Cryptomodules in Wireless Networks Using Biometric Authentication: Securing Nodes in Wireless Networks

Cryptomodules in Wireless Networks Using Biometric Authentication: Securing Nodes in Wireless Networks

Martin Drahanský (Brno University of Technology, Czech Republic), Petr Hanáček (Brno University of Technology, Czech Republic), František Zbořil (Brno University of Technology, Czech Republic), Martin Henzl (Brno University of Technology, Czech Republic), František V. Zbořil (Brno University of Technology, Czech Republic), Jaegeol Yim (Dongguk University at Gyeongju Gyeongbuk, South Korea) and Kyubark Shim (Dongguk University at Gyeongju Gyeongbuk, South Korea)
DOI: 10.4018/978-1-4666-9426-2.ch008
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

This chapter shows how cryptomodules can increase security of wireless sensor network and possibilities of biometric authentication against a node or the whole network. For secure operation of a wireless sensor network, security objectives such as confidentiality, integrity, and authentication must be implemented. These security objectives typically employ cryptography, therefore sensor nodes should be able to compute cryptographic algorithms and provide secure tamper-resistant storage for cryptographic keys. Use of dedicated secure hardware for this purpose and security threats are discussed. Two scenarios where the biometric authentication would be appreciated are introduced – smart home and storehouse with medicaments. Biometric generation of cryptographic keys, biometric authentication in wireless network and possible attacks on biometrics are presented. When designing and verifying communication protocols using informal techniques, some security errors may remain undetected. Formal verification methods that provide a systematic way of finding protocol flaws are discussed.
Chapter Preview
Top

Introduction

The wireless networks are well known conception for various solutions, not only in academic (research) area, but are very often used in industrial solutions. However, their use in industrial solutions opens two very important questions – how we can secure the communication within the wireless network and how we can determine whether there is any possibility of authentication against a node or the whole wireless sensor network (WSN). The answers to these questions might be found in this chapter.

As an example we can take two different industrial solutions that can be used for wireless networks could be installed – see the following two subsections. In both cases, the above mentioned questions can be addressed, because they play a very important role in the whole process.

Complete Chapter List

Search this Book:
Reset