Possession250.pp.com

250.pp.com  时间:2021-03-22  阅读:()
ScientificResearchJournal(SCIRJ),Volume2,Issue1,January201443ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalImprovingtheSecurityofMANETsOrientedMilitaryIntelligenceusingBiometricsAuthenticationTechnologiesJuliusN.
Obidinnu1(obijulius@yahoo.
com)AyeiE.
Ibor2(ayei.
ibor@gmail.
com)S.
O.
O.
Duke3(orokduke2003@yahoo.
com)1,2,3:DepartmentofComputerScience,CrossRiverUniversityofTechnology,Calabar,NigeriaAbstract-Inmanypartsoftheworld,themilitaryhasbeenverybusyinrecenttimesengaginginterrorandotherrelatedwars.
Thisrequiresthatmenandmaterialshavetobelocatedindifferentpartsoftheirstrategicgeographiccentres.
Andinordertoensureafastcommunicationwiththesebases,themilitaryoftendeploysMobileAd-hocNetworks(MANETs).
MANETscarrysuchintelligenceinformationas:deploymentinformation,readinessinformation,andorderofbattleplanstotheirvariousbases.
Thenatureoftheseinformationissuchthatanycompromiseonthemcouldbedisastroustothecoursesofactionofthebases.
ThispaperidentifiesuserauthenticationasakeyissueinstrengtheningsecurityconcernsinMANETs.
Thepaperfurtheradoptsbiometricstechnologiesasthetrendingoptionsforthepurposeofobtainingatruerreflectionoftheidentitiesoftheusersofad-hocnetworks.
Thispapertherefore,reviewsvariousbiometricstechnologyimplementationstrategiesavailable,andrecommendstheadoptionofone,oracombinationofthembymilitarybases.
Thebenefitsprovidedbythistechnologyarealsopresented.
IndexTerms-MilitaryBase,BiometricsTechnology,Authentication,MANET,InformationsecurityI.
INTRODUCTIONMostmilitarybasesrequiretheuseofMobileAd-hocNetworks(MANETs)toestablishcommunicationsbetweenthelargenumbersofmobiledevicesdeployedinthebattlefield[17].
Itistherefore,instructivetostatethatthecomputersystemsinmilitaryMANETscontainsensitiveinformation,whichoftenmakesthemattractivetargetstounauthorisedaccesses.
Tittel,ChappleandStewartin[21]providealistofsomeofthesensitiveinformation,whichalsoincludesmilitarydescriptiveintelligencesuchas:deploymentinformation,readinessinformation,andorderofbattleplans.
Illegalaccesstotheseclassesofmilitaryintelligencecouldcompromiseinvestigations,disruptmilitaryplanning,andthreatennationalsecurity.
Atalltimestherefore,itiscrucialthatthecomputersystemsinmilitaryMANETsshouldbeprotectedfromintruders.
Consequently,thispaperreviewsoneofthecriticalsecurityprotectionstepsthatensuresthatonlyauthorisedpersonnelgainaccesstothesystemsinthemilitaryMANETs.
Consequently,weadoptthepositionof[15],whoidentifiesuserauthenticationasoneofthekeyissuesinmanagingsecurityconcernsinMANETs.
Andintheopinionofthereferredauthor,accesstoad-hocnetworksisdynamicandcontext-sensitive,therebymakingusers'authenticationtobeontheflywithtemporaryaccesstoresources.
Accordingly,informationleakageonmilitaryintelligencecouldoccurintheprocess.
Theseinformationleakagescanbeavoided.
Therefore,[16]advocatesthattheexactidentitiesoftheusersofthead-hocnetworks'shouldbeaccuratelyverifiableatanyinstanceofitsusage.
Theadvocacyintheprecedingparagraphservesasthemotivationforthispaper,whichreviewsexistingauthenticationprocesses,andidentifiesthebiometricstechnologiesasthetrendingoptionsforthepurposeofobtainingatruerreflectionoftheidentitiesoftheusersofad-hocnetworks.
Thispapertherefore,reviewsvariousbiometricstechnologyimplementationstrategiesavailable,andrecommendstheadoptionofoneoracombinationofthembymilitarybases.
II.
IMPORTANCEOFAUTHENTICATIONINMILITARYMANETsWikipediain[22]definesamobilead-hocnetwork(MANET)asawireless,self-configuring,infrastructure-lessnetworkofmobiledevices,deployedoftentimesforaninterimpurpose.
Andtheyareimportanttothemilitarybecausetheypossessthefeaturesofquicksetup,takedown,andmobilityfeatures.
MANETsaretherefore,especiallyusefultothemilitary,sincetheyserveaschannelsthroughwhichtheycommunicateinordertostrategize,command,control,andoperatetheirforcesintheirrespectiveenvironments,inland,sea,orair[20].
However,communicationswithinMANETrequireshavinglegalaccesstothedevices,asanythingtothecontrarywillleadtoinformationleakageonmilitaryintelligencetotheopponents.
Andavailabilityofmilitaryintelligenceinthehandsofanenemyisabadomenforsuchamilitarybase.
Consequently,itbecomesnecessarytoensurethattheidentityofapersonordevicethatattemptstogainaccesstothenetworkshouldbeauthenticated.
Itistherefore,inlinewiththispositionthat[20]identifiesauthenticationasthefirstlineofdefenceinsecuringMANETnetworks.
Authenticationisanyprocessbywhichasystemverifiestheidentityofauserwhowishestoaccessit[6].
AuthenticationisimportantinMANETs,asitensuressecureconnectionswitharequestingentityintoanetwork[2].
AndauthenticationinScientificResearchJournal(SCIRJ),Volume2,Issue1,January201444ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalMANETscanbebasedondifferentmechanisms.
Wediscussthesemechanismsinthenextsection.
III.
AUTHENTICATIONMECHANISMSAllowingaccesstoonlyauthorisedusersanddisallowingaccesstotheunauthorisedonesisafundamentalaspectofauthentication.
Authenticationprocessesarebasedlargelyonthreemethods.
Thesemethodsinclude:Whatweknow–passwords,pincodesandotherpersonaldetailscanbeusedtoidentifyusersofaparticularsystemWhatwehave–tokenssuchassmartcardsorkeyfobarealsousedforuserauthenticationWhatweare–here,biometricfeaturessuchasfingerprintscans,irisscans,palmbiometricsaredeployedforallowingaccesstocontrolledenvironments[23],[17],[16]and[12].
Authenticationby'whatweknow'and'whatwehave'increasesthelikelihoodofidentitytheftastheuseofpasswordsortokensisnotnecessarilytiedtotheidentityoftherealownerofthepasswordortoken[5].
Inhisstudy,[17]highlightsthatthereareconsequencesattributedtosettingupcommunicationwithauserthathasanunknownidentity.
Aknowledgefactorsuchasapasswordisnotentirelysecureasitcanbeeasilyguessed,interceptedortransferredtoanotheruser[23].
IntheeventofUserAdivulginghisauthenticationparametersuchasapasswordtoUserBintentionallyoraccidentally,itwillbedifficulttocapturetheidentityoftheloggedinuser.
Moreso,simplepasswordscanbeeasilyguessedorcrackedthroughbruteforceordictionaryattackswhilecomplexonescaneasilybeforgotten.
Thoughtherearevariousmechanismstoprotectpasswordssuchasresettingthemregularlyorusingpasswordshints,authenticationwiththeuseofpasswordsisfastbecomingproblematicduetothesophisticatednatureoftechnologyandthepervasiveInternetthatallowsaccesstoallcategoriesofinformation,someofwhichhavefarreachingimpactondigitalassets[3].
NandiniandRaviKumarin[14]describe'whatusershave'asknowledgebasedauthenticationalsocalledpossessionfactors.
Possessionfactorshavefoundwidespreadusageinrecenttimes,astheyhaveaddedanotherlevelofsecuritytoauthentication.
Mostof'whatusershave'technologiesarebasedonatwofactorauthenticationmechanism,withPINsorpasswordsassecondaryauthenticationfeatures.
Usingasmartcardorkeyfob,forinstance,isagreatwaytoenhanceprivacy.
Mostofthesmartcardshavetheuser'sinformationengravedinthemwithpeculiarattributesthatmapstheidentityoftheusertothecard.
Thoughthiscreatesasenseofsecurityforthenumeroususersacrosstheglobe,theuseoftokensissubjecttoreplayandactiveattacks[13],[25].
However,possessionfactorscanbelost,stolenordamaged[12].
Insuchasituation,replacingthemisnecessary.
Butthereisthepossibilityofusingthemtocommitcrimebeforetheycanberetrieved.
Thiscancreateproblemsfortheowner.
Sinceacardownermayhavehisnameengravedonacard,usingitbyamalicioususer,iflost,willstillrecordatransactionagainstthecardowner.
Thisisaserioussecurityconcern.
Letusassumethatasmartcardthatgrantsaccesstoamilitarydatabasefallsintothehandsofanenemysoldierorgroupofsoldiers.
Inthesamevein,letusassumethatthiscardbelongstoasystemadministratorthathasrootorsystemprivilegesinacontrolledsystem.
Thestatedscenariocanleadtosevereconsequencesincludingdivulgenceofmilitaryintelligence,interceptionofmilitaryoperations,distortionordeletionofsensitiveclassifieddataaswellaslossofenormousdigitalassetssuchasfilesandeventhecompletedatabase.
Amoresecuredwayofhardeningthesecurityofthesysteminthisscenarioisbydeployingamechanismthatallowstheuseofthephysiologicalfeaturesoftheauthoriseduser.
Shanetalin[25]assertsthattheuseofbiometricsisunderpinnedbymeasurablephysiologicaltraitsandbehaviouralcharacteristicsthatserveasidentityparametersforanindividual.
Thisassertionimpliesthattheuseofbiometricsisnotsubjecttoauthenticationillssuchasrepudiation,impersonationandidentityspoofing,sinceeachindividual'sphysiologicaltraitsareuniquetotheindividualandarenottransferable.
ChettyandWagnerin[3]agreethatbiometricauthenticationisbecominganinevitableaspectofinformationtechnologywiththeubiquitousnatureofcomputersystemsandnetworksacrosstheglobe.
Aselaboratedin[16],biometricsdoesnothavetoberememberedduringtheauthenticationprocessastheyareinherentfeaturesoftheindividualthatisbeingauthenticated.
Thisisincontrasttotheuseofpasswordsandtokenssuchassmartcards,whicharesubjecttotheft,sharingandloss([12],[14].
Relatedly,IchinoandYamazakiin[8]discusstheefficacyofbiometricauthenticationspecificallyunderpinnedbysoftbiometrics.
Inthestudy,theyclassifiedsoftbiometricsonthebasisoffacial,bodyandaccessorytraits.
Furthermore,theyassertthat,thoughsoftbiometricsmaynotbedistinctiveenoughtoidentifyindividualsuniquely,itcanbevaluableforenhancingbiometricauthenticationthroughthecategorisationofthecollectedtraits,suchaseyecolourandheightranges.
Inthesameway,[18]investigatestherobustnessofbiometricsforidentityverificationandaccesscontrol.
Sincebiometricfeaturesareintrinsictotheindividualtheyidentity,theypositthatforgettingorforgingthemlikepasswordsordocumentsisunlikely.
Theiranalysisofsecurebiometricswasleveragedbythedesignofanappropriatetrainingprocedureformatchingastoredbiometricsignalwithaprobeforonwarddecisionmakingduringauthentication.
Similarly,[1]proposedanencryptedirisauthenticationsystemforidentifyingandauthenticatingusersofawirelesssensornetworks.
Mostmilitaryoperationsaredependentonthedeploymentofwirelesssensornetworks(WSNs)forcommandandcontrol.
SinceWSNsaresimpletoimplementandmanage,usingbiometricsforidentificationandauthenticationprocesseswillenforceahighlysecureaccesscontrolsystemonthefly.
Authenticationthroughphysiologicaltraitssuchasfingertouches,facemovementorpalmprintwasdiscussedforpaymentsystemsin[10].
Thismethodofmakingpaymentscanbeenhancedtoallowforsecureauthenticationprocessesinmilitarysites.
MultimodalScientificResearchJournal(SCIRJ),Volume2,Issue1,January201445ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalbiometricauthenticationisalsoimportantforenhancingoperationalsecurity.
Asdiscussedin[5],multimodalbiometricsissuitableformobiledevicesincludingPersonalDigitalAssistants(PDAs),smartphonesandmobilesphones.
Sincethesedevicesareportable,theyaresubjecttolossandtheft.
Protectingthem,therefore,requirestheuseofanenhancedsecuritymechanismsuchasbiometricauthentication.
Theyproposedtheuseofteethimageandvoiceforauthentication.
Itisaknownfactthatthemilitarydeploysthelargestuseofmobiledevices,mostofwhichareembeddedsystemswithtacticsandmilitaryintelligence.
Ifauthenticationtosuchdevicesisleveragedbyteethimageandvoice,itwillbecomecomputationallydifficulttocircumventthesecurityofsuchadeviceintheeventofitsloss,theftormisplacement.
Biometricauthentication,therefore,ismoresecureinaccesscontrolmanagementaswellasidentityverificationespeciallyforcontrolleddomainswheretheexactidentityoftheuserbeingauthenticatedandallowedaccesstodigitalresourcescannotbecompromised.
IV.
APPLICABLEBIOMETRICTECHNOLOGYThebiometrictechnologyisleveragedbyanumberofmethodologiesthatcanbedeployedintherealisationofbiometricauthentication.
Someofthese,asdiscussedin[7]and[17]includethefollowing:a.
Palmbiometricsb.
Fingerprintauthenticationc.
Voicerecognitiond.
Signatureverificatione.
Irisscanandf.
FacialrecognitionAllofthesearenecessary.
However,thispaperfocusesonthefirstthreeabove:palmbiometrics,fingerprintauthenticationandvoicerecognition.
A.
PalmBiometricsPalmbiometricsisbasedontheuseofbiometrictraitsextractedfromthepalm(curvatureofthepalm,widthofthepalm,lengthoffingers,thicknessofthepalm,principallines,wrinkles,deltapointsetc[7])toverifytheidentityofapersoninacontrolledenvironment.
Theuseofpalmbiometrics,onitself,cannotguaranteeanefficientuseridentificationsystemwithoutbeingaugmentedbyotheridentificationmethodssuchastheuseofpersonalidentificationnumbers(PIN)asthehumanhandisnotunique.
Thereliabilityprovidedbypalmbiometricsinthecontextofverificationandauthenticationisconsiderablyhigh.
Nonrepudiationisenhancedasausercannotdenythataphysiologicaltraitsuchasapalmprintimagedoesnotbelongtohim/heronceloggedin.
Trackingusers'accessandtheuseofresourcescanbecontrolled.
Also,thereismoreconvenienceforusersandsystemadministratorsasincidencesofpasswordoridentificationcardtheftorlossmaynotbeobtainabletherebyenhancingefficiency.
Someofthekeyweaknessofpalmbiometricsisthatthesensordata,ifusedindependentlyofotherbiometricsources,canbenoisy.
Also,thehumanhandisnotcompletelyuniqueandassuchmaylackindividualityanduniversalityinrepresentingtheidentityofaparticularindividual.
Injuriesonthepalmaswellasgummypalmsmayleadtopoortemplatequalityculminatinginpoorperformancebythebiometricsystem.
Palmbiometricsshouldthereforebeusedincombinationwithotherbiometricsourcessuchasfingerprints,irisscansandvoicerecognitiontoprovideanefficientmultimodalauthenticationsystem.
Thoughpalmbiometricsdemonstratessomeweaknessesinitsimplementation,ithasagoodnumberofstrengthsasfollows:i.
Itcanbesuitableforoutdoorenvironmentssuchasmilitarysitesandcanbeusedtomanageahighthroughputofpeople.
ii.
Itprovidesafriendlyuserinterfacethatisrobustandintegrateseasilywiththeexistingaswellasthirdpartysystems.
iii.
Givesroomforeasymaintenanceandstorageasithasasmalltemplatesizethatcanbeintegratedinalargedatabase.
iv.
Itisinexpensivetoimplementandoffersexcellentreturnoninvestmentaswellaswidespreadacceptance.
v.
Highlyreliableandaccurate.
vi.
Itprovideseffectivesecurity,whichismorerobustwhencomparedtotraditionalmethodssuchastheuseofpasswordsandidentificationcards.
vii.
Sincethebiometricfeaturesextractedduringenrolmentareinherenttoaparticularindividual,fraudandrepudiationcanbeeliminatedduringauthentication.
Thismaynotbeunconnectedwiththefactthatoncestored,palmbiometrictraitsarenottransferable;thatis,theycannotbeshared,stolen,lostorforgotten.
B.
FingerprintAuthenticationThereisaproliferationintheuseoffingerprintauthenticationinrecenttimes[11],[4].
Thiscanbeseeninmostmobilephoneserviceproviders.
Theuseoffingerprintsforidentificationandverificationisborneoutofthefactthatthepatternsofridgesandfurrowsthatcharacteriseanindividual'sfinger(mostespeciallythesurfaceofthefingertip)areuniquetoeachindividual[23],[9].
Fingerprintdevicesallowausertoaccessacontrolledenvironmentthroughfingerprintscans.
Podioin[16]maintainsthattheusermerelyplaceshisfingertipontheappropriatedevicetobeidentifiedandauthenticated.
Thispaveswayforsecureaccesscontrolandnetworkauthenticationmechanism.
However,fingerprintbiometricscanbegiventotheweaknessesofpalmbiometricsespeciallywhenthereisanaccumulationofskinoilsordirtonthesurfacesofsensorplates.
Theresultanteffectmaybefalserejectioninwhichcaseavaliduserfingerprintscanisrejectedasillegitimate.
Falseacceptancecanalsobeobtainableherewhereaninvalidfingerprintscanisacceptedasvalidforagivenusertransaction[7].
C.
VoiceRecognitionVoicerecognitionisbasedonthedistinctrateandpitchofsoundsproducedbythehumanvoice[19],aswellasotherScientificResearchJournal(SCIRJ),Volume2,Issue1,January201446ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalacousticfeaturesofspeechincludingtheshapeofthethroat,speakingstyleandsizeofthemouth[16].
Kounoudesetalin[12]mentionthatvoiceauthenticationisprecededbytheextractionofvoiceprints,whicharestoredduringtheenrolmentphaseandmatchedwithrawspeechdatacapturedbyvoicerecognitiondevicessuchasavoicespeakerormicrophone.
Xiaoin[17]identifiestwotypesoftechnologiesforvoicebiometricsnamelyvoicescansandspeechrecognition.
Themaindistinctionbetweenthetwotechnologiesisthatwhilevoicescansuseapre-storedvoicesampleoftheusertoauthenticateandverifytheidentityoftheuser,speechrecognitiondependsonwordsandsentencesfromanaudiosignal,whichformtheinputtoavoicerecognitiondevice.
ZhangandAbdullain[24]proposedavoicebiometricstechniquebasedonhumanauditorymodelsandindependentcomponentanalysis.
Theauditorymodelswerefoundtoachievebetteridentificationrateswithhighrobustnesstonoise.
Furthermore,Rashidetalin[19]implementedasecuritysystemthatallowsforvoicepatternsastheaccesscontrolkeytherebyenhancingtheaccuracyoftheauthenticationprocesssincevoicepatternsasseentobedistinctperindividual.
Thedesignoftheproposedauditorymodels,accesscontrolmechanism,andvoicerecognitionsystemissuitablefordeploymentinmilitarycontrolledenvironments.
Onemajoradvantageofvoicebiometricsisthatitdoesnotrequirephysicalcontactwiththeauthenticatingdevicethoughitcanbesubjecttobackgroundnoise,whichmayleadtoahighrateoffalserejection[12].
However,voicetemplates,ashighlightedin[16]aresmallinsizebasicallylessthan16kilobytesandcanberepresentedusingneuralnetworks,decisiontrees,patternmatchingalgorithmsandhiddenMarkovmodels.
V.
BIOMETRICAUTHENTICATIONPROCESSBiometricauthenticationisprecededbyanenrolmentprocedure.
Theenrolmentprocessrequirestheinitialcaptureofthebiometrictraits.
Asstatedin[11]and[23],thecapturedtraitsarepre-processedforfeatureextractionandstoredastemplatesintheauthenticatingdeviceordatabase.
Theperformanceofthebiometricsampleduringauthenticationisdependentonthequalityofthecapturedtemplate.
Figure1isarepresentationofaBiometricAuthenticationProcess.
Fig.
1:RepresentationofaBiometricAuthenticationprocessVerificationisanindispensableaspectofbiometricauthentication[16].
Auserwhosebiometricsamplehasbeenenrolledcanonlybeallowedaccesstoasystemsuchasduringaloginsessionbyverification.
Duringverification,thestoredbiometrictemplateiscomparedwiththesamplepresentedbytheuseratthepointofauthentication.
Accessisallowedwhenamatchisfoundandintheeventofamismatch,accessisdenied.
Verificationleadstoidentificationandusuallyinvolvesaone-to-manyorone-to-onematchingofthestoredtemplateinthedatabasewiththecapturedsample[25].
VI.
CONCLUSIONOneofthekeyissuesinmanagingauser'saccesstocriticalresourcesistheabilitytoallowonlytheauthorisedusersofasystemtosuchresources.
Overtheyears,identityspoofing,maninthemiddle,replayandactiveattackshaveleftmostmilitarybasespronetotheleakageofclassifiedinformationandintelligenceaswellasthecircumventionofestablishedsecurityprocedures.
Theconsequencesofsecuritybreachesaregraveandcanleadtolossoflives,propertyandrevenue.
Asseeninmostthirdworldcounties,whereterrorismisontheincrease,leakageofsensitiveinformationcancripplethebedrockofaneconomy.
Tothisend,providingadequateandenhancedauthenticationmechanismstocontrolledenvironmentscannotbeoveremphasised.
Onecanvividlyassessthatauthenticationthroughauser'sphysiologicalfeaturescancreateasenseofsecurity.
Thisisbecausethephysicalpresenceoftheuserincludinganaspectofhistraitswillbeinvolvedinidentifyinghim.
Biometrictraitsareinvariantinrepresentationandassuchclaimacertaindegreeofuniquenessanduniversality.
Thefingerprintimageofoneusercannotbeusedintheplaceofanotheruser.
Thisisauniversaltruth.
Consequently,itishighlyefficienttodeploybiometricauthenticationifthesystemadministratorisinterestedinmappingtheusersofasystemtotheirrealidentities.
Passwordandtokenauthenticationcannotguaranteenon-repudiation.
WecannotclaimthatauserwhologsintoaScientificResearchJournal(SCIRJ),Volume2,Issue1,January201447ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalsystemistheownerofthepasswordortokensuchassmartcardusedtogainaccesstothesystem.
Passwordsandtokenscanbelost,stolen,andarealsotransferable.
Withbiometricauthentication,suchweaknessescanbecontrolledsincetheusers'physiologicalandbehaviouraltraitsareunique,whichrequiresthephysicalpresenceoftheuseratthepointofauthenticationleveragedbytheuseoflivebiometricsamplesforidentificationandverification.
Thispaperhasbeenabletohighlighttheefficacyofbiometricauthenticationincriticalenvironmentssuchasthemilitary.
Thefocusonfutureworkshouldbeonbiometrictemplatesecurity.
Thisisborneoutofthefactthatacompromisedbiometrictemplate,whichisintrinsicallyinvariant,canleadtotheconstructionofartificialbiometrictemplatesthroughreverseengineeringifsuchatemplatefallsintothehandsofamalicioususer.
REFERENCES[1]Althobaiti,O.
;Al-Rodhaan,M.
;Al-Dhelaan,A.
,(2012)"Biometricaccesscontrolforwirelessnodes,"ComputationalAspectsofSocialNetworks(CASoN),2012FourthInternationalConferenceon,vol.
,no.
,pp.
167,174,21-23[2]Balfanz,D.
,Smetters,D.
K.
,Stewart,P.
,andChiWong,H.
(2002).
TalkingToStrangers:AuthenticationinAd-HocWirelessNetwork,ProceedingsofNetworkandDistributedSystemSecuritySymposium2002(NDSS'02),SanDiego,CA,February,2002.
[3]Chetty,G.
;Wagner,M.
,(2006)"Multi-LevelLivenessVerificationforFace-VoiceBiometricAuthentication,"BiometricConsortiumConference,2006BiometricsSymposium:SpecialSession,vol.
,no.
,pp.
1,6[4]Darwish,A.
A.
;Zaki,W.
M.
;Saad,O.
M.
;Nassar,N.
M.
;Schaefer,G.
,(2010)"HumanAuthenticationUsingFaceandFingerprintBiometrics,"ComputationalIntelligence,CommunicationSystemsandNetworks(CICSyN),2010SecondInternationalConferenceon,vol.
,no.
,pp.
274,278[5]Dong-JuKim;Kwang-SeokHong,(2008)"Multimodalbiometricauthenticationusingteethimageandvoiceinmobileenvironment,"ConsumerElectronics,IEEETransactionson,vol.
54,no.
4,pp.
1790,1797[6]HitachiIDSystemsInc.
(2014).
DefinitionofAuthentication.
Availableat:http://hitachi-id.
com/concepts/authentication.
html(Accessed:12January2014)[7]Yan,H.
&Long,D.
(2008)"ANovelBimodalIdentificationApproachBasedonHand-Print,"ImageandSignalProcessing,2008.
CISP'08.
Congresson,vol.
4,no.
,pp.
506,510[8]Ichino,M.
;Yamazaki,Y.
,(2013)"SoftBiometricsandItsApplicationtoSecurityandBusiness,"BiometricsandKanseiEngineering(ICBAKE),2013InternationalConferenceon,vol.
,no.
,pp.
314,319[9]Isa,M.
R.
M.
;Yahaya,Y.
H.
;Halip,M.
H.
M.
;Khairuddin,M.
A.
;Maskat,K.
,(2010)"ThedesignoffingerprintbiometricauthenticationonsmartcardforPULAPOTmainentrancesystem,"InformationTechnology(ITSim),2010InternationalSymposiumin,vol.
3,no.
,pp.
1,4[10]Yang,J.
(2010)"BiometricsVerificationTechniquesCombingwithDigitalSignatureforMultimodalBiometricsPaymentSystem,"Managementofe-Commerceande-Government(ICMeCG),2010FourthInternationalConferenceon,vol.
,no.
,pp.
405,410[11]Kannavara,R.
;Bourbakis,N.
G.
,(2009)"Fingerprintbiometricauthenticationbasedonlocalglobalgraphs,"Aerospace&ElectronicsConference(NAECON),ProceedingsoftheIEEE2009National,vol.
,no.
,pp.
200,204[12]Kounoudes,Anastasis;Kekatos,V.
;Mavromoustakos,S.
,(2006)"VoiceBiometricAuthenticationforEnhancingInternetServiceSecurity,"InformationandCommunicationTechnologies,2006.
ICTTA'06.
2nd,vol.
1,no.
,pp.
1020,1025[13]Dang,L.
,Kou,W.
,Xiao,Y.
(2005)"Animprovedschemeforunilateralasymmetricsmartcardauthentication,"AdvancedInformationNetworkingandApplications,2005.
AINA2005.
19thInternationalConferenceon,vol.
2,no.
,pp.
265,268vol.
2[14]Nandini,C.
;RaviKumar,C.
N.
,(2007)"Multi-BiometricsApproachforFacialRecognition,"ConferenceonComputationalIntelligenceandMultimediaApplications,2007.
InternationalConferenceon,vol.
2,no.
,pp.
417,422[15]Ngai,E.
C.
-H.
;Lyu,M.
R.
;Chin,R.
T.
,(2004)"Anauthenticationserviceagainstdishonestusersinmobileadhocnetworks,"AerospaceConference,2004.
Proceedings.
2004IEEE,vol.
2,no.
,pp.
1275,1285Vol.
2[16]Podio,F.
L.
,(2002)"Personalauthenticationthroughbiometrictechnologies,"NetworkedAppliances,2002.
Gaithersburg.
Proceedings.
2002IEEE4thInternationalWorkshopon,vol.
,no.
,pp.
57,66[17]Xiao,Q.
(2004)"Abiometricauthenticationapproachforhighsecurityad-hocnetworks,"InformationAssuranceWorkshop,2004.
ProceedingsfromtheFifthAnnualIEEESMC,vol.
,no.
,pp.
250,256[18]Rane,S.
;YeWang;Draper,S.
C.
;Ishwar,P.
,(2013)"SecureBiometrics:Concepts,AuthenticationArchitectures,andChallenges,"SignalProcessingMagazine,IEEE,vol.
30,no.
5,pp.
51,64[19]Rashid,R.
A.
;Mahalin,N.
H.
;Sarijari,M.
A.
;AbdulAziz,A.
A.
,(2008)"Securitysystemusingbiometrictechnology:DesignandimplementationofVoiceRecognitionSystem(VRS),"ComputerandCommunicationEngineering,2008.
ICCCE2008.
InternationalConferenceon,vol.
,no.
,pp.
898,902[20]Tang,H.
,Salmanian,M.
&Chang,C.
(2007).
StrongAuthenticationforTacticalMobileAdHocNetworks.
DefenceResearchandDevelopmentCanadaOttawaTM2007-146ScientificResearchJournal(SCIRJ),Volume2,Issue1,January201448ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournal[21]Tittel,E.
,Chapple,M.
&Stewart,J.
M.
(2003).
CertifiedInformationSystemsSecurityProfessional.
CA:SYBEXInc.
[22]Wikipedia(2014).
Mobileadhocnetwork.
Availableat:http://en.
wikipedia.
org/wiki/Mobile_ad_hoc_networks(Accessed:11January2014).
[23]Yahaya,Y.
H.
;Isa,M.
;Aziz,M.
I.
,(2009)"FingerprintBiometricsAuthenticationonSmartCard,"ComputerandElectricalEngineering,2009.
ICCEE'09.
SecondInternationalConferenceon,vol.
2,no.
,pp.
671,673[24]Zhang,Y.
&Abdulla,W.
H.
,(2008)"VoiceasaRobustBiometrics,"FutureGenerationCommunicationandNetworking,2008.
FGCN'08.
SecondInternationalConferenceon,vol.
3,no.
,pp.
41,46[25]ShanAo;WeiyinRen;ShoulianTang,(2008)"AnalysisandReflectionontheSecurityofBiometricsSystem,"WirelessCommunications,NetworkingandMobileComputing,2008.
WiCOM'08.
4thInternationalConference,vol.
,no.
,pp.
1,5

Vultr VPS韩国首尔机房速度和综合性能参数测试

Vultr 商家有新增韩国首尔机房,这个是继日本、新加坡之后的第三个亚洲机房。不过可以大概率知道肯定不是直连中国机房的,因为早期的日本机房有过直连后来取消的。今天准备体验看看VULTR VPS主机商的韩国首尔机房的云服务器的速度和性能。1、全球节点PING速度测试这里先通过PING测试工具看看全球几十个节点的PING速度。看到好像移动速度还不错。2、路由去程测试测试看看VULTR韩国首尔机房的节点...

gcorelabs:CDN业务节点分布100多个国家地区,免费版提供1T/月流量

卢森堡商家gcorelabs是个全球数据中心集大成的运营者,不但提供超过32个数据中心的VPS、13个数据中心的cloud(云服务器)、超过44个数据中心的独立服务器,还提供超过100个数据中心节点的CDN业务。CDN的总带宽容量超过50Tbps,支持免费测试! Gcorelabs根据业务分,有2套后台,分别是: CDN、流媒体平台、DDoS高防业务、块存储、cloud云服务器、裸金属服务器...

GeorgeDatacenter:洛杉矶/达拉斯/芝加哥/纽约vps云服务器;2核/8GB/250GB/2TB流量/1Gbps端口,$84/年

georgedatacenter怎么样?GeorgeDatacenter是一家2017年成立的美国商家,正规注册公司(REG: 10327625611),其实是oneman。现在有优惠,有几款特价VPS,基于Vmware。支持Paypal付款。GeorgeDatacenter目前推出的一款美国vps,2核/8GB内存/250GB NVMe空间/2TB流量/1Gbps端口/Vmware/洛杉矶/达拉...

250.pp.com为你推荐
咏春大师被ko练了十几年的 “ 咏春高手”~~被练一年空手道的轻易打败,难道如今的国术就像国足,不堪一击~~微信回应封杀钉钉微信违规操作被封了,甲骨文不满赔偿公司倒闭员工不满一年怎么赔偿甲骨文不满赔偿工作不满半年被辞退,请问赔偿金是怎么算的?www.983mm.comwww.47683.comlunwenjiancewritecheck论文检测准吗?同ip网站同IP网站9个越来越多,为什么?789se.com莫非现在的789mmm珍的com不管了www.javmoo.comjavimdb怎么看partnersonline国内有哪些知名的ACCA培训机构
pw域名 php探针 新站长网 web服务器架设软件 申请个人网页 php空间推荐 免费智能解析 实惠 测试网速命令 腾讯数据库 广东服务器托管 中国电信宽带测速 石家庄服务器 512内存 cx域名 server2008 alexa搜 压力测试工具 rewrite规则 极域网 更多