1,319 research outputs found

    Biometric Keys for the Encryption of Multimodal Signatures

    Get PDF
    Electricity, electromagnetism & magnetis

    Accelerometer-Based Key Generation and Distribution Method for Wearable IoT Devices

    Get PDF

    Survey and Systematization of Secure Device Pairing

    Full text link
    Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices. Comparison and assessment of SDP schemes is troublesome, because each scheme makes different assumptions about out-of-band channels and adversary models, and are driven by their particular use-cases. A conceptual model that facilitates meaningful comparison among SDP schemes is missing. We provide such a model. In this article, we survey and analyze a wide range of SDP schemes that are described in the literature, including a number that have been adopted as standards. A system model and consistent terminology for SDP schemes are built on the foundation of this survey, which are then used to classify existing SDP schemes into a taxonomy that, for the first time, enables their meaningful comparison and analysis.The existing SDP schemes are analyzed using this model, revealing common systemic security weaknesses among the surveyed SDP schemes that should become priority areas for future SDP research, such as improving the integration of privacy requirements into the design of SDP schemes. Our results allow SDP scheme designers to create schemes that are more easily comparable with one another, and to assist the prevention of persisting the weaknesses common to the current generation of SDP schemes.Comment: 34 pages, 5 figures, 3 tables, accepted at IEEE Communications Surveys & Tutorials 2017 (Volume: PP, Issue: 99

    Recent Application in Biometrics

    Get PDF
    In the recent years, a number of recognition and authentication systems based on biometric measurements have been proposed. Algorithms and sensors have been developed to acquire and process many different biometric traits. Moreover, the biometric technology is being used in novel ways, with potential commercial and practical implications to our daily activities. The key objective of the book is to provide a collection of comprehensive references on some recent theoretical development as well as novel applications in biometrics. The topics covered in this book reflect well both aspects of development. They include biometric sample quality, privacy preserving and cancellable biometrics, contactless biometrics, novel and unconventional biometrics, and the technical challenges in implementing the technology in portable devices. The book consists of 15 chapters. It is divided into four sections, namely, biometric applications on mobile platforms, cancelable biometrics, biometric encryption, and other applications. The book was reviewed by editors Dr. Jucheng Yang and Dr. Norman Poh. We deeply appreciate the efforts of our guest editors: Dr. Girija Chetty, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park and Dr. Sook Yoon, as well as a number of anonymous reviewers

    Wearable Wireless Devices

    Get PDF
    No abstract available

    Wearable Wireless Devices

    Get PDF
    No abstract available

    Improving security and usability of mobile device authentication mechanisms

    Get PDF
    Mobile devices, in the form of smartphones and tablet computers, are going through an amazing growth cycle. The devices are powerful and robust enough to house an incredible amount of sensitive data about our personal and business lives. These devices, however, have relatively weak authentication systems, generally consisting of a pin number or pattern matching challenge. In addition to the weak authentication systems, the input mechanism of using a finger on a touchscreen leaves a residue trail that can be easily recovered, allowing an attacker to recover some or all of the authentication code. This thesis examines the strengths and weaknesses of the authentication systems available on iOS and Android systems. It then looks for alternative improved solutions by examining the array of sensor technologies on current mobile devices. Three improved solutions are presented, including a dynamic touchscreen pattern that removes the ability for a smudge attack, a forced rotation authentication screen that obfuscates input patterns, and a GPS enabled system that reduces authentication requirements when in a designated safe zone
    corecore