Cryptomodules in Wireless Networks Using Biometric Authentication: Securing Nodes in Wireless Networks

Cryptomodules in Wireless Networks Using Biometric Authentication: Securing Nodes in Wireless Networks

Martin Drahanský, Petr Hanáček, František Zbořil, Martin Henzl, František V. Zbořil, Jaegeol Yim, Kyubark Shim
ISBN13: 9781466694262|ISBN10: 1466694262|EISBN13: 9781466694279
DOI: 10.4018/978-1-4666-9426-2.ch008
Cite Chapter Cite Chapter

MLA

Drahanský, Martin, et al. "Cryptomodules in Wireless Networks Using Biometric Authentication: Securing Nodes in Wireless Networks." Improving Information Security Practices through Computational Intelligence, edited by Wasan Awad, et al., IGI Global, 2016, pp. 198-226. https://doi.org/10.4018/978-1-4666-9426-2.ch008

APA

Drahanský, M., Hanáček, P., Zbořil, F., Henzl, M., Zbořil, F. V., Yim, J., & Shim, K. (2016). Cryptomodules in Wireless Networks Using Biometric Authentication: Securing Nodes in Wireless Networks. In W. Awad, E. El-Alfy, & Y. Al-Bastaki (Eds.), Improving Information Security Practices through Computational Intelligence (pp. 198-226). IGI Global. https://doi.org/10.4018/978-1-4666-9426-2.ch008

Chicago

Drahanský, Martin, et al. "Cryptomodules in Wireless Networks Using Biometric Authentication: Securing Nodes in Wireless Networks." In Improving Information Security Practices through Computational Intelligence, edited by Wasan Awad, El Sayed M. El-Alfy, and Yousif Al-Bastaki, 198-226. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-4666-9426-2.ch008

Export Reference

Mendeley
Favorite

Abstract

This chapter shows how cryptomodules can increase security of wireless sensor network and possibilities of biometric authentication against a node or the whole network. For secure operation of a wireless sensor network, security objectives such as confidentiality, integrity, and authentication must be implemented. These security objectives typically employ cryptography, therefore sensor nodes should be able to compute cryptographic algorithms and provide secure tamper-resistant storage for cryptographic keys. Use of dedicated secure hardware for this purpose and security threats are discussed. Two scenarios where the biometric authentication would be appreciated are introduced – smart home and storehouse with medicaments. Biometric generation of cryptographic keys, biometric authentication in wireless network and possible attacks on biometrics are presented. When designing and verifying communication protocols using informal techniques, some security errors may remain undetected. Formal verification methods that provide a systematic way of finding protocol flaws are discussed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.