Publication Details

Cryptomodules in Wireless Networks using Biometric Authentication: Securing Nodes in Wireless Networks

DRAHANSKÝ, M.; HANÁČEK, P.; ZBOŘIL, F.; HENZL, M.; ZBOŘIL, F.; YIM, J.; SHIM, K. Cryptomodules in Wireless Networks using Biometric Authentication: Securing Nodes in Wireless Networks. In Improving Information Security Practices through Computational Intelligence. Washington: IGI Global, 2015. p. 198-227. ISBN: 978-1-4666-9426-2.
Czech title
Kryptomoduly v bezdrátových sítích využívající biometrické autentizace: Zabezpečení uzlů v bezdrátových sítích
Type
book chapter
Language
English
Authors
Drahanský Martin, prof. Ing., Ph.D.
Hanáček Petr, doc. Dr. Ing. (DITS)
Zbořil František, doc. Ing., Ph.D. (DITS)
Henzl Martin, Ing. Mgr., Ph.D.
Zbořil František, doc. Ing., CSc. (DITS)
Yim Jaegeol
Shim Kyubark
URL
Keywords

cryptomodule, wireless network, security, authentication, network node

Abstract

This chapter shows how cryptomodules can increase security of wireless sensor
network and possibilities of biometric authentication against a node or the whole
network. For secure operation of a wireless sensor network, security objectives
such as confidentiality, integrity, and authentication must be implemented. These
security objectives typically employ cryptography, therefore sensor nodes should
be able to compute cryptographic algorithms and provide secure tamper resistant
storage for cryptographic keys. Use of dedicated secure hardware for this purpose
and security threats are discussed. Two scenarios where the biometric
authentication would be appreciated are introduced - smart home and storehouse
with medicaments. Biometric generation of cryptographic keys, biometric
authentication in wireless network and possible attacks on biometrics are
presented. When designing and verifying communication protocols using informal
techniques, some security errors may remain undetected. Formal verification
methods that provide a systematic way of finding protocol flaws are discussed.

Published
2015
Pages
198–227
Book
Improving Information Security Practices through Computational Intelligence
ISBN
978-1-4666-9426-2
Publisher
IGI Global
Place
Washington
DOI
EID Scopus
BibTeX
@inbook{BUT119875,
  author="Martin {Drahanský} and Petr {Hanáček} and František {Zbořil} and Martin {Henzl} and František {Zbořil} and Jaegeol {Yim} and Kyubark {Shim}",
  title="Cryptomodules in Wireless Networks using Biometric Authentication: Securing Nodes in Wireless Networks",
  booktitle="Improving Information Security Practices through Computational Intelligence",
  year="2015",
  publisher="IGI Global",
  address="Washington",
  pages="198--227",
  doi="10.4018/978-1-4666-9426-2.ch008",
  isbn="978-1-4666-9426-2",
  url="http://www.igi-global.com/book/improving-information-security-practices-through/132453"
}
Back to top