3 research outputs found

    Fulltime biometric mouse design for continuous authentication

    Get PDF
    As we embrace the information and communication technology in our everyday activities and day-to-day transactions, security concerns have increasingly come to light, especially in some of the critical areas of our society today such as education, health and commerce, where such security concerns are even higher. The need for complete and clear authentication and authorisation is of paramount importance. This paper explores andpresents the optimal use of full-time biometric mouse (FBM) for continuous authentication, which would not only enable authentication during log in and start of an application, but will enable continuous authentication throughout a transaction. We formulate a full-time biometric mouse (FBM) design that would ensure thumb positioning and its  ergonomics while ensuring comfort and maximum contact with the scanner to enable continuous authentication of the user in a speedy, easy and non-strenuous way. The mouse employs a simple algorithm that ensures quick operation to cut on possible delays and yet maintain the accuracy of the system

    Identification of Biometric-Based Continuous user Authentication and Intrusion Detection System for Cluster Based Manet

    Get PDF
    Mobile ad hoc is an infrastructure less dynamic network used in many applications; it has been targets of various attacks and makes security problems. This work aims to provide an enhanced level of security by using the prevention based and detection based approaches such as authentication and intrusion detection. The multi-model biometric technology is used for continuous authentication and intrusion detection in high security cluster based MANET. In this paper, an attempt has been made to combine continuous authentication and intrusion detection. In this proposed scheme, Dempster-Shafer theory is used for data fusion because more than one device needs to be chosen and their observation can be used to increase observation accuracy

    Optimal biometric-based continuous authentication in mobile ad hoc networks

    No full text
    In mobile ad hoc networks (MANETs), continuous authentication is desirable so that a system can be monitored for the duration of the session to reduce the vulnerability. This paper presents an optimal biometric-based continuous authentication scheme in MANETs. We formul
    corecore