Cryptomodules in Wireless Networks using Biometric Authentication: Securing Nodes in Wireless Networks
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26230%2F15%3APU117018" target="_blank" >RIV/00216305:26230/15:PU117018 - isvavai.cz</a>
Result on the web
<a href="http://www.igi-global.com/book/improving-information-security-practices-through/132453" target="_blank" >http://www.igi-global.com/book/improving-information-security-practices-through/132453</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.4018/978-1-4666-9426-2.ch008" target="_blank" >10.4018/978-1-4666-9426-2.ch008</a>
Alternative languages
Result language
angličtina
Original language name
Cryptomodules in Wireless Networks using Biometric Authentication: Securing Nodes in Wireless Networks
Original language description
This chapter shows how cryptomodules can increase security of wireless sensor network and possibilities of biometric authentication against a node or the whole network. For secure operation of a wireless sensor network, security objectives such as confidentiality, integrity, and authentication must be implemented. These security objectives typically employ cryptography, therefore sensor nodes should be able to compute cryptographic algorithms and provide secure tamper resistant storage for cryptographic keys. Use of dedicated secure hardware for this purpose and security threats are discussed. Two scenarios where the biometric authentication would be appreciated are introduced - smart home and storehouse with medicaments. Biometric generation of cryptographic keys, biometric authentication in wireless network and possible attacks on biometrics are presented. When designing and verifying communication protocols using informal techniques, some security errors may remain undetected. Formal verification methods that provide a systematic way of finding protocol flaws are discussed.
Czech name
—
Czech description
—
Classification
Type
C - Chapter in a specialist book
CEP classification
—
OECD FORD branch
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Result continuities
Project
<a href="/en/project/ED1.1.00%2F02.0070" target="_blank" >ED1.1.00/02.0070: IT4Innovations Centre of Excellence</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach
Others
Publication year
2015
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Book/collection name
Improving Information Security Practices through Computational Intelligence
ISBN
978-1-4666-9426-2
Number of pages of the result
29
Pages from-to
198-227
Number of pages of the book
450
Publisher name
IGI Global
Place of publication
Washington
UT code for WoS chapter
—