BSC: A Novel Scheme for Providing Security using Biometric Smart Card
نویسندگان
چکیده
Technology advances day by day and the new things are being developed. There are many new technologies being introduced and developed in any discipline. Data Security plays a vital role and Biometric security systems is one of the new trends to be developed, which has its advantages for controlling access, protecting sensitive data, tracking on-line systems, etc.,. Biometric technologies such as fingerprint, face and iris recognition have seen an increasing interest throughout the past decades to increase the security, convenience, accountability. Such interest has been intensified with various large-scale initiatives from governments that seek to incorporate biometric technologies for the purposes of identification, verification and for fraud detection and deterrence. Being purely ad hoc technological implementations, biometric devices are now seen as being of strategic value and consequently of strategic importance. With the perception of better efficiency and effectiveness, governments are beginning to embrace biometric technologies. Industry is also geared up to sell the products, and all over the world businesses are looking to incorporate biometrics for many different uses ranging from accesscontrol to e-commerce and entertainment. Biometrics and smart cards are two of the most powerful security solutions available today. This paper introduces a new mechanism to provide better security and services with Biometric Smart Card technology including hybrid biometric security, i.e., with the combination of security for fingerprint pattern and for the smart card. General Terms BSC, NFC, PIN, X.509, Authentication, Security Mechanism, RSA Algorithm, Cyber Forensics.
منابع مشابه
Design and Analysis of a Secure Three Factor User Authentication Scheme Using Biometric and Smart Card
Password security can no longer provide enough security in the area of remote user authentication. Considering this security drawback, researchers are trying to find solution with multifactor remote user authentication system. Recently, three factor remote user authentication using biometric and smart card has drawn a considerable attention of the researchers. However, most of the current propo...
متن کاملImproving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks
User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authenticati...
متن کاملBiometric based smart card for security
Fingerprint has been increasingly used in authentication applications. Smart card is becoming more and more common and is moving toward a multi-function era. The integration of biometric and smart card is a trend for the future of smart card. As a part of our research project which concerns a novel security card, we propose to integrate the fingerprint sensor with the smart card instead of the ...
متن کاملA Novel Remote User Authentication Scheme Using Smart Card with Biometric Based on Ecdlp
In this paper, a novel efficient remote user authentication scheme using smart card with biometric based on Elliptic Curve Discrete Logarithm Problem (ECDLP) has been proposed. A remote user authentication scheme is a client server based protocol whereby an authentication server identifies the identity of a remote user when he/she individually logging on to the server using public, untrusted, u...
متن کاملAnalysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
The author first reviews the recently proposed Li-Hwang’s biometric-based remote user authentication scheme using smart cards; then shows that the Li-Hwang’s scheme has some design flaws in their scheme. In order to withstand those flaws in their scheme, an improvement of their scheme is further proposed. The author also shows that the improved scheme provides strong authentication with the use...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013