Multimodal Biometric-Based Secured Access Mechanism for Wireless Sensor Networks

被引:1
作者
Preetha, S. [1 ]
Sheela, S., V [1 ]
机构
[1] VTU, BMS Coll Engn, Bengaluru, India
关键词
multimodal; iris; fingerprint; user biometric authentication; wireless sensor network; 2-FACTOR USER AUTHENTICATION; MUTUAL AUTHENTICATION; KEY AGREEMENT; IMPROVEMENTS;
D O I
10.3991/ijoe.v18i09.30425
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Wireless Sensors Network's (WSN) security is a critical concern owing to their unattended and intimidating distribution. Providing authentication to these networks with limited resources is a challenging task. Biometric based user authentication schemes with light computations and easy operations provide potential solutions. Several unimodal biometric techniques are proposed to secure WSN. Unimodal is susceptible to limited accuracy and spoofing. However, Multimodal biometric technology offers greater security. This paper proposes an algorithm combining fingerprint and iris biometric features for authentication. Registration and authentication processes using limited resources that are available at the WSN nodes are implemented. Experimentation results calculate computational overhead and are compared with existing methods.
引用
收藏
页码:86 / 99
页数:14
相关论文
共 25 条
  • [1] Wireless sensor networks: a survey
    Akyildiz, IF
    Su, W
    Sankarasubramaniam, Y
    Cayirci, E
    [J]. COMPUTER NETWORKS, 2002, 38 (04) : 393 - 422
  • [2] An Efficient Biometric Authentication Protocol for Wireless Sensor Networks
    Althobaiti, Ohood
    Al-Rodhaan, Mznah
    Al-Dhelaan, Abdullah
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [3] [Anonymous], 2012, CRYPTOLOGY EPRINT AR
  • [4] Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks
    Chang, I-Pin
    Lee, Tian-Fu
    Lin, Tsung-Hung
    Liu, Chuan-Ming
    [J]. SENSORS, 2015, 15 (12) : 29841 - 29854
  • [5] A Robust Mutual Authentication Protocol for Wireless Sensor Networks
    Chen, Tien-Ho
    Shih, Wei-Kuan
    [J]. ETRI JOURNAL, 2010, 32 (05) : 704 - 712
  • [6] Sensor networks: Evolution, opportunities, and challenges
    Chong, CY
    Kumar, SP
    [J]. PROCEEDINGS OF THE IEEE, 2003, 91 (08) : 1247 - 1256
  • [7] Two-Factor User Authentication in Wireless Sensor Networks
    Das, Manik Lal
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) : 1086 - 1090
  • [8] Debnath B., 2009, SCI TECHNOLOGY, V2, DOI [10.1016/S0969-4765(09)70102-X, DOI 10.1016/S0969-4765(09)70102-X]
  • [9] Efficient Multifactor Two-Server Authenticated Scheme under Mobile Cloud Computing
    Han, Ziyi
    Yang, Li
    Wang, Shen
    Mu, Sen
    Liu, Qiang
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [10] Deep Learning in Retinal Image Segmentation and Feature Extraction: A Review
    Hoque, Mohammed Enamul
    Kipli, Kuryati
    [J]. INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2021, 17 (14) : 103 - 118