Secured network authentication using biometrics application

被引:0
作者
Laili, MHB [1 ]
Jamaludin, MZ [1 ]
Din, NM [1 ]
Said, NHM [1 ]
机构
[1] Univ Tenaga Nas, Kajang 43009, Selangor DE, Malaysia
来源
2002 STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT, PROCEEDINGS: GLOBALIZING RESEARCH AND DEVELOPMENT IN ELECTRICAL AND ELECTRONICS ENGINEERING | 2002年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The inadequacy of password security have lured individuals to search for an alternative way to secure their online Intellectual Properties. In addition, the increase in hacking activities also contribute to the search of new and more advance technology in securing network systems. Passwords consist of strings, numbers and even signs. As alternatives, biometrics can replace passwords, offering a different set of verification parameters. This paper describes a study to create a secured access system for online transactions using fingerprints for authorization. The password is replaced by an algorithm that represent the fingerprint pattern of the authorizer. The verification of the fingerprint will be done by a fingerprint reader and is compared with the image that is stored in a server. After it is verified, the user will enter the encrypted CD-ROM that contains a Digital Certificate.
引用
收藏
页码:368 / 370
页数:3
相关论文
共 50 条
[31]   Continuous authentication using biometrics: An advanced review [J].
Dahia, Gabriel ;
Jesus, Leone ;
Pamplona Segundo, Mauricio .
WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2020, 10 (04)
[32]   A Robust Authentication System Using Multiple Biometrics [J].
Monwar, Md. Maruf ;
Gavrilova, Marina .
COMPUTER AND INFORMATION SCIENCE, 2008, 131 :189-201
[33]   Ear Acoustic Biometrics Using Inaudible Signals and Its Application to Continuous User Authentication [J].
Mahto, Shivangi ;
Arakawa, Takayuki ;
Koshinaka, Takafumi .
2018 26TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2018, :1407-1411
[34]   Secured and flexible user authentication protocol for wireless sensor network [J].
Prabu, P. ;
Senthilnathan, T. .
INTERNATIONAL JOURNAL OF INTELLIGENT UNMANNED SYSTEMS, 2020, 8 (04) :253-265
[35]   SECURE AND EFFICIENT TRANSMISSION IN WIRELESS NETWORK USING KEY AUTHENTICATION BASED SECURED MULTICASTING TECHNIQUE [J].
Gopalakrishnan, S. ;
GaneshKumar, P. .
ICACCS 2015 PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS, 2015,
[36]   DAKOTA: Continuous Authentication with Behavioral Biometrics in a Mobile Banking Application [J].
Barlas, Yunus ;
Basar, Okan Engin ;
Akan, Yasemin ;
Isbilen, Mustafa ;
Alptekin, Gulfem Isiklar ;
Incel, Ozlem Durmaz .
2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2020, :298-303
[37]   Passwordless Authentication Using a Combination of Cryptography, Steganography, and Biometrics [J].
Oduguwa, Tunde ;
Arabo, Abdullahi .
JOURNAL OF CYBERSECURITY AND PRIVACY, 2024, 4 (02) :278-297
[38]   Context Independent Continuous Authentication using Behavioural Biometrics [J].
Mondal, Soumik ;
Bours, Patrick .
2015 IEEE INTERNATIONAL CONFERENCE ON IDENTITY, SECURITY AND BEHAVIOR ANALYSIS (ISBA), 2015,
[39]   An Approach for Secure Identification and Authentication for Biometrics using Iris [J].
Patil, Chandrashekar M. ;
Gowda, Sushmitha .
2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, :421-424
[40]   Enhancement of user authentication using biometrics in mobile networks [J].
Kim, Hyunseok .
2024 11TH INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-TAIWAN, ICCE-TAIWAN 2024, 2024, :169-170