Authentication Device

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 282 Experts worldwide ranked by ideXlab platform

Helen Tang - One of the best experts on this subject based on the ideXlab platform.

  • Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks
    IEEE Transactions on Vehicular Technology, 2011
    Co-Authors: Shengrong Bu, Richard F. Yu, Peter Mason, Helen Tang
    Abstract:

    Multimodal biometric technology provides potential solutions for continuous user-to-Device Authentication in high-security mobile ad hoc networks (MANETs). This paper studies distributed combined Authentication and intrusion detection with data fusion in such MANETs. Multimodal biometrics are deployed to work with intrusion detection systems (IDSs) to alleviate the shortcomings of unimodal biometric systems. Since each Device in the network has measurement and estimation limitations, more than one Device needs to be chosen, and observations can be fused to increase observation accuracy using Dempster-Shafer theory for data fusion. The system decides whether user Authentication (or IDS input) is required and which biosensors (or IDSs) should be chosen, depending on the security posture. The decisions are made in a fully distributed manner by each Authentication Device and IDS. Simulation results are presented to show the effectiveness of the proposed scheme.

  • Distributed combined Authentication and intrusion detection with data fusion in high security mobile ad-hoc networks
    2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 2010
    Co-Authors: Shengrong Bu, Richard F. Yu, Liu X. Peter, Helen Tang, Peter Mason
    Abstract:

    This paper studies distributed, combined Authentication and intrusion detection with data fusion in mobile ad-hoc networks (MANETs). Multimodal biometrics are deployed to work with intrusion detection systems (IDSs) to alleviate the shortcomings of unimodal biometric systems. Since each Device in the network has measurement and estimation errors, more than one Device needs to be chosen, and observations can be fused to increase observation accuracy using Dempster-Shafer theory for data fusion. The system decides whether or not user Authentication (or IDS input) is required, and which biosensors (or IDSs) should be chosen depending on the security posture. The decisions are made in a fully distributed manner by each Authentication Device and each IDS. Simulation results are presented to show the effectiveness of the proposed scheme.

Dan Boneh - One of the best experts on this subject based on the ideXlab platform.

  • HotMobile - Mobile token-based Authentication on a budget
    Proceedings of the 12th Workshop on Mobile Computing Systems and Applications - HotMobile '11, 2011
    Co-Authors: Hristo Bojinov, Dan Boneh
    Abstract:

    We propose a light-weight, cheap Authentication Device for unlocking a user's smartphone. The Device can be carried on a key chain and automatically unlocks the smartphone whenever its owner wants to use it. Our goal is to build a Device that works with existing smartphones, requires no recharging or maintenance, and is always available. We propose two approaches: one based on magnetic fields detected by the smartphone's compass and the other based on an acoustic transmitter that generates a signal picked up by the handset's microphone. We experiment with both approaches and report on their effectiveness. These Devices may find applications beyond smartphones, such as unlocking laptops, cars, and homes. These designs show that contactless Authentication can offer a convenient and secure alternative to PIN-based unlocking.

  • Mobile token-based Authentication on a budget
    Proceedings of the 12th Workshop on Mobile Computing Systems and Applications - HotMobile '11, 2011
    Co-Authors: Hristo Bojinov, Dan Boneh
    Abstract:

    We propose a light-weight, cheap Authentication Device for unlocking a user's smartphone. The Device can be carried on a key chain and automatically unlocks the smartphone whenever its owner wants to use it. Our goal is to build a Device that works with existing smartphones, requires no recharging or maintenance, and is always available. We propose two approaches: one based on magnetic fields detected by the smartphone's compass and the other based on an acoustic transmitter that generates a signal picked up by the handset's microphone. We experiment with both approaches and report on their effectiveness. These Devices may find applications beyond smartphones, such as unlocking laptops, cars, and homes. These designs show that contactless Authentication can offer a convenient and secure alternative to PIN-based unlocking.

Shengrong Bu - One of the best experts on this subject based on the ideXlab platform.

  • Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks
    IEEE Transactions on Vehicular Technology, 2011
    Co-Authors: Shengrong Bu, Richard F. Yu, Peter Mason, Helen Tang
    Abstract:

    Multimodal biometric technology provides potential solutions for continuous user-to-Device Authentication in high-security mobile ad hoc networks (MANETs). This paper studies distributed combined Authentication and intrusion detection with data fusion in such MANETs. Multimodal biometrics are deployed to work with intrusion detection systems (IDSs) to alleviate the shortcomings of unimodal biometric systems. Since each Device in the network has measurement and estimation limitations, more than one Device needs to be chosen, and observations can be fused to increase observation accuracy using Dempster-Shafer theory for data fusion. The system decides whether user Authentication (or IDS input) is required and which biosensors (or IDSs) should be chosen, depending on the security posture. The decisions are made in a fully distributed manner by each Authentication Device and IDS. Simulation results are presented to show the effectiveness of the proposed scheme.

  • Distributed combined Authentication and intrusion detection with data fusion in high security mobile ad-hoc networks
    2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 2010
    Co-Authors: Shengrong Bu, Richard F. Yu, Liu X. Peter, Helen Tang, Peter Mason
    Abstract:

    This paper studies distributed, combined Authentication and intrusion detection with data fusion in mobile ad-hoc networks (MANETs). Multimodal biometrics are deployed to work with intrusion detection systems (IDSs) to alleviate the shortcomings of unimodal biometric systems. Since each Device in the network has measurement and estimation errors, more than one Device needs to be chosen, and observations can be fused to increase observation accuracy using Dempster-Shafer theory for data fusion. The system decides whether or not user Authentication (or IDS input) is required, and which biosensors (or IDSs) should be chosen depending on the security posture. The decisions are made in a fully distributed manner by each Authentication Device and each IDS. Simulation results are presented to show the effectiveness of the proposed scheme.

K. Sasakawa - One of the best experts on this subject based on the ideXlab platform.

  • Fingerprint Authentication Device Based on Optical Characteristics Inside a Finger
    2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06), 2006
    Co-Authors: E. Sano, T. Maeda, T. Nakamura, M. Shikai, K. Sakata, M. Matsushita, K. Sasakawa
    Abstract:

    Fingerprint is the most popular modality that is widely used in various Authentication applications; PC logon, gate access control systems, and so on. The reason can be considered that fingerprint can achieve the best balance among Authentication performance, cost, size of Device, and ease of use. However, most of fingerprint Authentication Devices have some problems to be solved. One is that captured images are easily affected by the condition of finger surface and it can degrade Authentication performance. The other is that the problem of impersonation by artificial gummy fingers has been pointed out. To solve those problems, we developed a new fingerprint Authentication Device that has a novel sensing principle. This Device forms a image of fingerprint pattern based on optical characteristics of a finger’s interior by scattered transmission light. The images so obtained are unaffected by the condition of finger surface such as dry or moist fingers or operating environment, and enable stable Authentication processes. And it can differentiate between real fingers and fake gummy fingers made from gelatin or other material using optical characteristics. Because this Device utilizes the optical characteristics inside a finger, it has possibility to achieve higher Authentication performance by combining multiple characteristics of a finger’s interior as a modality. In this paper, we describe the sensing principle and process algorithm of this Device.

  • CVPR Workshops - Fingerprint Authentication Device Based on Optical Characteristics Inside a Finger
    2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06), 2006
    Co-Authors: E. Sano, T. Maeda, T. Nakamura, M. Shikai, K. Sakata, M. Matsushita, K. Sasakawa
    Abstract:

    Fingerprint is the most popular modality that is widely used in various Authentication applications; PC logon, gate access control systems, and so on. The reason can be considered that fingerprint can achieve the best balance among Authentication performance, cost, size of Device, and ease of use. However, most of fingerprint Authentication Devices have some problems to be solved. One is that captured images are easily affected by the condition of finger surface and it can degrade Authentication performance. The other is that the problem of impersonation by artificial gummy fingers has been pointed out. To solve those problems, we developed a new fingerprint Authentication Device that has a novel sensing principle. This Device forms a image of fingerprint pattern based on optical characteristics of a finger’s interior by scattered transmission light. The images so obtained are unaffected by the condition of finger surface such as dry or moist fingers or operating environment, and enable stable Authentication processes. And it can differentiate between real fingers and fake gummy fingers made from gelatin or other material using optical characteristics. Because this Device utilizes the optical characteristics inside a finger, it has possibility to achieve higher Authentication performance by combining multiple characteristics of a finger’s interior as a modality. In this paper, we describe the sensing principle and process algorithm of this Device.

Peter Mason - One of the best experts on this subject based on the ideXlab platform.

  • Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks
    IEEE Transactions on Vehicular Technology, 2011
    Co-Authors: Shengrong Bu, Richard F. Yu, Peter Mason, Helen Tang
    Abstract:

    Multimodal biometric technology provides potential solutions for continuous user-to-Device Authentication in high-security mobile ad hoc networks (MANETs). This paper studies distributed combined Authentication and intrusion detection with data fusion in such MANETs. Multimodal biometrics are deployed to work with intrusion detection systems (IDSs) to alleviate the shortcomings of unimodal biometric systems. Since each Device in the network has measurement and estimation limitations, more than one Device needs to be chosen, and observations can be fused to increase observation accuracy using Dempster-Shafer theory for data fusion. The system decides whether user Authentication (or IDS input) is required and which biosensors (or IDSs) should be chosen, depending on the security posture. The decisions are made in a fully distributed manner by each Authentication Device and IDS. Simulation results are presented to show the effectiveness of the proposed scheme.

  • Distributed combined Authentication and intrusion detection with data fusion in high security mobile ad-hoc networks
    2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 2010
    Co-Authors: Shengrong Bu, Richard F. Yu, Liu X. Peter, Helen Tang, Peter Mason
    Abstract:

    This paper studies distributed, combined Authentication and intrusion detection with data fusion in mobile ad-hoc networks (MANETs). Multimodal biometrics are deployed to work with intrusion detection systems (IDSs) to alleviate the shortcomings of unimodal biometric systems. Since each Device in the network has measurement and estimation errors, more than one Device needs to be chosen, and observations can be fused to increase observation accuracy using Dempster-Shafer theory for data fusion. The system decides whether or not user Authentication (or IDS input) is required, and which biosensors (or IDSs) should be chosen depending on the security posture. The decisions are made in a fully distributed manner by each Authentication Device and each IDS. Simulation results are presented to show the effectiveness of the proposed scheme.