Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Securing Pervasive Networks Using Biometrics
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Securing Pervasive Networks Using Biometrics

[attachment=23525]

Abstract

Challenges in pervasive computing environments
Computing devices are numerous and ubiquitous
Traditional authentication including login schemes do not work well with so many devices
Proposed Solution
Use biometrics for authentication
At the same time, ensure security of biometric templates in an open environment
Contributions
Propose a biometrics based framework for securing pervasive environment
Implemented a novel scheme for securing biometric data in an open environment using symmetric hash functions.

Security and Privacy

Consequences of a pervasive network
Devices are numerous, ubiquitous and shared
The network shares the context and preferences of the user
Smart spaces are aware of the location and intent of the user
Security Concerns
Only authorized individuals need to be given access
Authentication should be minimally intrusive
Devices should be trustworthy
Privacy issues
User should be aware of when he is being observed
The user context should be protected within the network
Need to balance accessibility and security
Should be scalable with multiple users operating in the network.

Why Biometrics?

With numerous devices, traditional paradigm of user name and password based scenarios are not practical
Only authorized users should have access to data and services
Biometrics provide an unobtrusive and convenient authentication mechanism
Advantages of biometrics
Uniqueness
No need to remember passwords or carry tokens
Biometrics cannot be lost, stolen or forgotten
More secure than a long password
Solves repudiation problem
Not susceptible to traditional dictionary attacks.

Conclusion

Smart spaces and pervasive computing are moving from concepts to implementations
Security has to be incorporated in the design stage
Traditional authentication and access control paradigms cannot scale to numerous and ubiquitous devices
Biometrics serves as a reliable alternative for minimally intrusive authentication
Biometrics solves key management and repudiation problem
Securing biometrics is a major challenge in an open environment
Biometric hashing can be used to create revocable biometric templates.


Pervasive network are leading integrator and managed service provider for secure business network infrastructure