53 research outputs found

    SILS: a Smart Indoors Localization Scheme based on on-the-go cooperative Smartphones networks using onboard Bluetooth, WiFi and GNSS

    Get PDF
    Seamless outdoors-indoors localization based on Smartphones sensors is essential to realize the full potential of Location Based Services. This paper proposes a Smart Indoors Localization Scheme (SILS) whereby participating Smartphones (SPs) in the same outdoors and indoors vicinity, form a Bluetooth network to locate the indoors SPs. To achieve this, SILS will perform 3 functions: (1) synchronize & locate all reachable WiFi Access Points (WAPs) with live GNSS time available on the outdoors SPs; 2) exchange a database of all SPs location and time-offsets; 3) calculate approximate location of indoor-SPs based on hybridization of GNSS, Bluetooth and WiFi measurements. These measurements includes a) Bluetooth to Bluetooth relative pseudo ranges of all participating SPs based on hop-synchronization and Master-Slave role switching to minimize the pseudo-ranges error, b) GNSS measured location of outdoors-SPs with good geometric reference points, and c) WAPs-SPs Trilateration estimates for deep indoors localization. Results, obtained from OPNET simulation and live trials of SILS built for various SPs network size and indoors/outdoors combinations scenarios, show that we can locate under 1 meter in near-indoors while accuracy of around 2-meters can be achieved when locating SPs at deep indoors situations. Better accuracy can be achieved when large numbers of SPs (up to 7) are available in the network/vicinity at any one time and when at least 4 of them have a good sky view outdoors

    oBiometrics: A Software protection scheme using biometric-based obfuscation

    Get PDF
    This paper proposes to integrate biometric-based key generation into an obfuscated interpretation algorithm to protect authentication application software from illegitimate use or reverse-engineering. This is especially necessary for mCommerce because application programmes on mobile devices, such as Smartphones and Tablet-PCs are typically open for misuse by hackers. Therefore, the scheme proposed in this paper ensures that a correct interpretation / execution of the obfuscated program code of the authentication application requires a valid biometric generated key of the actual person to be authenticated, in real-time. Without this key, the real semantics of the program can not be understood by an attacker even if he/she gains access to this application code. Furthermore, the security provided by this scheme can be a vital aspect in protecting any application running on mobile devices that are increasingly used to perform business/financial or other security related applications, but are easily lost or stolen. The scheme starts by creating a personalised copy of any application based on the biometric key generated during an enrolment process with the authenticator as well as a nuance created at the time of communication between the client and the authenticator. The obfuscated code is then shipped to the client’s mobile devise and integrated with real-time biometric extracted data of the client to form the unlocking key during execution. The novelty of this scheme is achieved by the close binding of this application program to the biometric key of the client, thus making this application unusable for others. Trials and experimental results on biometric key generation, based on client's faces, and an implemented scheme prototype, based on the Android emulator, prove the concept and novelty of this proposed scheme

    eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

    Get PDF
    The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system

    Privacy preserving, real-time and location secured biometrics for mCommerce authentication

    Get PDF
    Secure wireless connectivity between mobile devices and financial/commercial establishments is mature, and so is the security of remote authentication for mCommerce. However, the current techniques are open for hacking, false misrepresentation, replay and other attacks. This is because of the lack of real-time and current-precise-location in the authentication process. This paper proposes a new technique that includes freshly-generated real-time personal biometric data of the client and present-position of the mobile device used by the client to perform the mCommerce so to form a real-time biometric representation to authenticate any remote transaction. A fresh GPS fix generates the "time and location" to stamp the biometric data freshly captured to produce a single, real-time biometric representation on the mobile device. A trusted Certification Authority (CA) acts as an independent authenticator of such client's claimed real time location and his/her provided fresh biometric data. Thus eliminates the necessity of user enrolment with many mCommerce services and application providers. This CA can also "independently from the client" and "at that instant of time" collect the client's mobile device "time and location" from the cellular network operator so to compare with the received information, together with the client's stored biometric information. Finally, to preserve the client's location privacy and to eliminate the possibility of cross-application client tracking, this paper proposes shielding the real location of the mobile device used prior to submission to the CA or authenticators

    Privacy in Biometric Systems

    Get PDF
    Biometrics are physiological and/or behavioral characteristics of a person that have been used to provide an automatic proof of identity in a growing list of applications including crime/terrorism fighting, forensics, access and border control, securing e-/m-commerce transactions and service entitlements. In recent years, a great deal of research into a variety of new and traditional biometrics has widened the scope of investigations beyond improving accuracy into mechanisms that deal with serious concerns raised about the potential misuse of collected biometric data. Despite the long list of biometrics’ benefits, privacy concerns have become widely shared due to the fact that every time the biometric of a person is checked, a trace is left that could reveal personal and confidential information. In fact, biometric-based recognition has an inherent privacy problem as it relies on capturing, analyzing, and storing personal data about us as individuals. For example, biometric systems deal with data related to the way we look (face, iris), the way we walk (gait), the way we talk (speaker recognition), the way we write (handwriting), the way we type on a keyboard (keystroke), the way we read (eye movement), and many more. Privacy has become a serious concern for the public as biometric systems are increasingly deployed in many applications ranging from accessing our account on a Smartphone or computer to border control and national biometric cards on a very large scale. For example, the Unique Identification Authority of India (UIDAI) has issued 56 million biometric cards as of January 2014 [1], where each biometric card holds templates of the 10 fingers, the two irises and the face. An essential factor behind the growing popularity of biometrics in recent years is the fact that biometric sensors have become a lot cheaper as well as easier to install and handle. CCTV cameras are installed nearly everywhere and almost all Smartphones are equipped with a camera, microphone, fingerprint scanner, and probably very soon, an iris scanner

    LocBiometrics: Mobile phone based multifactor biometric authentication with time and location assurance

    Get PDF
    The continuing growth of Smartphones and Superphones has significantly increased mCommerce. The security of personal information on the phone and lack of the face-to-face identification has made the authentication process prone to identity theft and false impersonation. Biometric authentication offers personal identification but is missing the real-time and precise-position associated with the person. This paper proposes the use of freshly generated real-time personal-data and present-position to form a “one-time multi-factor biometric” representation. i.e. using GPS "time and location" to stamp the user’s fresh biometric data on the phone side, and then, the authenticator will compare this information with the position of the phone obtained independently from the cellular network at that instant in time

    Scandcleft randomized trials of primary surgery for unilateral cleft lip and palate : comparison of dental arch relationships and dental indices at 5, 8, and 10 years

    Get PDF
    Background and trial design The Scandcleft intercentre study evaluates the outcomes of four surgical protocols (common method Arm A, and methods B, C, and D) for treatment of children with unilateral cleft lip and palate (UCLP) in a set of three randomized trials of primary surgery (Trials 1, 2, and 3). Objectives To evaluate and compare dental arch relationships of 5-, 8-, and 10-year-old children with UCLP after four different protocols of primary surgery and to compare three dental indices. The results are secondary outcomes of the overall trial. Methods Study models taken at the ages of 5 (n = 418), 8 (n = 411), and 10 years (n = 410) were analysed by a blinded panel of orthodontists using the Eurocran index, the 5-year-olds' (5YO) index, and the GOSLON Yardstick. Student's t-test, Pearson's correlation, chi-square test, and kappa statistics were used in statistical analyses. Results The reliability of the dental indices varied between moderate and very good, and those of the Eurocran palatal index varied between fair and very good. Significant correlations existed between the dental indices at all ages. No differences were found in the mean 5-, 8-, and 10-year index scores or their distributions within surgical trials. Comparisons between trials detected significantly better mean index scores in Trial 2 Arm C (at all ages) and in Trial 1 Arm B (at 5 and 10 years of age) than in Trial 3 Arm D. The mean Eurocran dental index scores of the total material at 5, 8, and 10 years of age were 2.50, 2.60, and 2.26, and those of the 5YO index and GOSLON Yardstick were 2.77, 2.90, and 2.54, respectively. At age 10 years, 75.8% of the patients had had orthodontic treatment. Conclusions The results of these three trials do not provide evidence that one surgical method is superior to the others. The reliabilities of the dental indices were acceptable, and significant correlations existed between the indices at all ages. The reliability of the Eurocran palatal index was questionable.Peer reviewe

    Intra-articular vs. systemic administration of etanercept in antigen-induced arthritis in the temporomandibular point. Part I: histological effects

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Temporomandibular joint (TMJ) arthritis in children causes alterations in craniomandibular growth. This abnormal growth may be prevented by an early anti-inflammatory intervention. We have previously shown that intra-articular (IA) corticosteroid reduces TMJ inflammation, but causes concurrent mandibular growth inhibition in young rabbits. Blockage of TNF-α has already proven its efficacy in children with juvenile idiopathic arthritis not responding to standard therapy. In this paper we evaluate the effect of IA etanercept compared to subcutaneous etanercept in antigen-induced TMJ-arthritis in rabbits on histological changes using histomorphometry and stereology. This article presents the data and discussion on the anti-inflammatory effects of systemic and IA etanercept. In Part II the data on the effects of systemic and IA etanercept on facial growth are presented.</p> <p>Methods</p> <p>Forty-two rabbits (10 weeks old) pre-sensitized with ovalbumin and locally induced inflammation in the temporomandibular joints were divided into three groups: a placebo group receiving IA saline injections in both joints one week after arthritis induction (n = 14), an IA etanercept group receiving 0.1 mg/kg etanercept per joint one week after arthritis induction (n = 14) and a systemic etanercept group receiving 0.8 mg/kg etanercept weekly throughout the 12-week study (n = 14). Arthritis was maintained by giving four inductions three weeks apart. Additional IA saline or etanercept injections were also given one week after the re-inductions. Histomorphometric and unbiased stereological methods (optical fractionator) were used to assess and estimate the inflammation in the joints.</p> <p>Results</p> <p>The histomorphometry showed synovial proliferation in all groups. The plasma cell count obtained by the optical fractionator was significantly reduced when treating with systemic etanercept but not with IA etanercept. Semi-quantitative assessments of synovial proliferation and subsynovial inflammation also showed reduced inflammation in the systemic etanercept group. However, the thickness of the synovial lining and volume of the subsynovial connective tissue showed no differences between the groups.</p> <p>Conclusion</p> <p>An anti-inflammatory effect of systemic etanercept on the synovial tissues in the temporomandibular joint was shown. However, IA etanercept at the given dose had no significant effect on the severity of chronic inflammation on the parameters here tested in ovalbumin antigen-induced arthritis.</p
    • …
    corecore