hocnetworksisdynamicandcontext-sensitive,therebymakingusers'authenticationtobeontheflywithtemporaryaccesstoresources.
Accordingly,informationleakageonmilitaryintelligencecouldoccurintheprocess.
Theseinformationleakagescanbeavoided.
Therefore,[16]advocatesthattheexactidentitiesoftheusersofthead-hocnetworks'shouldbeaccuratelyverifiableatanyinstanceofitsusage.
Theadvocacyintheprecedingparagraphservesasthemotivationforthispaper,whichreviewsexistingauthenticationprocesses,andidentifiesthebiometricstechnologiesasthetrendingoptionsforthepurposeofobtainingatruerreflectionoftheidentitiesoftheusersofad-hocnetworks.
Thispapertherefore,reviewsvariousbiometricstechnologyimplementationstrategiesavailable,andrecommendstheadoptionofoneoracombinationofthembymilitarybases.
II.
IMPORTANCEOFAUTHENTICATIONINMILITARYMANETsWikipediain[22]definesamobilead-hocnetwork(MANET)asawireless,self-configuring,infrastructure-lessnetworkofmobiledevices,deployedoftentimesforaninterimpurpose.
Andtheyareimportanttothemilitarybecausetheypossessthefeaturesofquicksetup,takedown,andmobilityfeatures.
MANETsaretherefore,especiallyusefultothemilitary,sincetheyserveaschannelsthroughwhichtheycommunicateinordertostrategize,command,control,andoperatetheirforcesintheirrespectiveenvironments,inland,sea,orair[20].
However,communicationswithinMANETrequireshavinglegalaccesstothedevices,asanythingtothecontrarywillleadtoinformationleakageonmilitaryintelligencetotheopponents.
Andavailabilityofmilitaryintelligenceinthehandsofanenemyisabadomenforsuchamilitarybase.
Consequently,itbecomesnecessarytoensurethattheidentityofapersonordevicethatattemptstogainaccesstothenetworkshouldbeauthenticated.
Itistherefore,inlinewiththispositionthat[20]identifiesauthenticationasthefirstlineofdefenceinsecuringMANETnetworks.
Authenticationisanyprocessbywhichasystemverifiestheidentityofauserwhowishestoaccessit[6].
AuthenticationisimportantinMANETs,asitensuressecureconnectionswitharequestingentityintoanetwork[2].
AndauthenticationinScientificResearchJournal(SCIRJ),Volume2,Issue1,January201444ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalMANETscanbebasedondifferentmechanisms.
Wediscussthesemechanismsinthenextsection.
III.
AUTHENTICATIONMECHANISMSAllowingaccesstoonlyauthorisedusersanddisallowingaccesstotheunauthorisedonesisafundamentalaspectofauthentication.
Authenticationprocessesarebasedlargelyonthreemethods.
Thesemethodsinclude:Whatweknow–passwords,pincodesandotherpersonaldetailscanbeusedtoidentifyusersofaparticularsystemWhatwehave–tokenssuchassmartcardsorkeyfobarealsousedforuserauthenticationWhatweare–here,biometricfeaturessuchasfingerprintscans,irisscans,palmbiometricsaredeployedforallowingaccesstocontrolledenvironments[23],[17],[16]and[12].
Authenticationby'whatweknow'and'whatwehave'increasesthelikelihoodofidentitytheftastheuseofpasswordsortokensisnotnecessarilytiedtotheidentityoftherealownerofthepasswordortoken[5].
Inhisstudy,[17]highlightsthatthereareconsequencesattributedtosettingupcommunicationwithauserthathasanunknownidentity.
Aknowledgefactorsuchasapasswordisnotentirelysecureasitcanbeeasilyguessed,interceptedortransferredtoanotheruser[23].
IntheeventofUserAdivulginghisauthenticationparametersuchasapasswordtoUserBintentionallyoraccidentally,itwillbedifficulttocapturetheidentityoftheloggedinuser.
Moreso,simplepasswordscanbeeasilyguessedorcrackedthroughbruteforceordictionaryattackswhilecomplexonescaneasilybeforgotten.
Thoughtherearevariousmechanismstoprotectpasswordssuchasresettingthemregularlyorusingpasswordshints,authenticationwiththeuseofpasswordsisfastbecomingproblematicduetothesophisticatednatureoftechnologyandthepervasiveInternetthatallowsaccesstoallcategoriesofinformation,someofwhichhavefarreachingimpactondigitalassets[3].
NandiniandRaviKumarin[14]describe'whatusershave'asknowledgebasedauthenticationalsocalledpossessionfactors.
Possessionfactorshavefoundwidespreadusageinrecenttimes,astheyhaveaddedanotherlevelofsecuritytoauthentication.
Mostof'whatusershave'technologiesarebasedonatwofactorauthenticationmechanism,withPINsorpasswordsassecondaryauthenticationfeatures.
Usingasmartcardorkeyfob,forinstance,isagreatwaytoenhanceprivacy.
Mostofthesmartcardshavetheuser'sinformationengravedinthemwithpeculiarattributesthatmapstheidentityoftheusertothecard.
Thoughthiscreatesasenseofsecurityforthenumeroususersacrosstheglobe,theuseoftokensissubjecttoreplayandactiveattacks[13],[25].
However,possessionfactorscanbelost,stolenordamaged[12].
Insuchasituation,replacingthemisnecessary.
Butthereisthepossibilityofusingthemtocommitcrimebeforetheycanberetrieved.
Thiscancreateproblemsfortheowner.
Sinceacardownermayhavehisnameengravedonacard,usingitbyamalicioususer,iflost,willstillrecordatransactionagainstthecardowner.
Thisisaserioussecurityconcern.
Letusassumethatasmartcardthatgrantsaccesstoamilitarydatabasefallsintothehandsofanenemysoldierorgroupofsoldiers.
Inthesamevein,letusassumethatthiscardbelongstoasystemadministratorthathasrootorsystemprivilegesinacontrolledsystem.
Thestatedscenariocanleadtosevereconsequencesincludingdivulgenceofmilitaryintelligence,interceptionofmilitaryoperations,distortionordeletionofsensitiveclassifieddataaswellaslossofenormousdigitalassetssuchasfilesandeventhecompletedatabase.
Amoresecuredwayofhardeningthesecurityofthesysteminthisscenarioisbydeployingamechanismthatallowstheuseofthephysiologicalfeaturesoftheauthoriseduser.
Shanetalin[25]assertsthattheuseofbiometricsisunderpinnedbymeasurablephysiologicaltraitsandbehaviouralcharacteristicsthatserveasidentityparametersforanindividual.
Thisassertionimpliesthattheuseofbiometricsisnotsubjecttoauthenticationillssuchasrepudiation,impersonationandidentityspoofing,sinceeachindividual'sphysiologicaltraitsareuniquetotheindividualandarenottransferable.
ChettyandWagnerin[3]agreethatbiometricauthenticationisbecominganinevitableaspectofinformationtechnologywiththeubiquitousnatureofcomputersystemsandnetworksacrosstheglobe.
Aselaboratedin[16],biometricsdoesnothavetoberememberedduringtheauthenticationprocessastheyareinherentfeaturesoftheindividualthatisbeingauthenticated.
Thisisincontrasttotheuseofpasswordsandtokenssuchassmartcards,whicharesubjecttotheft,sharingandloss([12],[14].
Relatedly,IchinoandYamazakiin[8]discusstheefficacyofbiometricauthenticationspecificallyunderpinnedbysoftbiometrics.
Inthestudy,theyclassifiedsoftbiometricsonthebasisoffacial,bodyandaccessorytraits.
Furthermore,theyassertthat,thoughsoftbiometricsmaynotbedistinctiveenoughtoidentifyindividualsuniquely,itcanbevaluableforenhancingbiometricauthenticationthroughthecategorisationofthecollectedtraits,suchaseyecolourandheightranges.
Inthesameway,[18]investigatestherobustnessofbiometricsforidentityverificationandaccesscontrol.
Sincebiometricfeaturesareintrinsictotheindividualtheyidentity,theypositthatforgettingorforgingthemlikepasswordsordocumentsisunlikely.
Theiranalysisofsecurebiometricswasleveragedbythedesignofanappropriatetrainingprocedureformatchingastoredbiometricsignalwithaprobeforonwarddecisionmakingduringauthentication.
Similarly,[1]proposedanencryptedirisauthenticationsystemforidentifyingandauthenticatingusersofawirelesssensornetworks.
Mostmilitaryoperationsaredependentonthedeploymentofwirelesssensornetworks(WSNs)forcommandandcontrol.
SinceWSNsaresimpletoimplementandmanage,usingbiometricsforidentificationandauthenticationprocesseswillenforceahighlysecureaccesscontrolsystemonthefly.
Authenticationthroughphysiologicaltraitssuchasfingertouches,facemovementorpalmprintwasdiscussedforpaymentsystemsin[10].
Thismethodofmakingpaymentscanbeenhancedtoallowforsecureauthenticationprocessesinmilitarysites.
MultimodalScientificResearchJournal(SCIRJ),Volume2,Issue1,January201445ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalbiometricauthenticationisalsoimportantforenhancingoperationalsecurity.
Asdiscussedin[5],multimodalbiometricsissuitableformobiledevicesincludingPersonalDigitalAssistants(PDAs),smartphonesandmobilesphones.
Sincethesedevicesareportable,theyaresubjecttolossandtheft.
Protectingthem,therefore,requirestheuseofanenhancedsecuritymechanismsuchasbiometricauthentication.
Theyproposedtheuseofteethimageandvoiceforauthentication.
Itisaknownfactthatthemilitarydeploysthelargestuseofmobiledevices,mostofwhichareembeddedsystemswithtacticsandmilitaryintelligence.
Ifauthenticationtosuchdevicesisleveragedbyteethimageandvoice,itwillbecomecomputationallydifficulttocircumventthesecurityofsuchadeviceintheeventofitsloss,theftormisplacement.
Biometricauthentication,therefore,ismoresecureinaccesscontrolmanagementaswellasidentityverificationespeciallyforcontrolleddomainswheretheexactidentityoftheuserbeingauthenticatedandallowedaccesstodigitalresourcescannotbecompromised.
IV.
APPLICABLEBIOMETRICTECHNOLOGYThebiometrictechnologyisleveragedbyanumberofmethodologiesthatcanbedeployedintherealisationofbiometricauthentication.
Someofthese,asdiscussedin[7]and[17]includethefollowing:a.
Palmbiometricsb.
Fingerprintauthenticationc.
Voicerecognitiond.
Signatureverificatione.
Irisscanandf.
FacialrecognitionAllofthesearenecessary.
However,thispaperfocusesonthefirstthreeabove:palmbiometrics,fingerprintauthenticationandvoicerecognition.
A.
PalmBiometricsPalmbiometricsisbasedontheuseofbiometrictraitsextractedfromthepalm(curvatureofthepalm,widthofthepalm,lengthoffingers,thicknessofthepalm,principallines,wrinkles,deltapointsetc[7])toverifytheidentityofapersoninacontrolledenvironment.
Theuseofpalmbiometrics,onitself,cannotguaranteeanefficientuseridentificationsystemwithoutbeingaugmentedbyotheridentificationmethodssuchastheuseofpersonalidentificationnumbers(PIN)asthehumanhandisnotunique.
Thereliabilityprovidedbypalmbiometricsinthecontextofverificationandauthenticationisconsiderablyhigh.
Nonrepudiationisenhancedasausercannotdenythataphysiologicaltraitsuchasapalmprintimagedoesnotbelongtohim/heronceloggedin.
Trackingusers'accessandtheuseofresourcescanbecontrolled.
Also,thereismoreconvenienceforusersandsystemadministratorsasincidencesofpasswordoridentificationcardtheftorlossmaynotbeobtainabletherebyenhancingefficiency.
Someofthekeyweaknessofpalmbiometricsisthatthesensordata,ifusedindependentlyofotherbiometricsources,canbenoisy.
Also,thehumanhandisnotcompletelyuniqueandassuchmaylackindividualityanduniversalityinrepresentingtheidentityofaparticularindividual.
Injuriesonthepalmaswellasgummypalmsmayleadtopoortemplatequalityculminatinginpoorperformancebythebiometricsystem.
Palmbiometricsshouldthereforebeusedincombinationwithotherbiometricsourcessuchasfingerprints,irisscansandvoicerecognitiontoprovideanefficientmultimodalauthenticationsystem.
Thoughpalmbiometricsdemonstratessomeweaknessesinitsimplementation,ithasagoodnumberofstrengthsasfollows:i.
Itcanbesuitableforoutdoorenvironmentssuchasmilitarysitesandcanbeusedtomanageahighthroughputofpeople.
ii.
Itprovidesafriendlyuserinterfacethatisrobustandintegrateseasilywiththeexistingaswellasthirdpartysystems.
iii.
Givesroomforeasymaintenanceandstorageasithasasmalltemplatesizethatcanbeintegratedinalargedatabase.
iv.
Itisinexpensivetoimplementandoffersexcellentreturnoninvestmentaswellaswidespreadacceptance.
v.
Highlyreliableandaccurate.
vi.
Itprovideseffectivesecurity,whichismorerobustwhencomparedtotraditionalmethodssuchastheuseofpasswordsandidentificationcards.
vii.
Sincethebiometricfeaturesextractedduringenrolmentareinherenttoaparticularindividual,fraudandrepudiationcanbeeliminatedduringauthentication.
Thismaynotbeunconnectedwiththefactthatoncestored,palmbiometrictraitsarenottransferable;thatis,theycannotbeshared,stolen,lostorforgotten.
B.
FingerprintAuthenticationThereisaproliferationintheuseoffingerprintauthenticationinrecenttimes[11],[4].
Thiscanbeseeninmostmobilephoneserviceproviders.
Theuseoffingerprintsforidentificationandverificationisborneoutofthefactthatthepatternsofridgesandfurrowsthatcharacteriseanindividual'sfinger(mostespeciallythesurfaceofthefingertip)areuniquetoeachindividual[23],[9].
Fingerprintdevicesallowausertoaccessacontrolledenvironmentthroughfingerprintscans.
Podioin[16]maintainsthattheusermerelyplaceshisfingertipontheappropriatedevicetobeidentifiedandauthenticated.
Thispaveswayforsecureaccesscontrolandnetworkauthenticationmechanism.
However,fingerprintbiometricscanbegiventotheweaknessesofpalmbiometricsespeciallywhenthereisanaccumulationofskinoilsordirtonthesurfacesofsensorplates.
Theresultanteffectmaybefalserejectioninwhichcaseavaliduserfingerprintscanisrejectedasillegitimate.
Falseacceptancecanalsobeobtainableherewhereaninvalidfingerprintscanisacceptedasvalidforagivenusertransaction[7].
C.
VoiceRecognitionVoicerecognitionisbasedonthedistinctrateandpitchofsoundsproducedbythehumanvoice[19],aswellasotherScientificResearchJournal(SCIRJ),Volume2,Issue1,January201446ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalacousticfeaturesofspeechincludingtheshapeofthethroat,speakingstyleandsizeofthemouth[16].
Kounoudesetalin[12]mentionthatvoiceauthenticationisprecededbytheextractionofvoiceprints,whicharestoredduringtheenrolmentphaseandmatchedwithrawspeechdatacapturedbyvoicerecognitiondevicessuchasavoicespeakerormicrophone.
Xiaoin[17]identifiestwotypesoftechnologiesforvoicebiometricsnamelyvoicescansandspeechrecognition.
Themaindistinctionbetweenthetwotechnologiesisthatwhilevoicescansuseapre-storedvoicesampleoftheusertoauthenticateandverifytheidentityoftheuser,speechrecognitiondependsonwordsandsentencesfromanaudiosignal,whichformtheinputtoavoicerecognitiondevice.
ZhangandAbdullain[24]proposedavoicebiometricstechniquebasedonhumanauditorymodelsandindependentcomponentanalysis.
Theauditorymodelswerefoundtoachievebetteridentificationrateswithhighrobustnesstonoise.
Furthermore,Rashidetalin[19]implementedasecuritysystemthatallowsforvoicepatternsastheaccesscontrolkeytherebyenhancingtheaccuracyoftheauthenticationprocesssincevoicepatternsasseentobedistinctperindividual.
Thedesignoftheproposedauditorymodels,accesscontrolmechanism,andvoicerecognitionsystemissuitablefordeploymentinmilitarycontrolledenvironments.
Onemajoradvantageofvoicebiometricsisthatitdoesnotrequirephysicalcontactwiththeauthenticatingdevicethoughitcanbesubjecttobackgroundnoise,whichmayleadtoahighrateoffalserejection[12].
However,voicetemplates,ashighlightedin[16]aresmallinsizebasicallylessthan16kilobytesandcanberepresentedusingneuralnetworks,decisiontrees,patternmatchingalgorithmsandhiddenMarkovmodels.
V.
BIOMETRICAUTHENTICATIONPROCESSBiometricauthenticationisprecededbyanenrolmentprocedure.
Theenrolmentprocessrequirestheinitialcaptureofthebiometrictraits.
Asstatedin[11]and[23],thecapturedtraitsarepre-processedforfeatureextractionandstoredastemplatesintheauthenticatingdeviceordatabase.
Theperformanceofthebiometricsampleduringauthenticationisdependentonthequalityofthecapturedtemplate.
Figure1isarepresentationofaBiometricAuthenticationProcess.
Fig.
1:RepresentationofaBiometricAuthenticationprocessVerificationisanindispensableaspectofbiometricauthentication[16].
Auserwhosebiometricsamplehasbeenenrolledcanonlybeallowedaccesstoasystemsuchasduringaloginsessionbyverification.
Duringverification,thestoredbiometrictemplateiscomparedwiththesamplepresentedbytheuseratthepointofauthentication.
Accessisallowedwhenamatchisfoundandintheeventofamismatch,accessisdenied.
Verificationleadstoidentificationandusuallyinvolvesaone-to-manyorone-to-onematchingofthestoredtemplateinthedatabasewiththecapturedsample[25].
VI.
CONCLUSIONOneofthekeyissuesinmanagingauser'saccesstocriticalresourcesistheabilitytoallowonlytheauthorisedusersofasystemtosuchresources.
Overtheyears,identityspoofing,maninthemiddle,replayandactiveattackshaveleftmostmilitarybasespronetotheleakageofclassifiedinformationandintelligenceaswellasthecircumventionofestablishedsecurityprocedures.
Theconsequencesofsecuritybreachesaregraveandcanleadtolossoflives,propertyandrevenue.
Asseeninmostthirdworldcounties,whereterrorismisontheincrease,leakageofsensitiveinformationcancripplethebedrockofaneconomy.
Tothisend,providingadequateandenhancedauthenticationmechanismstocontrolledenvironmentscannotbeoveremphasised.
Onecanvividlyassessthatauthenticationthroughauser'sphysiologicalfeaturescancreateasenseofsecurity.
Thisisbecausethephysicalpresenceoftheuserincludinganaspectofhistraitswillbeinvolvedinidentifyinghim.
Biometrictraitsareinvariantinrepresentationandassuchclaimacertaindegreeofuniquenessanduniversality.
Thefingerprintimageofoneusercannotbeusedintheplaceofanotheruser.
Thisisauniversaltruth.
Consequently,itishighlyefficienttodeploybiometricauthenticationifthesystemadministratorisinterestedinmappingtheusersofasystemtotheirrealidentities.
Passwordandtokenauthenticationcannotguaranteenon-repudiation.
WecannotclaimthatauserwhologsintoaScientificResearchJournal(SCIRJ),Volume2,Issue1,January201447ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalsystemistheownerofthepasswordortokensuchassmartcardusedtogainaccesstothesystem.
Passwordsandtokenscanbelost,stolen,andarealsotransferable.
Withbiometricauthentication,suchweaknessescanbecontrolledsincetheusers'physiologicalandbehaviouraltraitsareunique,whichrequiresthephysicalpresenceoftheuseratthepointofauthenticationleveragedbytheuseoflivebiometricsamplesforidentificationandverification.
Thispaperhasbeenabletohighlighttheefficacyofbiometricauthenticationincriticalenvironmentssuchasthemilitary.
Thefocusonfutureworkshouldbeonbiometrictemplatesecurity.
Thisisborneoutofthefactthatacompromisedbiometrictemplate,whichisintrinsicallyinvariant,canleadtotheconstructionofartificialbiometrictemplatesthroughreverseengineeringifsuchatemplatefallsintothehandsofamalicioususer.
REFERENCES[1]Althobaiti,O.
;Al-Rodhaan,M.
;Al-Dhelaan,A.
,(2012)"Biometricaccesscontrolforwirelessnodes,"ComputationalAspectsofSocialNetworks(CASoN),2012FourthInternationalConferenceon,vol.
,no.
,pp.
167,174,21-23[2]Balfanz,D.
,Smetters,D.
K.
,Stewart,P.
,andChiWong,H.
(2002).
TalkingToStrangers:AuthenticationinAd-HocWirelessNetwork,ProceedingsofNetworkandDistributedSystemSecuritySymposium2002(NDSS'02),SanDiego,CA,February,2002.
[3]Chetty,G.
;Wagner,M.
,(2006)"Multi-LevelLivenessVerificationforFace-VoiceBiometricAuthentication,"BiometricConsortiumConference,2006BiometricsSymposium:SpecialSession,vol.
,no.
,pp.
1,6[4]Darwish,A.
A.
;Zaki,W.
M.
;Saad,O.
M.
;Nassar,N.
M.
;Schaefer,G.
,(2010)"HumanAuthenticationUsingFaceandFingerprintBiometrics,"ComputationalIntelligence,CommunicationSystemsandNetworks(CICSyN),2010SecondInternationalConferenceon,vol.
,no.
,pp.
274,278[5]Dong-JuKim;Kwang-SeokHong,(2008)"Multimodalbiometricauthenticationusingteethimageandvoiceinmobileenvironment,"ConsumerElectronics,IEEETransactionson,vol.
54,no.
4,pp.
1790,1797[6]HitachiIDSystemsInc.
(2014).
DefinitionofAuthentication.
Availableat:http://hitachi-id.
com/concepts/authentication.
html(Accessed:12January2014)[7]Yan,H.
&Long,D.
(2008)"ANovelBimodalIdentificationApproachBasedonHand-Print,"ImageandSignalProcessing,2008.
CISP'08.
Congresson,vol.
4,no.
,pp.
506,510[8]Ichino,M.
;Yamazaki,Y.
,(2013)"SoftBiometricsandItsApplicationtoSecurityandBusiness,"BiometricsandKanseiEngineering(ICBAKE),2013InternationalConferenceon,vol.
,no.
,pp.
314,319[9]Isa,M.
R.
M.
;Yahaya,Y.
H.
;Halip,M.
H.
M.
;Khairuddin,M.
A.
;Maskat,K.
,(2010)"ThedesignoffingerprintbiometricauthenticationonsmartcardforPULAPOTmainentrancesystem,"InformationTechnology(ITSim),2010InternationalSymposiumin,vol.
3,no.
,pp.
1,4[10]Yang,J.
(2010)"BiometricsVerificationTechniquesCombingwithDigitalSignatureforMultimodalBiometricsPaymentSystem,"Managementofe-Commerceande-Government(ICMeCG),2010FourthInternationalConferenceon,vol.
,no.
,pp.
405,410[11]Kannavara,R.
;Bourbakis,N.
G.
,(2009)"Fingerprintbiometricauthenticationbasedonlocalglobalgraphs,"Aerospace&ElectronicsConference(NAECON),ProceedingsoftheIEEE2009National,vol.
,no.
,pp.
200,204[12]Kounoudes,Anastasis;Kekatos,V.
;Mavromoustakos,S.
,(2006)"VoiceBiometricAuthenticationforEnhancingInternetServiceSecurity,"InformationandCommunicationTechnologies,2006.
ICTTA'06.
2nd,vol.
1,no.
,pp.
1020,1025[13]Dang,L.
,Kou,W.
,Xiao,Y.
(2005)"Animprovedschemeforunilateralasymmetricsmartcardauthentication,"AdvancedInformationNetworkingandApplications,2005.
AINA2005.
19thInternationalConferenceon,vol.
2,no.
,pp.
265,268vol.
2[14]Nandini,C.
;RaviKumar,C.
N.
,(2007)"Multi-BiometricsApproachforFacialRecognition,"ConferenceonComputationalIntelligenceandMultimediaApplications,2007.
InternationalConferenceon,vol.
2,no.
,pp.
417,422[15]Ngai,E.
C.
-H.
;Lyu,M.
R.
;Chin,R.
T.
,(2004)"Anauthenticationserviceagainstdishonestusersinmobileadhocnetworks,"AerospaceConference,2004.
Proceedings.
2004IEEE,vol.
2,no.
,pp.
1275,1285Vol.
2[16]Podio,F.
L.
,(2002)"Personalauthenticationthroughbiometrictechnologies,"NetworkedAppliances,2002.
Gaithersburg.
Proceedings.
2002IEEE4thInternationalWorkshopon,vol.
,no.
,pp.
57,66[17]Xiao,Q.
(2004)"Abiometricauthenticationapproachforhighsecurityad-hocnetworks,"InformationAssuranceWorkshop,2004.
ProceedingsfromtheFifthAnnualIEEESMC,vol.
,no.
,pp.
250,256[18]Rane,S.
;YeWang;Draper,S.
C.
;Ishwar,P.
,(2013)"SecureBiometrics:Concepts,AuthenticationArchitectures,andChallenges,"SignalProcessingMagazine,IEEE,vol.
30,no.
5,pp.
51,64[19]Rashid,R.
A.
;Mahalin,N.
H.
;Sarijari,M.
A.
;AbdulAziz,A.
A.
,(2008)"Securitysystemusingbiometrictechnology:DesignandimplementationofVoiceRecognitionSystem(VRS),"ComputerandCommunicationEngineering,2008.
ICCCE2008.
InternationalConferenceon,vol.
,no.
,pp.
898,902[20]Tang,H.
,Salmanian,M.
&Chang,C.
(2007).
StrongAuthenticationforTacticalMobileAdHocNetworks.
DefenceResearchandDevelopmentCanadaOttawaTM2007-146ScientificResearchJournal(SCIRJ),Volume2,Issue1,January201448ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournal[21]Tittel,E.
,Chapple,M.
&Stewart,J.
M.
(2003).
CertifiedInformationSystemsSecurityProfessional.
CA:SYBEXInc.
[22]Wikipedia(2014).
Mobileadhocnetwork.
Availableat:http://en.
wikipedia.
org/wiki/Mobile_ad_hoc_networks(Accessed:11January2014).
[23]Yahaya,Y.
H.
;Isa,M.
;Aziz,M.
I.
,(2009)"FingerprintBiometricsAuthenticationonSmartCard,"ComputerandElectricalEngineering,2009.
ICCEE'09.
SecondInternationalConferenceon,vol.
2,no.
,pp.
671,673[24]Zhang,Y.
&Abdulla,W.
H.
,(2008)"VoiceasaRobustBiometrics,"FutureGenerationCommunicationandNetworking,2008.
FGCN'08.
SecondInternationalConferenceon,vol.
3,no.
,pp.
41,46[25]ShanAo;WeiyinRen;ShoulianTang,(2008)"AnalysisandReflectionontheSecurityofBiometricsSystem,"WirelessCommunications,NetworkingandMobileComputing,2008.
WiCOM'08.
4thInternationalConference,vol.
,no.
,pp.
1,5
Megalayer 商家主营业务是以独立服务器和站群服务器的,后来也陆续的有新增香港、菲律宾数据中心的VPS主机产品。由于其线路的丰富,还是深受一些用户喜欢的,有CN2优化直连线路,有全向国际线路,以及针对欧美的国际线路。这次有看到商家也有新增美国机房的VPS主机,也有包括15M带宽CN2优化带宽以及30M带宽的全向线路。Megalayer 商家提供的美国机房VPS产品,提供的配置方案也是比较多,...
易探云服务器怎么过户/转让?易探云支持云服务器PUSH功能,该功能可将云服务器过户给指定用户。可带价PUSH,收到PUSH请求的用户在接收云服务器的同时,系统会扣除接收方的款项,同时扣除相关手续费,然后将款项打到发送方的账户下。易探云“PUSH服务器”的这一功能,可以让用户将闲置云服务器转让给更多需要购买的用户!易探云服务器怎么过户/PUSH?1.PUSH双方必须为认证用户:2.买家未接收前,卖家...
georgedatacenter怎么样?GeorgeDatacenter是一家2017年成立的美国商家,正规注册公司(REG: 10327625611),其实是oneman。现在有优惠,有几款特价VPS,基于Vmware。支持Paypal付款。GeorgeDatacenter目前推出的一款美国vps,2核/8GB内存/250GB NVMe空间/2TB流量/1Gbps端口/Vmware/洛杉矶/达拉...
250.pp.com为你推荐
嘉兴商标注册我在濮院想注册一个羊毛衫商标?该怎么做?同ip网站查询服务器禁PING 是不是就可以解决同IP网站查询问题22zizi.com河南福利彩票22选52010175开奖结果seo优化工具SEO优化要用到什么软件?百度指数词什么是百度指数www.kaspersky.com.cn卡巴斯基杀毒软件有免费的吗?稳定版的怎么找?www.idanmu.com新开奇迹SF|再创发布网|奇迹SF|奇迹mu|网通奇迹|电信奇迹|邯郸纠风网河北邯郸有几个县个名单非法集资邯郸纠风网邯郸媒体曝光电话多少www.seowhy.com如何快速做外链
移动服务器租用 服务器配置技术网 企业主机 wdcp 512m内存 空间服务商 台湾谷歌地址 ftp免费空间 东莞服务器 云服务器比较 德讯 qq金券 万网空间 免费蓝钻 免费稳定空间 广州服务器托管 腾讯服务器 美国代理服务器 发证机构 alexa搜 更多