Vous êtes sur la page 1sur 5

Blind Crypto-Biometric Key Generation using

Fingerprint Image for Mobile Adhoc Networks


(MANET)
Mary Grace G. Reyes
School of EECE, Mapua Institute of Technology
Manila, Philippines
mggreyes@mymail.mapua.edu.ph

AbstractMobile Ad hoc network (MANET) is at stake since critical information can be revealed by the
becoming the most frequently used network connection biometrics.
type due to the rapid growth of mobile dependency in
todays technology. Its formation and maintenance of As of now, using biometric characteristics as
architecture is self-based making it to have a big authentication key was explored by the researchers, they
advantage. On the other hand, its diversity brings have tried using different encryption algorithms involving
threat to security. The objective of this research is to biometrics. A study on using cancelable non-invertible
provide an encryption algorithm for MANET using fingerprint as the cryptographic key in MANET was done
biometrics with high security but not compromising the by Pravinchandra, et al. In their proposed method, an
accuracy of the data. authentication key was first created to maintain integrity,
then the data to be transmitted is enciphered using the
Keywordscryptography; mobile ad hoc network; cancelable key from the fingerprint of the acceptor, and
biometric; encryption; network security lastly genetic operator was used to provide randomization
for safety in case of attacks. The system that was created
I. INTRODUCTION was proven to overcome hacking techniques like
Ad-hoc networks refer to communication between cryptanalytic and brute force attack. In their model, the
electronic devices without an intermediary device like fingerprint images that they will use for the
router or switch. The most common application of experimentation was placed in a database. The minutiae
temporary network is the Mobile Ad hoc Network points from the fingerprint image were reconstructed to
(MANET), wherein different smart devices configure form cancelable template in order to secure sensitive user-
themselves to form wireless interconnection without a specific data.
predefined infrastructure. The main advantages of MANET
are that its formation and maintenance of architecture is
self-based. Devices are easily added or removed from the
network. On the other hand, it does not have dependable
centralized authority since the network is formed
temporarily; the infrastructure changes continuously every
time there is a communication that is needed to be
established. One of the immense dispute that emerged from
the diversity of MANET is the security. The rapid growth
of mobile dependency in todays technology brings a need
for secure data transmission using MANET. Cryptography
is the process of securing the data to protect it from being
accessed by unauthorized party. Using biometric attributes
is one of the most effective way to generate unique Figure 1. Illustration of Mobile Ad hoc Network
cryptographic key that will protect the sensitive data during
transmission. But using persons biometrics is very crucial The preceding research traded off the accuracy of
since it cant be compromised, the privacy of the person is data over the security of data. Creating cancelable template
involves strong encryption, the image of the fingerprint was
reconstructed making the similarity within the data be enchipher the data. The process of generating the
removed to defeat attacks. At the same time, the similarity authentication code was shown on figure 2. Utilizing public
that was removed was needed in pattern classification and private key trade calculation, private key enchiphered
algorithm to achieve high accuracy. The previous paper vector is decrypted; then from this, the device id is
doesnt also consider the scale of the MANET, their extracted and verification code AU' produced. If it doesn't
devices was only limited to smartphones and laptops. The match with the AU then process is ended as validation and
improvement for Mobile Ad hoc Networks architecture data integrity are violated. On the off chance that match is
was not catered on the paper. discovered then using indexes of random pair and crossover
point the key K is created at the receiver side using
The objective of this research is to provide an cancelable transform. The flowchart in figure 2
encryption algorithm with high security but not demonstrates the processes that the receiving party does
compromising the accuracy of the data. The blind crypto- once they get the authentication code. Symmetric key is
biometric key generation means that any information about created both the side.
the biometrics will not be revealed. A separate trusted
server handles the encryption of parameters for specific
biometrics. It is also the aim to organize a trust
infrastructure for the Mobile Ad hoc Network with rising
availability and better scalability to secure services. A
defined level of protection by securing communication of
nodes and an improved manageability in certification was
also desired on the research.

Mobile Ad hoc Networks are used not only for


multimedia sharing of laptops and phones but it is also used
in military applications, sensor networks, automotive
networks, industrial applications, etc. which is why
improvement on its security could be beneficial for the
entire society. The development of the study will also build
trust between the server and client, important data will be Figure 2-1. Sender Side Process
protected from threats of hacking.

This study scopes the algorithm for improved


Crypto-Biometric key generation and enhanced architecture
of Mobile Ad hoc Network but doesnt include real life
applications where it could be administered.

II. RELATED LITERATURE


This section contains existing studies related to
biometric cryptography and mobile ad hoc networks.

A. Cancelable Fingerprint
The cancelable fingerprint is generated by repeatedly
distorting of the fingerprint image captured. Mehta
Manisha Pravinchandra analyzed on his paper the
efficiency of using genetic based cancelable non-invertible Figure 2-2. Receiver Side Process
fingerprint for encryption and decryption in MANET. A B. Quantum Cryptography
non-invertible key K was produced when two points in the Based Biometric Encryption
cancelable template cross over genetic point. The
The main idea of cryptography is to facilitate exchange
randomization pair selection indices throughout the
of information in a way that only the intended recipient
cancelable transformation are kept in the vector IV & two
receives it. Anju Rani planned a technique on how to
points of crossover operator are attached to the vector IV.
generate secret key using fingerprint and quantum
The vector IV is encrypted with private key created at the
cryptography. Quantum cryptography uses physics instead
sender side and receiver side, the key K was used to
of math in encryption process. A key and a plain text was message encryption and decryption. Since fingerprint
used together as an input for the encryption algorithm then sample is one of a kind so nobody can get to it.
an attachment was also used as an input to decryption
algorithm. The equation was inscribed as: On the testing part, the BB84 protocol was
comprehended on a noisy environment, it was tested if it
can be identified whether a noise was coming from error or
from eavesdropping. The protocol has two stages:
where P is for plain text, C is for crypto text, k is for
communication over a quantum channel and
cryptographic key, E is for encryption and D is for
communication in four phases over a public channel. The
decryption. This appears, as much as the key is flawlessly
said four phases were the extraction of unused key,
irregular, has the equivalent length as the first message, and
approximation of error in unused key, extraction of
is never reused then the one-time cushion is superbly
reconciled key, and privacy amplification.
secure. It is difficult to build up a secret key with routine
procedures to exchange data from sender to beneficiary or C. Adaptive Security for
the other way around, thus key conveyance has depended Multilevel Adhoc Networks
on the foundation of a physically secure channel ("trusted A research by Tahira Mahboob served as a guide
courier") or the contingent security of "difficult" towards creating and comprehending of reception of
mathematical problems out in the public key cryptography required security for multi-level ad hoc systems.
idea.

Fingerprint authentication is perhaps the most


advanced strategy for all biometric technologies and it has
been checked through different applications. Fingerprint
authentication procedure has especially confirmed its high
productivity. Fingerprint identification process has two
main procedures: enrolment and authorization. All in all, a
fingerprint examiner depends on points of interest of edge
structures of the fingerprint to make fingerprint Figure 4. Mobile Adhoc Network Architecture
identification.
The foundations of our multilevel ad hoc network and
private area network have demonstrated helpless to security
dangers and different assaults like wormhole, black hole,
and network layer attacks. Conventional strategies used to
keep up the security are not sufficient for the future use or
most recent ad hoc networks like PAN (private area
network) and MANET. For ensuring our network from
these risks numerous security structures or models are
assessed for multilevel and ad hoc networks. For example,
supportive security model, UAVs network technology for
multilevel network. It is generally utilized for the battle
purposes or undercover purposes like spying.

Adaptive security model is utilized for the security of


different parameters with in a network and screens every
Figure 3. Enlistment Conceptual Framework node. On the off chance that there is a risk of a security
At to begin with, the unique fingerprint of an enlisted assault ASM model rectifies the progressions subsequent to
individual is gained and pre-handled. At that point, the taking unconstrained activities.
minutiae are picked from the crude picture and, put away as
pre-defined template. Also, in the fundamental stage, it
peruses the fingerprint from a flip side client, and identifies
minutiae information through an indistinguishable
procedure from the enrolment stage. At that point, it gauges
the closeness between the enrolled minutiae and the input
minutiae. When we get the template of fingerprint then
utilize this layout as a private key for that individual for
In figure 6, w is the linear parameter and t is the
threshold. The server approves the the identity of a user if
x < . The linear parameter is also our template vector.
Since we don't want to reveal the template vector and our
test sample x to the server we need to perform the
computation n of the perceptron function computation
in the enciphered domain. Doubly homomorphic
encryption scheme will be used to execute x which
includes multiplication and addition operations
Authentication is done through the use of client's
locked biometric test sample; the locked ID will be
transmitted to the server. The server will multiply the
locked ID with the locked classifier parameters then the
results will be randomized afterwards and be sent back to
the client. Another round of computation will take place
again, the client will decipher the randomized result and
will compute the sum of the products. The server will
derandomize the sum to obtain the final result, this result
will be the basis whether it pass the authentication or not.
Figure 5. Architecture of ASM

In the figure, SL signifies starting level for complete E. Security Server


security related to routing outbreaks and VL signifies the
vulnerability level assessed by the vulnerability evaluation A novel security arrangement to deal with trust and
outline from the measured metrics. validation in MANET proficiently and viably covering
III. METHODOLOGY diverse levels of operations was proposed. The solution is
basically portraying how to utilize accessible distinctive
This organized choices for trust models under specific settings
D. Blind Authentication of MANET. A trusted third party server for enrolment of
Blind authentication is a biometric verification client and server was included in the architecture. The
convention that does not uncover any data about the server has a duplicate of the public key and the classifier
biometric samples to the confirming server. It likewise does parameter of the client, it will be sent by the trusted party
not uncover any data with respect to the classifier, utilized during Enlistment phase. At the Enlistment, the client will
by the server, to the client or user. This protocol can solve transmit copies of her biometric to the trusted third party
the major disadvantage of using biometrics as server who acts as a classifier for the user. The prepared
authentication key which is the compromise of the users parameters are encoded and sent to the authentication
privacy due to revealing of identity through the biometric server, and a warning is sent back to the customer.
sample. A generic linear classifier was used for
authentication.

Figure 7. Trusted Enlistment Server

The Enlistment process was shown in the figure 7.


The biometric samples sent by the client to the Enlistment
server could be digitally marked by the client and
encrypted by utilizing the servers' public key to ensure it.
The utilization of a third party for enlistment additionally
takes into consideration long term learning by the
Enlistment server over countless Enlistments, in this way
Figure 6. Blind Authentication Process enhancing the nature of the trained classifier.
REFERENCES Information, Communication and Bio-Informatics
Darwish, S., Taylor, S. J., & Ghinea, G. (2012). Security (AEEICB16).
Server-Based Architecture for Mobile Ad hoc Pravinchandra, M. M., Jagdish, H. M., & Kotak, H. (2012).
Networks. 11th International Conference on Trust, Performace Analysis of Encryption and Decryption
Security and Privacy in Computing and using Genetic Based Cancelable Non-Invertible
Communications, 927-930. Fingerprint based Key in MANET. International
Helen, D., & Arivazhagan, D. (2014). Applications, Conference on Communication Systems and
Advantages and Challenges of Ad Hoc Networks. Network Technologies, 358-261.
Journal of Academia and Industrial Research Rani, A., Banda, L., & Pandit, A. K. (2013). Quantum
(JAIR), 453-457. Cryptography Based Biometric Encryption for
Mahboob, T., Fatima, S., & Atta, Z. (2016). Adaptive Network Security. International Conference on
Security for Multilevel Adhoc Networks A Machine Intelligence Research and Advancement,
Survey. 1st International Conference on 63-67.
Information Technology, Information Systems and Upmanyu, M., Namboodiri, A. M., Srinathan, K., &
Electrical Engineering (ICITISEE), 1-6. Jawahar, C. V. (2010). Blind Authentication: A
Panchal, G., & Samanta, D. (2016). Comparable Features Secure Crypto-Biometric Verification Protocol.
and Same Cryptography Key Generation using IEEE TRANSACTIONS ON INFORMATION
Biometric Fingerprint Image. International FORENSICS AND SECURITY, 255-268.
Conference on Advances in Electrical, Electronics,

Vous aimerez peut-être aussi