Possession250.pp.com

250.pp.com  时间:2021-03-22  阅读:()
ScientificResearchJournal(SCIRJ),Volume2,Issue1,January201443ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalImprovingtheSecurityofMANETsOrientedMilitaryIntelligenceusingBiometricsAuthenticationTechnologiesJuliusN.
Obidinnu1(obijulius@yahoo.
com)AyeiE.
Ibor2(ayei.
ibor@gmail.
com)S.
O.
O.
Duke3(orokduke2003@yahoo.
com)1,2,3:DepartmentofComputerScience,CrossRiverUniversityofTechnology,Calabar,NigeriaAbstract-Inmanypartsoftheworld,themilitaryhasbeenverybusyinrecenttimesengaginginterrorandotherrelatedwars.
Thisrequiresthatmenandmaterialshavetobelocatedindifferentpartsoftheirstrategicgeographiccentres.
Andinordertoensureafastcommunicationwiththesebases,themilitaryoftendeploysMobileAd-hocNetworks(MANETs).
MANETscarrysuchintelligenceinformationas:deploymentinformation,readinessinformation,andorderofbattleplanstotheirvariousbases.
Thenatureoftheseinformationissuchthatanycompromiseonthemcouldbedisastroustothecoursesofactionofthebases.
ThispaperidentifiesuserauthenticationasakeyissueinstrengtheningsecurityconcernsinMANETs.
Thepaperfurtheradoptsbiometricstechnologiesasthetrendingoptionsforthepurposeofobtainingatruerreflectionoftheidentitiesoftheusersofad-hocnetworks.
Thispapertherefore,reviewsvariousbiometricstechnologyimplementationstrategiesavailable,andrecommendstheadoptionofone,oracombinationofthembymilitarybases.
Thebenefitsprovidedbythistechnologyarealsopresented.
IndexTerms-MilitaryBase,BiometricsTechnology,Authentication,MANET,InformationsecurityI.
INTRODUCTIONMostmilitarybasesrequiretheuseofMobileAd-hocNetworks(MANETs)toestablishcommunicationsbetweenthelargenumbersofmobiledevicesdeployedinthebattlefield[17].
Itistherefore,instructivetostatethatthecomputersystemsinmilitaryMANETscontainsensitiveinformation,whichoftenmakesthemattractivetargetstounauthorisedaccesses.
Tittel,ChappleandStewartin[21]providealistofsomeofthesensitiveinformation,whichalsoincludesmilitarydescriptiveintelligencesuchas:deploymentinformation,readinessinformation,andorderofbattleplans.
Illegalaccesstotheseclassesofmilitaryintelligencecouldcompromiseinvestigations,disruptmilitaryplanning,andthreatennationalsecurity.
Atalltimestherefore,itiscrucialthatthecomputersystemsinmilitaryMANETsshouldbeprotectedfromintruders.
Consequently,thispaperreviewsoneofthecriticalsecurityprotectionstepsthatensuresthatonlyauthorisedpersonnelgainaccesstothesystemsinthemilitaryMANETs.
Consequently,weadoptthepositionof[15],whoidentifiesuserauthenticationasoneofthekeyissuesinmanagingsecurityconcernsinMANETs.
Andintheopinionofthereferredauthor,accesstoad-hocnetworksisdynamicandcontext-sensitive,therebymakingusers'authenticationtobeontheflywithtemporaryaccesstoresources.
Accordingly,informationleakageonmilitaryintelligencecouldoccurintheprocess.
Theseinformationleakagescanbeavoided.
Therefore,[16]advocatesthattheexactidentitiesoftheusersofthead-hocnetworks'shouldbeaccuratelyverifiableatanyinstanceofitsusage.
Theadvocacyintheprecedingparagraphservesasthemotivationforthispaper,whichreviewsexistingauthenticationprocesses,andidentifiesthebiometricstechnologiesasthetrendingoptionsforthepurposeofobtainingatruerreflectionoftheidentitiesoftheusersofad-hocnetworks.
Thispapertherefore,reviewsvariousbiometricstechnologyimplementationstrategiesavailable,andrecommendstheadoptionofoneoracombinationofthembymilitarybases.
II.
IMPORTANCEOFAUTHENTICATIONINMILITARYMANETsWikipediain[22]definesamobilead-hocnetwork(MANET)asawireless,self-configuring,infrastructure-lessnetworkofmobiledevices,deployedoftentimesforaninterimpurpose.
Andtheyareimportanttothemilitarybecausetheypossessthefeaturesofquicksetup,takedown,andmobilityfeatures.
MANETsaretherefore,especiallyusefultothemilitary,sincetheyserveaschannelsthroughwhichtheycommunicateinordertostrategize,command,control,andoperatetheirforcesintheirrespectiveenvironments,inland,sea,orair[20].
However,communicationswithinMANETrequireshavinglegalaccesstothedevices,asanythingtothecontrarywillleadtoinformationleakageonmilitaryintelligencetotheopponents.
Andavailabilityofmilitaryintelligenceinthehandsofanenemyisabadomenforsuchamilitarybase.
Consequently,itbecomesnecessarytoensurethattheidentityofapersonordevicethatattemptstogainaccesstothenetworkshouldbeauthenticated.
Itistherefore,inlinewiththispositionthat[20]identifiesauthenticationasthefirstlineofdefenceinsecuringMANETnetworks.
Authenticationisanyprocessbywhichasystemverifiestheidentityofauserwhowishestoaccessit[6].
AuthenticationisimportantinMANETs,asitensuressecureconnectionswitharequestingentityintoanetwork[2].
AndauthenticationinScientificResearchJournal(SCIRJ),Volume2,Issue1,January201444ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalMANETscanbebasedondifferentmechanisms.
Wediscussthesemechanismsinthenextsection.
III.
AUTHENTICATIONMECHANISMSAllowingaccesstoonlyauthorisedusersanddisallowingaccesstotheunauthorisedonesisafundamentalaspectofauthentication.
Authenticationprocessesarebasedlargelyonthreemethods.
Thesemethodsinclude:Whatweknow–passwords,pincodesandotherpersonaldetailscanbeusedtoidentifyusersofaparticularsystemWhatwehave–tokenssuchassmartcardsorkeyfobarealsousedforuserauthenticationWhatweare–here,biometricfeaturessuchasfingerprintscans,irisscans,palmbiometricsaredeployedforallowingaccesstocontrolledenvironments[23],[17],[16]and[12].
Authenticationby'whatweknow'and'whatwehave'increasesthelikelihoodofidentitytheftastheuseofpasswordsortokensisnotnecessarilytiedtotheidentityoftherealownerofthepasswordortoken[5].
Inhisstudy,[17]highlightsthatthereareconsequencesattributedtosettingupcommunicationwithauserthathasanunknownidentity.
Aknowledgefactorsuchasapasswordisnotentirelysecureasitcanbeeasilyguessed,interceptedortransferredtoanotheruser[23].
IntheeventofUserAdivulginghisauthenticationparametersuchasapasswordtoUserBintentionallyoraccidentally,itwillbedifficulttocapturetheidentityoftheloggedinuser.
Moreso,simplepasswordscanbeeasilyguessedorcrackedthroughbruteforceordictionaryattackswhilecomplexonescaneasilybeforgotten.
Thoughtherearevariousmechanismstoprotectpasswordssuchasresettingthemregularlyorusingpasswordshints,authenticationwiththeuseofpasswordsisfastbecomingproblematicduetothesophisticatednatureoftechnologyandthepervasiveInternetthatallowsaccesstoallcategoriesofinformation,someofwhichhavefarreachingimpactondigitalassets[3].
NandiniandRaviKumarin[14]describe'whatusershave'asknowledgebasedauthenticationalsocalledpossessionfactors.
Possessionfactorshavefoundwidespreadusageinrecenttimes,astheyhaveaddedanotherlevelofsecuritytoauthentication.
Mostof'whatusershave'technologiesarebasedonatwofactorauthenticationmechanism,withPINsorpasswordsassecondaryauthenticationfeatures.
Usingasmartcardorkeyfob,forinstance,isagreatwaytoenhanceprivacy.
Mostofthesmartcardshavetheuser'sinformationengravedinthemwithpeculiarattributesthatmapstheidentityoftheusertothecard.
Thoughthiscreatesasenseofsecurityforthenumeroususersacrosstheglobe,theuseoftokensissubjecttoreplayandactiveattacks[13],[25].
However,possessionfactorscanbelost,stolenordamaged[12].
Insuchasituation,replacingthemisnecessary.
Butthereisthepossibilityofusingthemtocommitcrimebeforetheycanberetrieved.
Thiscancreateproblemsfortheowner.
Sinceacardownermayhavehisnameengravedonacard,usingitbyamalicioususer,iflost,willstillrecordatransactionagainstthecardowner.
Thisisaserioussecurityconcern.
Letusassumethatasmartcardthatgrantsaccesstoamilitarydatabasefallsintothehandsofanenemysoldierorgroupofsoldiers.
Inthesamevein,letusassumethatthiscardbelongstoasystemadministratorthathasrootorsystemprivilegesinacontrolledsystem.
Thestatedscenariocanleadtosevereconsequencesincludingdivulgenceofmilitaryintelligence,interceptionofmilitaryoperations,distortionordeletionofsensitiveclassifieddataaswellaslossofenormousdigitalassetssuchasfilesandeventhecompletedatabase.
Amoresecuredwayofhardeningthesecurityofthesysteminthisscenarioisbydeployingamechanismthatallowstheuseofthephysiologicalfeaturesoftheauthoriseduser.
Shanetalin[25]assertsthattheuseofbiometricsisunderpinnedbymeasurablephysiologicaltraitsandbehaviouralcharacteristicsthatserveasidentityparametersforanindividual.
Thisassertionimpliesthattheuseofbiometricsisnotsubjecttoauthenticationillssuchasrepudiation,impersonationandidentityspoofing,sinceeachindividual'sphysiologicaltraitsareuniquetotheindividualandarenottransferable.
ChettyandWagnerin[3]agreethatbiometricauthenticationisbecominganinevitableaspectofinformationtechnologywiththeubiquitousnatureofcomputersystemsandnetworksacrosstheglobe.
Aselaboratedin[16],biometricsdoesnothavetoberememberedduringtheauthenticationprocessastheyareinherentfeaturesoftheindividualthatisbeingauthenticated.
Thisisincontrasttotheuseofpasswordsandtokenssuchassmartcards,whicharesubjecttotheft,sharingandloss([12],[14].
Relatedly,IchinoandYamazakiin[8]discusstheefficacyofbiometricauthenticationspecificallyunderpinnedbysoftbiometrics.
Inthestudy,theyclassifiedsoftbiometricsonthebasisoffacial,bodyandaccessorytraits.
Furthermore,theyassertthat,thoughsoftbiometricsmaynotbedistinctiveenoughtoidentifyindividualsuniquely,itcanbevaluableforenhancingbiometricauthenticationthroughthecategorisationofthecollectedtraits,suchaseyecolourandheightranges.
Inthesameway,[18]investigatestherobustnessofbiometricsforidentityverificationandaccesscontrol.
Sincebiometricfeaturesareintrinsictotheindividualtheyidentity,theypositthatforgettingorforgingthemlikepasswordsordocumentsisunlikely.
Theiranalysisofsecurebiometricswasleveragedbythedesignofanappropriatetrainingprocedureformatchingastoredbiometricsignalwithaprobeforonwarddecisionmakingduringauthentication.
Similarly,[1]proposedanencryptedirisauthenticationsystemforidentifyingandauthenticatingusersofawirelesssensornetworks.
Mostmilitaryoperationsaredependentonthedeploymentofwirelesssensornetworks(WSNs)forcommandandcontrol.
SinceWSNsaresimpletoimplementandmanage,usingbiometricsforidentificationandauthenticationprocesseswillenforceahighlysecureaccesscontrolsystemonthefly.
Authenticationthroughphysiologicaltraitssuchasfingertouches,facemovementorpalmprintwasdiscussedforpaymentsystemsin[10].
Thismethodofmakingpaymentscanbeenhancedtoallowforsecureauthenticationprocessesinmilitarysites.
MultimodalScientificResearchJournal(SCIRJ),Volume2,Issue1,January201445ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalbiometricauthenticationisalsoimportantforenhancingoperationalsecurity.
Asdiscussedin[5],multimodalbiometricsissuitableformobiledevicesincludingPersonalDigitalAssistants(PDAs),smartphonesandmobilesphones.
Sincethesedevicesareportable,theyaresubjecttolossandtheft.
Protectingthem,therefore,requirestheuseofanenhancedsecuritymechanismsuchasbiometricauthentication.
Theyproposedtheuseofteethimageandvoiceforauthentication.
Itisaknownfactthatthemilitarydeploysthelargestuseofmobiledevices,mostofwhichareembeddedsystemswithtacticsandmilitaryintelligence.
Ifauthenticationtosuchdevicesisleveragedbyteethimageandvoice,itwillbecomecomputationallydifficulttocircumventthesecurityofsuchadeviceintheeventofitsloss,theftormisplacement.
Biometricauthentication,therefore,ismoresecureinaccesscontrolmanagementaswellasidentityverificationespeciallyforcontrolleddomainswheretheexactidentityoftheuserbeingauthenticatedandallowedaccesstodigitalresourcescannotbecompromised.
IV.
APPLICABLEBIOMETRICTECHNOLOGYThebiometrictechnologyisleveragedbyanumberofmethodologiesthatcanbedeployedintherealisationofbiometricauthentication.
Someofthese,asdiscussedin[7]and[17]includethefollowing:a.
Palmbiometricsb.
Fingerprintauthenticationc.
Voicerecognitiond.
Signatureverificatione.
Irisscanandf.
FacialrecognitionAllofthesearenecessary.
However,thispaperfocusesonthefirstthreeabove:palmbiometrics,fingerprintauthenticationandvoicerecognition.
A.
PalmBiometricsPalmbiometricsisbasedontheuseofbiometrictraitsextractedfromthepalm(curvatureofthepalm,widthofthepalm,lengthoffingers,thicknessofthepalm,principallines,wrinkles,deltapointsetc[7])toverifytheidentityofapersoninacontrolledenvironment.
Theuseofpalmbiometrics,onitself,cannotguaranteeanefficientuseridentificationsystemwithoutbeingaugmentedbyotheridentificationmethodssuchastheuseofpersonalidentificationnumbers(PIN)asthehumanhandisnotunique.
Thereliabilityprovidedbypalmbiometricsinthecontextofverificationandauthenticationisconsiderablyhigh.
Nonrepudiationisenhancedasausercannotdenythataphysiologicaltraitsuchasapalmprintimagedoesnotbelongtohim/heronceloggedin.
Trackingusers'accessandtheuseofresourcescanbecontrolled.
Also,thereismoreconvenienceforusersandsystemadministratorsasincidencesofpasswordoridentificationcardtheftorlossmaynotbeobtainabletherebyenhancingefficiency.
Someofthekeyweaknessofpalmbiometricsisthatthesensordata,ifusedindependentlyofotherbiometricsources,canbenoisy.
Also,thehumanhandisnotcompletelyuniqueandassuchmaylackindividualityanduniversalityinrepresentingtheidentityofaparticularindividual.
Injuriesonthepalmaswellasgummypalmsmayleadtopoortemplatequalityculminatinginpoorperformancebythebiometricsystem.
Palmbiometricsshouldthereforebeusedincombinationwithotherbiometricsourcessuchasfingerprints,irisscansandvoicerecognitiontoprovideanefficientmultimodalauthenticationsystem.
Thoughpalmbiometricsdemonstratessomeweaknessesinitsimplementation,ithasagoodnumberofstrengthsasfollows:i.
Itcanbesuitableforoutdoorenvironmentssuchasmilitarysitesandcanbeusedtomanageahighthroughputofpeople.
ii.
Itprovidesafriendlyuserinterfacethatisrobustandintegrateseasilywiththeexistingaswellasthirdpartysystems.
iii.
Givesroomforeasymaintenanceandstorageasithasasmalltemplatesizethatcanbeintegratedinalargedatabase.
iv.
Itisinexpensivetoimplementandoffersexcellentreturnoninvestmentaswellaswidespreadacceptance.
v.
Highlyreliableandaccurate.
vi.
Itprovideseffectivesecurity,whichismorerobustwhencomparedtotraditionalmethodssuchastheuseofpasswordsandidentificationcards.
vii.
Sincethebiometricfeaturesextractedduringenrolmentareinherenttoaparticularindividual,fraudandrepudiationcanbeeliminatedduringauthentication.
Thismaynotbeunconnectedwiththefactthatoncestored,palmbiometrictraitsarenottransferable;thatis,theycannotbeshared,stolen,lostorforgotten.
B.
FingerprintAuthenticationThereisaproliferationintheuseoffingerprintauthenticationinrecenttimes[11],[4].
Thiscanbeseeninmostmobilephoneserviceproviders.
Theuseoffingerprintsforidentificationandverificationisborneoutofthefactthatthepatternsofridgesandfurrowsthatcharacteriseanindividual'sfinger(mostespeciallythesurfaceofthefingertip)areuniquetoeachindividual[23],[9].
Fingerprintdevicesallowausertoaccessacontrolledenvironmentthroughfingerprintscans.
Podioin[16]maintainsthattheusermerelyplaceshisfingertipontheappropriatedevicetobeidentifiedandauthenticated.
Thispaveswayforsecureaccesscontrolandnetworkauthenticationmechanism.
However,fingerprintbiometricscanbegiventotheweaknessesofpalmbiometricsespeciallywhenthereisanaccumulationofskinoilsordirtonthesurfacesofsensorplates.
Theresultanteffectmaybefalserejectioninwhichcaseavaliduserfingerprintscanisrejectedasillegitimate.
Falseacceptancecanalsobeobtainableherewhereaninvalidfingerprintscanisacceptedasvalidforagivenusertransaction[7].
C.
VoiceRecognitionVoicerecognitionisbasedonthedistinctrateandpitchofsoundsproducedbythehumanvoice[19],aswellasotherScientificResearchJournal(SCIRJ),Volume2,Issue1,January201446ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalacousticfeaturesofspeechincludingtheshapeofthethroat,speakingstyleandsizeofthemouth[16].
Kounoudesetalin[12]mentionthatvoiceauthenticationisprecededbytheextractionofvoiceprints,whicharestoredduringtheenrolmentphaseandmatchedwithrawspeechdatacapturedbyvoicerecognitiondevicessuchasavoicespeakerormicrophone.
Xiaoin[17]identifiestwotypesoftechnologiesforvoicebiometricsnamelyvoicescansandspeechrecognition.
Themaindistinctionbetweenthetwotechnologiesisthatwhilevoicescansuseapre-storedvoicesampleoftheusertoauthenticateandverifytheidentityoftheuser,speechrecognitiondependsonwordsandsentencesfromanaudiosignal,whichformtheinputtoavoicerecognitiondevice.
ZhangandAbdullain[24]proposedavoicebiometricstechniquebasedonhumanauditorymodelsandindependentcomponentanalysis.
Theauditorymodelswerefoundtoachievebetteridentificationrateswithhighrobustnesstonoise.
Furthermore,Rashidetalin[19]implementedasecuritysystemthatallowsforvoicepatternsastheaccesscontrolkeytherebyenhancingtheaccuracyoftheauthenticationprocesssincevoicepatternsasseentobedistinctperindividual.
Thedesignoftheproposedauditorymodels,accesscontrolmechanism,andvoicerecognitionsystemissuitablefordeploymentinmilitarycontrolledenvironments.
Onemajoradvantageofvoicebiometricsisthatitdoesnotrequirephysicalcontactwiththeauthenticatingdevicethoughitcanbesubjecttobackgroundnoise,whichmayleadtoahighrateoffalserejection[12].
However,voicetemplates,ashighlightedin[16]aresmallinsizebasicallylessthan16kilobytesandcanberepresentedusingneuralnetworks,decisiontrees,patternmatchingalgorithmsandhiddenMarkovmodels.
V.
BIOMETRICAUTHENTICATIONPROCESSBiometricauthenticationisprecededbyanenrolmentprocedure.
Theenrolmentprocessrequirestheinitialcaptureofthebiometrictraits.
Asstatedin[11]and[23],thecapturedtraitsarepre-processedforfeatureextractionandstoredastemplatesintheauthenticatingdeviceordatabase.
Theperformanceofthebiometricsampleduringauthenticationisdependentonthequalityofthecapturedtemplate.
Figure1isarepresentationofaBiometricAuthenticationProcess.
Fig.
1:RepresentationofaBiometricAuthenticationprocessVerificationisanindispensableaspectofbiometricauthentication[16].
Auserwhosebiometricsamplehasbeenenrolledcanonlybeallowedaccesstoasystemsuchasduringaloginsessionbyverification.
Duringverification,thestoredbiometrictemplateiscomparedwiththesamplepresentedbytheuseratthepointofauthentication.
Accessisallowedwhenamatchisfoundandintheeventofamismatch,accessisdenied.
Verificationleadstoidentificationandusuallyinvolvesaone-to-manyorone-to-onematchingofthestoredtemplateinthedatabasewiththecapturedsample[25].
VI.
CONCLUSIONOneofthekeyissuesinmanagingauser'saccesstocriticalresourcesistheabilitytoallowonlytheauthorisedusersofasystemtosuchresources.
Overtheyears,identityspoofing,maninthemiddle,replayandactiveattackshaveleftmostmilitarybasespronetotheleakageofclassifiedinformationandintelligenceaswellasthecircumventionofestablishedsecurityprocedures.
Theconsequencesofsecuritybreachesaregraveandcanleadtolossoflives,propertyandrevenue.
Asseeninmostthirdworldcounties,whereterrorismisontheincrease,leakageofsensitiveinformationcancripplethebedrockofaneconomy.
Tothisend,providingadequateandenhancedauthenticationmechanismstocontrolledenvironmentscannotbeoveremphasised.
Onecanvividlyassessthatauthenticationthroughauser'sphysiologicalfeaturescancreateasenseofsecurity.
Thisisbecausethephysicalpresenceoftheuserincludinganaspectofhistraitswillbeinvolvedinidentifyinghim.
Biometrictraitsareinvariantinrepresentationandassuchclaimacertaindegreeofuniquenessanduniversality.
Thefingerprintimageofoneusercannotbeusedintheplaceofanotheruser.
Thisisauniversaltruth.
Consequently,itishighlyefficienttodeploybiometricauthenticationifthesystemadministratorisinterestedinmappingtheusersofasystemtotheirrealidentities.
Passwordandtokenauthenticationcannotguaranteenon-repudiation.
WecannotclaimthatauserwhologsintoaScientificResearchJournal(SCIRJ),Volume2,Issue1,January201447ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournalsystemistheownerofthepasswordortokensuchassmartcardusedtogainaccesstothesystem.
Passwordsandtokenscanbelost,stolen,andarealsotransferable.
Withbiometricauthentication,suchweaknessescanbecontrolledsincetheusers'physiologicalandbehaviouraltraitsareunique,whichrequiresthephysicalpresenceoftheuseratthepointofauthenticationleveragedbytheuseoflivebiometricsamplesforidentificationandverification.
Thispaperhasbeenabletohighlighttheefficacyofbiometricauthenticationincriticalenvironmentssuchasthemilitary.
Thefocusonfutureworkshouldbeonbiometrictemplatesecurity.
Thisisborneoutofthefactthatacompromisedbiometrictemplate,whichisintrinsicallyinvariant,canleadtotheconstructionofartificialbiometrictemplatesthroughreverseengineeringifsuchatemplatefallsintothehandsofamalicioususer.
REFERENCES[1]Althobaiti,O.
;Al-Rodhaan,M.
;Al-Dhelaan,A.
,(2012)"Biometricaccesscontrolforwirelessnodes,"ComputationalAspectsofSocialNetworks(CASoN),2012FourthInternationalConferenceon,vol.
,no.
,pp.
167,174,21-23[2]Balfanz,D.
,Smetters,D.
K.
,Stewart,P.
,andChiWong,H.
(2002).
TalkingToStrangers:AuthenticationinAd-HocWirelessNetwork,ProceedingsofNetworkandDistributedSystemSecuritySymposium2002(NDSS'02),SanDiego,CA,February,2002.
[3]Chetty,G.
;Wagner,M.
,(2006)"Multi-LevelLivenessVerificationforFace-VoiceBiometricAuthentication,"BiometricConsortiumConference,2006BiometricsSymposium:SpecialSession,vol.
,no.
,pp.
1,6[4]Darwish,A.
A.
;Zaki,W.
M.
;Saad,O.
M.
;Nassar,N.
M.
;Schaefer,G.
,(2010)"HumanAuthenticationUsingFaceandFingerprintBiometrics,"ComputationalIntelligence,CommunicationSystemsandNetworks(CICSyN),2010SecondInternationalConferenceon,vol.
,no.
,pp.
274,278[5]Dong-JuKim;Kwang-SeokHong,(2008)"Multimodalbiometricauthenticationusingteethimageandvoiceinmobileenvironment,"ConsumerElectronics,IEEETransactionson,vol.
54,no.
4,pp.
1790,1797[6]HitachiIDSystemsInc.
(2014).
DefinitionofAuthentication.
Availableat:http://hitachi-id.
com/concepts/authentication.
html(Accessed:12January2014)[7]Yan,H.
&Long,D.
(2008)"ANovelBimodalIdentificationApproachBasedonHand-Print,"ImageandSignalProcessing,2008.
CISP'08.
Congresson,vol.
4,no.
,pp.
506,510[8]Ichino,M.
;Yamazaki,Y.
,(2013)"SoftBiometricsandItsApplicationtoSecurityandBusiness,"BiometricsandKanseiEngineering(ICBAKE),2013InternationalConferenceon,vol.
,no.
,pp.
314,319[9]Isa,M.
R.
M.
;Yahaya,Y.
H.
;Halip,M.
H.
M.
;Khairuddin,M.
A.
;Maskat,K.
,(2010)"ThedesignoffingerprintbiometricauthenticationonsmartcardforPULAPOTmainentrancesystem,"InformationTechnology(ITSim),2010InternationalSymposiumin,vol.
3,no.
,pp.
1,4[10]Yang,J.
(2010)"BiometricsVerificationTechniquesCombingwithDigitalSignatureforMultimodalBiometricsPaymentSystem,"Managementofe-Commerceande-Government(ICMeCG),2010FourthInternationalConferenceon,vol.
,no.
,pp.
405,410[11]Kannavara,R.
;Bourbakis,N.
G.
,(2009)"Fingerprintbiometricauthenticationbasedonlocalglobalgraphs,"Aerospace&ElectronicsConference(NAECON),ProceedingsoftheIEEE2009National,vol.
,no.
,pp.
200,204[12]Kounoudes,Anastasis;Kekatos,V.
;Mavromoustakos,S.
,(2006)"VoiceBiometricAuthenticationforEnhancingInternetServiceSecurity,"InformationandCommunicationTechnologies,2006.
ICTTA'06.
2nd,vol.
1,no.
,pp.
1020,1025[13]Dang,L.
,Kou,W.
,Xiao,Y.
(2005)"Animprovedschemeforunilateralasymmetricsmartcardauthentication,"AdvancedInformationNetworkingandApplications,2005.
AINA2005.
19thInternationalConferenceon,vol.
2,no.
,pp.
265,268vol.
2[14]Nandini,C.
;RaviKumar,C.
N.
,(2007)"Multi-BiometricsApproachforFacialRecognition,"ConferenceonComputationalIntelligenceandMultimediaApplications,2007.
InternationalConferenceon,vol.
2,no.
,pp.
417,422[15]Ngai,E.
C.
-H.
;Lyu,M.
R.
;Chin,R.
T.
,(2004)"Anauthenticationserviceagainstdishonestusersinmobileadhocnetworks,"AerospaceConference,2004.
Proceedings.
2004IEEE,vol.
2,no.
,pp.
1275,1285Vol.
2[16]Podio,F.
L.
,(2002)"Personalauthenticationthroughbiometrictechnologies,"NetworkedAppliances,2002.
Gaithersburg.
Proceedings.
2002IEEE4thInternationalWorkshopon,vol.
,no.
,pp.
57,66[17]Xiao,Q.
(2004)"Abiometricauthenticationapproachforhighsecurityad-hocnetworks,"InformationAssuranceWorkshop,2004.
ProceedingsfromtheFifthAnnualIEEESMC,vol.
,no.
,pp.
250,256[18]Rane,S.
;YeWang;Draper,S.
C.
;Ishwar,P.
,(2013)"SecureBiometrics:Concepts,AuthenticationArchitectures,andChallenges,"SignalProcessingMagazine,IEEE,vol.
30,no.
5,pp.
51,64[19]Rashid,R.
A.
;Mahalin,N.
H.
;Sarijari,M.
A.
;AbdulAziz,A.
A.
,(2008)"Securitysystemusingbiometrictechnology:DesignandimplementationofVoiceRecognitionSystem(VRS),"ComputerandCommunicationEngineering,2008.
ICCCE2008.
InternationalConferenceon,vol.
,no.
,pp.
898,902[20]Tang,H.
,Salmanian,M.
&Chang,C.
(2007).
StrongAuthenticationforTacticalMobileAdHocNetworks.
DefenceResearchandDevelopmentCanadaOttawaTM2007-146ScientificResearchJournal(SCIRJ),Volume2,Issue1,January201448ISSN2201-2796www.
scirj.
org2014,ScientificResearchJournal[21]Tittel,E.
,Chapple,M.
&Stewart,J.
M.
(2003).
CertifiedInformationSystemsSecurityProfessional.
CA:SYBEXInc.
[22]Wikipedia(2014).
Mobileadhocnetwork.
Availableat:http://en.
wikipedia.
org/wiki/Mobile_ad_hoc_networks(Accessed:11January2014).
[23]Yahaya,Y.
H.
;Isa,M.
;Aziz,M.
I.
,(2009)"FingerprintBiometricsAuthenticationonSmartCard,"ComputerandElectricalEngineering,2009.
ICCEE'09.
SecondInternationalConferenceon,vol.
2,no.
,pp.
671,673[24]Zhang,Y.
&Abdulla,W.
H.
,(2008)"VoiceasaRobustBiometrics,"FutureGenerationCommunicationandNetworking,2008.
FGCN'08.
SecondInternationalConferenceon,vol.
3,no.
,pp.
41,46[25]ShanAo;WeiyinRen;ShoulianTang,(2008)"AnalysisandReflectionontheSecurityofBiometricsSystem,"WirelessCommunications,NetworkingandMobileComputing,2008.
WiCOM'08.
4thInternationalConference,vol.
,no.
,pp.
1,5

HostKvm香港VPS七折:$5.95/月KVM-2GB内存/40GB硬盘/500GB月流量

HostKvm是一家成立于2013年的国外主机服务商,主要提供VPS主机,基于KVM架构,可选数据中心包括日本、新加坡、韩国、美国、俄罗斯、中国香港等多个地区机房,均为国内直连或优化线路,延迟较低,适合建站或者远程办公等。商家本月针对香港国际机房提供特别7折优惠码,其他机房全场8折,优惠后2G内存香港VPS每月5.95美元起,支持使用PayPal或者支付宝付款。下面以香港国际(HKGlobal)为...

Digital-VM80美元新加坡和日本独立服务器

Digital-VM商家的暑期活动促销,这个商家提供有多个数据中心独立服务器、VPS主机产品。最低配置月付80美元,支持带宽、流量和IP的自定义配置。Digital-VM,是2019年新成立的商家,主要从事日本东京、新加坡、美国洛杉矶、荷兰阿姆斯特丹、西班牙马德里、挪威奥斯陆、丹麦哥本哈根数据中心的KVM架构VPS产品销售,分为大硬盘型(1Gbps带宽端口、分配较大的硬盘)和大带宽型(10Gbps...

易探云330元/年,成都4核8G/200G硬盘/15M带宽,仅1888元/3年起

易探云服务器怎么样?易探云是国内一家云计算服务商家,致力香港云服务器、美国云服务器、国内外服务器租用及托管等互联网业务,目前主要地区为运作香港BGP、香港CN2、广东、北京、深圳等地区。目前,易探云推出的国内云服务器优惠活动,国内云服务器2核2G5M云服务器低至330元/年起;成都4核8G/200G硬盘/15M带宽,仅1888元/3年起!易探云便宜vps服务器配置推荐:易探云vps云主机,入门型云...

250.pp.com为你推荐
美国互联网瘫痪美国是否有能力关闭全球互联网以及中国互联网,还有美国有没能力关闭某个网站,比如淘宝,天涯,网易等老虎数码86年属虎的吉祥数字和求财方向比肩工场比肩是什么意思,行比肩大运的主要意象杰景新特谁给我一个李尔王中的葛罗斯特这个人物的分析?急 ....先谢谢了同ip域名同IP网站具体是什么意思,能换独立的吗同ip站点同IP网站具体是什么意思,能换独立的吗www.kaspersky.com.cn现在网上又有病毒了?www.idanmu.com万通奇迹,www.wcm77.HK 是传销么?baqizi.cc曹操跟甄洛是什么关系www.cn12365.orgwww.12365china.net是可靠的网站吗?还是骗子拿出来忽悠人的
美国虚拟主机推荐 高防服务器租用 域名备案流程 80vps fdcservers virpus oneasiahost 国外服务器网站 好看的留言 鲜果阅读 网站挂马检测工具 蜗牛魔方 服务器干什么用的 drupal安装 免费外链相册 百度云加速 监控服务器 中国电信测速网站 114dns cdn服务 更多