Biometrics-based Authentication and Network Security – A Survey Approach
All most all the real world application makes use of network communication. The security of multimedia information in general and the security of visual information in fastidious have increasingly become an issue of great concern in our networked society. Therefore it is necessary to improve the network security for secured communication among users of the network. Numerous techniques and methods are available to assure the network security. Most popular among the available techniques is the use of cryptography. The cryptographic key generation alone has some limitations. That there is a fear that the network user may forget their password and they may loss their key or it may be stolen. This usually led to the fact that the network of the user can be easily accessed by an illegitimate user. A solution to this problem can be derived using biometrics along with cryptographic key generation technique. There are several ways to combine biometrics with a cryptosystem, namely biometrics key release, biometrics key generation and biometrics key binding. These biocryptosystems make use of the advantages of both biometrics and cryptography. This paper presents a survey on various techniques for biometric based authentication and network security. This paper discusses some of limitations of the earlier proposed techniques on biometric authentication and network security. Additionally, this paper also discusses some of the ideas to enhance the accuracy of the biometric authentication system and therefore the network security.
F. Hao, R. Adnderson, and J. Daugman, “Combining crypto with biometrics effectively,” IEEE Transactions on Computers, vol. 55, no. 9, pp. 1081-1088, 2005.
C. Soutar, and D. Roberge, “Biometric Encryption,” ICSA Guide to Cryptography, McGrow-Hill, 1999.
T. C. Clancy, N. Kiyavash, and D. J. Lin, “Secure Smartcard-based Fingerprint Authentication,” In Proceedings of ACMSIGMM, pp. 45– 52, 2003.
U. Uludag, and S. Pankanti, “Biometric cryptosystems: Issues and challenges,” Proceedings of the IEEE, vol. 92, no. 6, pp. 948-960, 2004.
Y. Sutcu, Q. Li, and N. Memon, “Protecting biometric templates with sketch: Theory and practice” IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 503-512, 2007.
O. S. Benavente, and R. Piccio-Marchetti, “39th Annual 2005 International Carnahan Conference on Security Technology, pp. 333-336, 2005.
Zhenhua Wu, “Biometrics Authentication System on Open Network and Security Analysis,” International Symposium on Electronic Commerce and Security, pp. 549-553, 2008.
Sandip Dutta, Avijit Kar, N. C. Mahanti, and B. N. Chatterji, “Network Security Using Biometric and Cryptography,” Advanced Concepts for Intelligent Vision Systems, Springer link, vol. 5259, pp. 38-44, 2008.
Chun-Ta Li, and Min-Shiang Hwang, “An efficient biometrics-based remote user authentication scheme using smart cards,” Journal of Network and Computer Applications, vol. 33, no. 1, pp. 1-5, 2010.
F. Richard Yu, Helen Tang, Victor C. M. Leung, Jie Liu, and Chung-Horng Lung, “Biometric-based user authentication in mobile ad hoc networks,” Security and Communication Networks, vol. 1, no. 1, pp. 5-16, 2008.
P. Arul, and Dr. A. Shanmugam, “Generate a Key for AES Using Biometric for VOIP Network Security,” Journal of Theoretical and Applied Information Technology, pp. 107-112, 2009.
Peter Varchol, and Dušan Levický, “Using of Hand Geometry in Biometric Security Systems,” Journal of Radio Engineering, vol. 16, no. 4, pp. 82-87, 2007.
Tonimir Kisasondi, Miroslav Baca, and Alen Lovrencic, “Biometric Cryptography and Network Authentication,” UDK 004.056.55, pp. 91-99, 2007.
J. George Chellin Chandran, and Dr. R. S. Rajesh, “Performance Analysis of Multimodal Biometric System Authentication,” IJCSNS International Journal of Computer Science and Network Security, vol. 9, no. 3, pp. 290-296, 2009.
Jing Dong, and Tieniu Tan, “Security Enhancement of Biometrics, Cryptography and Data Hiding by Their Combinations,” National Laboratory of Pattern Recognition, Institute of Automation, 2006.
Amioy Kumar, and Ajay Kumar, “A Palmprint Based Cryptosystem using Double Encryption,” Biometrics Research Laboratory, Indian Institute of Technology, Delhi, pp. 1-12, 2007.
A. Kumar, and D. Zhang, “Palmprint authentication using multiple representation,” IEEE Transactions on Pattern Recognition, vol. 38, pp. 1695-1704, Oct. 2005.
Yunsu Chung, Kiyoung Moon, and Hyung-Woo Lee, “Biometric Certificate Based Biometric Digital Key Generation with Protection Mechanism,” Frontiers in the Convergence of Bioscience and Information Technologies, pp. 709-714, 2007.
Jayant V. Kulkarni, Raghunath. S. Holambe, and Bhushan D. Patil, “Network Security: Pattern Recognition Approach,” http://www.ee.iitb.ac.in/student/~bhushanp/vrde.pdf, 2001.
A. K. Jain, R. Bolle, and S. Pankanti. “Biometrics: Personal identification in networked society,” Norwell, MA: Kluwer, 1999.
Ronald G. Wolak, “Network Security: Biometrics - The Password Alternative,” School of Computer and Information Sciences, 1998.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.