A New Biometrics based Key Exchange andDeniable Authentication Protocol
Asst.Proffessor, Department of Computer ScienceGovt Arts CollegeUdumalpet, Tirupur, Indiadharundharsan@rediffmail.com
Dr. R. Balasubramanian
Dean Academic AffairsPPG Institute of TechnologyCoimbatore, Indiaramamurthybala2@gmail.com
Wireless Local Area Networks (WLANs) are gainingrecognition as they are fast, cost effective, supple and easy to use.The networks face a serious of issues and challenges in establishingsecurity to the users of the network. With users accessing networksremotely, transmitting data by means of the Internet and carryingaround laptops containing sensitive data, ensuring security is anincreasingly multifarious challenge. Therefore it is necessary to makesure the security of the network users. In order to provide network security many techniques and systems have been proposed earlier inliterature. Most of these traditional methods make use of password,smart cards and so on to provide security to the network users.Though these traditional methods are effective in ensuring securitythey posses some limitations too. The problem with these traditionalapproaches is that there is possibility to forget the password. Moreover, compromised password lead to a fact, that unauthorized user can have access to the accounts of the valid user. This paper proposes an approach for network security using biometrics
and deniable authentication protocol. The human biometrics like hand geometry, face, fingerprint, retina, iris, DNA, signature and voicecan be effectively used to ensure the network security. The diverse phases included in this proposed approach are user registration, fingerprint enhancement, minutiae point extraction, mapping functionand deniable authentication protocol. Furthermore, biometricauthentication systems can be more convenient for the users since it involves no password that might be feared to be forgotten by thenetwork users or key to be lost and therefore a single biometric trait (e.g., fingerprint) can be used to access several accounts without theburden of remembering passwords.
This proposed paper alsoexplains some of the fingerprint enhancement techniques to make thebiometric template noise free. Experiments are conducted to evaluatethe performance measure of the proposed approach.
Biometrics, Cryptography, Data Security, Fingerprint,Mapping Function, Minutiae Point, Network Security, User Registration
INTRODUCTIONAccurate, automatic identification and authentication of users is an elemental problem in network environments.Shared secrets such as personal identification numbers or passwords and key devices like smart cards are not justenough in some cases. This authentication method hastraditionally been based on passwords. The problem with thesetraditional approaches is that there is possibility to forget the password. Moreover, compromised password lead to a fact,that unauthorized user can have access to the accounts of thevalid user. The Biometric based user authentication systemsare highly secured and efficient to use and place total trust onthe authentication server where biometric verification data arestored in a central database . This biometrics based user authentication system improves the network security. Some of most widely used biometric are hand geometry, face,fingerprint, retina, iris, DNA, signature and voice.Biometrics is the science of measuring and statisticallyanalyzing biological data can be used to recognize different body parts like the eyes, fingerprints, facial characteristics,voice etc. Thus, it takes security to the next level by not justconfining it to authenticating passwords, fingerprint matchingtechniques . Based on the individual's biometriccharacteristics a biometric system recognizes an individual.The process of a biometric system can be described, in a beginner's manner, by a three-step process. The foremost stepin this process is collection of the biometric data which isformally known as user registration. This step uses differentsensors, to assist the user in the registration process. Thesecond step converts and describes the observed data using adigital representation called a template. This step varies between modalities and also between vendors. In the thirdstep, the newly acquired template is compared with one or more previously generated templates stored in a database. Theresult of this comparison is a “match” or a “non-match” and isused for actions such as permitting access, sounding an alarm,etc .Declaring a match or non-match is based on the obtainedtemplate being analogous, but not one and the same, to thestored template. A threshold determines the measure of similarity necessary to result in a match declaration. Theacceptance or rejection of biometric data is completelydependent on the match score falling above or below thethreshold. The threshold is adjustable so that the biometricsystem can be more or less stringent, depending on therequirements of any given biometric application . Amongall the biometric techniques, today fingerprints are the mostwidely used biometric features for personal identification because of their high acceptability, Immutability andindividuality.This paper proposes a technique to secure the network communication using biometric characteristics obtained fromthe individuals. The biometric characteristic used in this paper is fingerprint. This proposed paper utilizes image processingtechnique to extract the biometric measurement calledminutiae from the user’s fingerprint. The user’s full finger print image is converted and stored as encrypted binarytemplate, which is used for authentication by the server of thenetwork. The user’s biometric verification data are firsttransformed into a strong secret and is then stored in the
(IJCSIS) International Journal of Computer Science and Information Security,Vol. 8, No. 2, May 2010188http://sites.google.com/site/ijcsis/ISSN 1947-5500