DocumentCode :
2388071
Title :
A biometrics-based secure architecture for mobile computing
Author :
Islam, Muhammad Faysal ; Islam, M. Nazrul
Author_Institution :
Dept. of Eng. Manage. & Syst. Eng., George Washington Univ., Washington, DC, USA
fYear :
2012
fDate :
4-4 May 2012
Firstpage :
1
Lastpage :
5
Abstract :
Mobile computing devices such as smartphones, tablets and wireless enabled laptops are getting widely popular and being frequently used to access information in secure networks through third party providers. With the increasing number of intrusion, device and identity theft incidents, improved security measures are becoming essential for accessing devices as well as various mobile applications. In this paper, a novel security architecture has been proposed for mobile computing platform which utilizes biometric signatures to authenticate users against large databases. Identifying correct biometric credentials in mobile devices can be a challenging task as there are no biometric input devices available with these systems. The task of scanning biometric signatures can be performed via device camera and microphone. The primary challenge is to precisely collect the biometric signatures and minimize the effects of noise, intra class variations, surrounding environment and high error rate when comparing against millions of similar signatures. A multimodal verification scheme applying face, hand geometry, fingerprint and other biometric signatures which can be scanned through mobile devices will increase the reliability of the system. The next challenge this architecture will address is the size of biometric signature and verification data that is sent for comparison. A fusion of multiple signatures can be performed by applying segmented data in order to increase the verification speed while maintaining high accuracy. Fusion also protects against spoofing where criminals and predatory users submit false or modified biometric information for verification. As multiple signatures are weighted and compared, false or unmatched signatures can be easily identified and addressed accordingly. In order to protect the information during data transfer and future storage, encryption and other security enhancement techniques are proposed to be integrated. The proposed architecture is ex- ected to provide secure access to only legitimate users of a system within a short period of time and prohibit intruders from gaining any access.
Keywords :
biometrics (access control); cryptography; digital signatures; microphones; mobile computing; biometric signature scanning; biometrics-based secure architecture; data transfer; device camera; encryption; face; fingerprint; hand geometry; identity theft incident; information protection; intrusion; large database; microphone; mobile computing device; multimodal verification scheme; multiple signature fusion; network security; security enhancement technique; smartphone; spoofing protection; system reliability; tablet; third party provider; user authentication; wireless enabled laptop; Authentication; Computer architecture; Databases; Performance evaluation; Smart phones; biometrics; information security; mobile computing; systems flowchart;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Systems, Applications and Technology Conference (LISAT), 2012 IEEE Long Island
Conference_Location :
Farmingdale, NY
Print_ISBN :
978-1-4577-1342-2
Type :
conf
DOI :
10.1109/LISAT.2012.6223108
Filename :
6223108
Link To Document :
بازگشت