Book chapter

DRAHANSKÝ Martin, HANÁČEK Petr, ZBOŘIL František, HENZL Martin, ZBOŘIL František V., YIM Jaegeol and SHIM Kyubark. Cryptomodules in Wireless Networks using Biometric Authentication: Securing Nodes in Wireless Networks. Improving Information Security Practices through Computational Intelligence. Washington: IGI Global, 2015, pp. 198-227. ISBN 978-1-4666-9426-2. Available from: http://www.igi-global.com/book/improving-information-security-practices-through/132453
Publication language:english
Original title:Cryptomodules in Wireless Networks using Biometric Authentication: Securing Nodes in Wireless Networks
Title (cs):Kryptomoduly v bezdrátových sítích využívající biometrické autentizace: Zabezpečení uzlů v bezdrátových sítích
Pages:198-227
Book:Improving Information Security Practices through Computational Intelligence
Place:Washington, US
Year:2015
URL:http://www.igi-global.com/book/improving-information-security-practices-through/132453
ISBN:978-1-4666-9426-2
Publisher:IGI Global
URL:http://www.igi-global.com/viewtitlesample.aspx?id=136490&ptid=132453&t=cryptomodules%20in%20wireless%20networks%20using%20biometric%20authentication:%20securing%20nodes%20in%20wireless%20networks [PDF]
Keywords
cryptomodule, wireless network, security, authentication, network node
Annotation
This chapter shows how cryptomodules can increase security of wireless sensor network and possibilities of biometric authentication against a node or the whole network. For secure operation of a wireless sensor network, security objectives such as confidentiality, integrity, and authentication must be implemented. These security objectives typically employ cryptography, therefore sensor nodes should be able to compute cryptographic algorithms and provide secure tamper resistant storage for cryptographic keys. Use of dedicated secure hardware for this purpose and security threats are discussed. Two scenarios where the biometric authentication would be appreciated are introduced - smart home and storehouse with medicaments. Biometric generation of cryptographic keys, biometric authentication in wireless network and possible attacks on biometrics are presented. When designing and verifying communication protocols using informal techniques, some security errors may remain undetected. Formal verification methods that provide a systematic way of finding protocol flaws are discussed.
BibTeX:
@INBOOK{
   author = {Martin Drahansk{\'{y}} and Petr Han{\'{a}}{\v{c}}ek and
	Franti{\v{s}}ek Zbo{\v{r}}il and Martin Henzl and V.
	Franti{\v{s}}ek Zbo{\v{r}}il and Jaegeol Yim and Kyubark
	Shim},
   title = {Cryptomodules in Wireless Networks using Biometric
	Authentication: Securing Nodes in Wireless Networks},
   pages = {198--227},
   booktitle = {Improving Information Security Practices through
	Computational Intelligence},
   year = {2015},
   location = {Washington, US},
   publisher = {IGI Global},
   ISBN = {978-1-4666-9426-2},
   language = {english},
   url = {http://www.fit.vutbr.cz/research/view_pub.php.en.iso-8859-2?id=10914}
}

Your IPv4 address: 54.81.110.114
Switch to IPv6 connection

DNSSEC [dnssec]