Iris Biometrics Based Authentication and Key Exchange System K

Iris Biometrics Based Authentication and Key Exchange System K

IACSIT International Journal of Engineering and Technology, Vol.3, No.1, February 2011 ISSN: 1793-8236 Iris Biometrics Based Authentication and Key Exchange System K. Saraswathi, B. Jayaram and Dr. R. Balasubramanian the password. Moreover, compromised password directs to Abstract—Wireless Local Area Networks (WLANs) are a fact, that unauthorized user can have access to the gaining gratitude as they are fast, cost effective, supple and accounts of the valid user. The Biometric based user easy to use. The networks face severe issues and challenges in authentication systems are very much secured and efficient establishing security to the users’ of the network. With users to use and place total trust on the authentication server accessing networks remotely, exchanging data by means of the Internet and carrying around laptops containing sensitive data, where biometric verification data are stored in a central ensuring security is an increasingly multifarious challenge. database [1]. This biometrics based user authentication Therefore it is essential to make sure the security of the system improves the network security. Some of most network users. In order to offer network security many extensively used biometric are hand geometry, face, techniques and systems have been proposed earlier in fingerprint, retina, iris, DNA, signature and voice. literature. Most of these traditional methods uses password, Biometrics is the knowledge of measuring and smart cards and so on to provide security to the network users. statistically analyzing Biological data can be used to Though these traditional methods are effectual in ensuring recognize different body parts like the eyes, fingerprints, security they posses some limitations too. This paper proposes facial characteristics, voice, iris etc. Thus, it takes security an approach for network security by means of biometrics. As we all know biometric systems are generally used to control to the next level by not just confining it to authenticating access to physical assets (laboratories, buildings, cash from passwords, iris matching techniques [2]. A biometric system ATMs, etc.) or logical information such as personal computer provides an automated method of recognizing an individual accounts, secure electronic documents etc., The human based on the individual's biometric characteristics. The biometrics such as hand geometry, face, fingerprint, retina, iris, process of a biometric system can be described, in a DNA, signature and voice can be effectively used to ensure the beginner's manner, by a three-step process. The initial step network security. The different phases included in this in this process involves an observation, or collection, of the proposed approach are user registration, Extraction of biometric data which is formally known as user registration. minutiae points and secret key, Iris localization and This step uses different sensors, which vary between Normalization. Furthermore, biometric authentication systems can be more opportune for the users since it involves no modality, to make possible the observation. The second step password that might be feared to be forgotten by the network converts and describes the experimental data using a digital users or key to be lost and therefore a single biometric trait representation called a template. This pace varies between (e.g. Iris) can be used to access several accounts without the modalities and also between vendors. In the third step, the burden of remembering passwords. In this paper the Iris recently acquired template is compared with one or more biometric is used to provide security. This proposed paper also previously generated templates stored in a database. The explains some of the Iris localization and Normalization consequence of this comparison is a “match” or a “non- techniques to make the biometric template noise free. match” and is used for actions such as permitting access, Experiments are conducted to appraise the performance sounding an alarm, etc [3]. measure of the proposed approach. Finalizing a match or non-match is based on the obtained Index Terms—Biometric Security, Cryptography, Data resultant template being analogous, but not one and the Security, Iris Biometrics, Localization and Normalization. same, to the stored template. A threshold determines the gauge of similarity necessary to result in a match declaration. The recognition or rejection of biometric data is I. INTRODUCTION completely dependent on the match score falling above or below the threshold. The threshold is changeable so that the Accurate and automatic identification and authentication biometric system can be more or less stringent, depending of users is an elemental problem in network environments. on the requirements of any given biometric application [3]. Communal secrets such as Personal Identification Numbers Amongst all the biometric techniques, today fingerprints are or Passwords and key devices like Smart cards are not just the most widely used biometric features for personal enough in some cases. This authentication method has identification because of their high acceptability, habitually been based on passwords. The trouble with these Immutability and individuality. traditional approaches is that there is possibility to forget This paper proposes a new technique to secure the network communication using biometric characteristics K. Saraswathi, Asst.Proffessor is with the Department of Computer obtained from the individuals. The biometric characteristic Science, Govt Arts College, Udumalpet, Tirupur, India. used in this paper is Iris. This proposed paper utilizes image B. Jayaram, Asst.Proffessor is with the Department of Computer Science & Engineering, PA College of Engineering and processing technique to haul out the biometric measurement Technology,Pollachi,Coimbatore,India called minutiae from the user’s Iris. The user’s individual Dr. R. Balasubramanian is with the Dean Academic Affairs, PPG iris image is converted and stored as encrypted binary Institute of Technology, Coimbatore, India. 102 IACSIT International Journal of Engineering and Technology, Vol.3, No.1, February 2011 ISSN: 1793-8236 template, which is used for authentication by the server of maintained. the network. The user’s biometric authentication data are Network security issues are projected by Benavente et al. first transformed into a strong secret and is then stored in in [7]. The Internet is more and more becoming a public the server’s database during registration. The proposed vehicle for remote operations. Integrating biometric system is evaluated to establish the performance measures. information in the validation chain exposes new problems. The remainder sections of this paper are organized as Remote unrealistic identity is starting to play in the way follows. Section 2 discusses a few of the related work towards an e-Europe, and applications for e-government proposed earlier in association to biometric based network integrate biometrics. Remote identity of subjects should be security. Section 3 describes the proposed idea of providing unambiguously stated. Numerous features drive the spread network security using the biometric characteristics of biometric authentication in network applications, in order obtained iris. Section 4 illustrates the performance measures to provide end-to-end security across the authentication and finally section 5 concludes the paper with directions to chain aliveness detection and fake-resistive methods, future work. network protocols, security infrastructure, integration of biometrics and public key infrastructure (PKI), etc. Their II. RELATED WORK paper proposed a mid-layer interoperable design furnished A lot of research work has been performed in the field of with a set of generic interfaces and protocol definitions. establishing network security based on biometric features Their scheme enables an upcoming introduction of new obtained from individual user [14] [15]. This section of the modules and applications with a minimal development paper discusses a few of the related work proposed earlier in effort. association to biometric based network security. A.B. J. Teoh et al. in [18] presented a private biometrics In their work [4] Rahman et al. proposed design for formulation which is based on the concealment of random secure access of computers inside an organization from a kernel and the iris images to synthesize minimum average remote location. They used biometrics features and a one- correlation energy (MACE) filter for iris authentication. time password method on top of secure socket layer (SSL) Specifically, the training images are multiplied with the for authentication. Furthermore they also provided three user-specific random kernel in frequency domain before layers of security levels for network communication, and biometric filter is created. The objective of their proposed also a mechanism for secure file accesses based on the method is to provide private biometrics realization in their security privileges assigned to various users is proposed. iris authentication in which biometric template can be The files to be accessed from the server are categorized reissued once it was compromised. Meanwhile, their based on their access privileges and encrypted using a key proposed method is able to decrease the computational load, assigned to each category. The test results of their approach due to the filter size reduction. evaluated the performance measure of their proposed Kwanghyuk Bae et al [19] proposed a new feature

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    7 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us