All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Cryptomodules in Wireless Networks using Biometric Authentication: Securing Nodes in Wireless Networks

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26230%2F15%3APU117018" target="_blank" >RIV/00216305:26230/15:PU117018 - isvavai.cz</a>

  • Result on the web

    <a href="http://www.igi-global.com/book/improving-information-security-practices-through/132453" target="_blank" >http://www.igi-global.com/book/improving-information-security-practices-through/132453</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.4018/978-1-4666-9426-2.ch008" target="_blank" >10.4018/978-1-4666-9426-2.ch008</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Cryptomodules in Wireless Networks using Biometric Authentication: Securing Nodes in Wireless Networks

  • Original language description

    This chapter shows how cryptomodules can increase security of wireless sensor network and possibilities of biometric authentication against a node or the whole network. For secure operation of a wireless sensor network, security objectives such as confidentiality, integrity, and authentication must be implemented. These security objectives typically employ cryptography, therefore sensor nodes should be able to compute cryptographic algorithms and provide secure tamper resistant storage for cryptographic keys. Use of dedicated secure hardware for this purpose and security threats are discussed. Two scenarios where the biometric authentication would be appreciated are introduced - smart home and storehouse with medicaments. Biometric generation of cryptographic keys, biometric authentication in wireless network and possible attacks on biometrics are presented. When designing and verifying communication protocols using informal techniques, some security errors may remain undetected. Formal verification methods that provide a systematic way of finding protocol flaws are discussed.

  • Czech name

  • Czech description

Classification

  • Type

    C - Chapter in a specialist book

  • CEP classification

  • OECD FORD branch

    10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

Result continuities

  • Project

    <a href="/en/project/ED1.1.00%2F02.0070" target="_blank" >ED1.1.00/02.0070: IT4Innovations Centre of Excellence</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2015

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Book/collection name

    Improving Information Security Practices through Computational Intelligence

  • ISBN

    978-1-4666-9426-2

  • Number of pages of the result

    29

  • Pages from-to

    198-227

  • Number of pages of the book

    450

  • Publisher name

    IGI Global

  • Place of publication

    Washington

  • UT code for WoS chapter