Přístupnostní navigace
E-application
Search Search Close
Publication detail
DRAHANSKÝ, M. HANÁČEK, P. ZBOŘIL, F. HENZL, M. ZBOŘIL, F. YIM, J. SHIM, K.
Original Title
Cryptomodules in Wireless Networks using Biometric Authentication: Securing Nodes in Wireless Networks
Type
book chapter
Language
English
Original Abstract
This chapter shows how cryptomodules can increase security of wireless sensor network and possibilities of biometric authentication against a node or the whole network. For secure operation of a wireless sensor network, security objectives such as confidentiality, integrity, and authentication must be implemented. These security objectives typically employ cryptography, therefore sensor nodes should be able to compute cryptographic algorithms and provide secure tamper resistant storage for cryptographic keys. Use of dedicated secure hardware for this purpose and security threats are discussed. Two scenarios where the biometric authentication would be appreciated are introduced - smart home and storehouse with medicaments. Biometric generation of cryptographic keys, biometric authentication in wireless network and possible attacks on biometrics are presented. When designing and verifying communication protocols using informal techniques, some security errors may remain undetected. Formal verification methods that provide a systematic way of finding protocol flaws are discussed.
Keywords
cryptomodule, wireless network, security, authentication, network node
Authors
DRAHANSKÝ, M.; HANÁČEK, P.; ZBOŘIL, F.; HENZL, M.; ZBOŘIL, F.; YIM, J.; SHIM, K.
RIV year
2015
Released
8. 9. 2015
Publisher
IGI Global
Location
Washington
ISBN
978-1-4666-9426-2
Book
Improving Information Security Practices through Computational Intelligence
Pages from
198
Pages to
227
Pages count
29
URL
http://www.igi-global.com/book/improving-information-security-practices-through/132453
BibTex
@inbook{BUT119875, author="Martin {Drahanský} and Petr {Hanáček} and František {Zbořil} and Martin {Henzl} and František {Zbořil} and Jaegeol {Yim} and Kyubark {Shim}", title="Cryptomodules in Wireless Networks using Biometric Authentication: Securing Nodes in Wireless Networks", booktitle="Improving Information Security Practices through Computational Intelligence", year="2015", publisher="IGI Global", address="Washington", pages="198--227", doi="10.4018/978-1-4666-9426-2.ch008", isbn="978-1-4666-9426-2", url="http://www.igi-global.com/book/improving-information-security-practices-through/132453" }