Biometric Authentication in Broadband Networks for Location-Based Services

Author(s):  
George Kakaletris ◽  
Dimitris Varoutas ◽  
Dimitris Katsianis ◽  
Thomas Sphicopoulos

Broadband communication networks have begun to spread rapidly over fixed networks, with wireless networks following at close distance. The excess capacity allows the offering of broadband services at competitive rates. Location-based services (LBS) over wireless broadband networks are becoming mainstream in an emerging ambient intelligence society. For LBS over broadband and, in particular, pier-to-pier networks, such as ad hoc networks, unambiguous user authentication is of paramount importance to user trust and safety, thus ultimately to the success of such service. Biometric authentication is an approach to providing irrefutable identity verification of a user, thus providing the highest level of security. This chapter addresses some of the issues associated with the use of biometric ID for user and apparatus authentication over broadband wireless networks (e.g., GPRS, UMTS, WiFi, LANs) and narrow band local networks (e.g., bluetooth, Zigbee, PANs, BANs).

2013 ◽  
pp. 726-735
Author(s):  
Stelios C.A. Thomopoulos ◽  
Nikolaos Argyreas

Broadband communication networks have begun to spread rapidly over fixed networks, with wireless networks following at close distance. The excess capacity allows the offering of broadband services at competitive rates. Location-based services (LBS) over wireless broadband networks are becoming mainstream in an emerging ambient intelligence society. For LBS over broadband and, in particular, peer-to-peer networks, such as ad hoc networks, unambiguous user authentication is of paramount importance to user trust and safety, thus ultimately to the success of such service. Biometric authentication is an approach to providing irrefutable identity verification of a user, thus providing the highest level of security. This chapter addresses some of the issues associated with the use of biometric ID for user and apparatus authentication over broadband wireless networks (e.g., GPRS, UMTS, WiFi, LANs) and narrow band local networks (e.g., bluetooth, Zigbee, PANs, BANs).


Author(s):  
Stelios C.A. Thompoulos ◽  
Nikolaos Argyreas

Broadband communication networks have begun to spread rapidly over fixed networks, with wireless networks following at close distance. The excess capacity allows the offering of broadband services at competitive rates. Location based services (LBS) over wireless broadband networks are becoming mainstream in an emerging ambient intelligence society. For LBS over broadband and, in particular, pier-to-pier networks, such as ad-hoc networks, unambiguous user authentication is of paramount importance to user trust and safety, thus ultimately to the success of such service. Biometric authentication is an approach to providing irrefutable identity verification of a user, thus providing the highest level of security. This chapter addresses some of the issues associated with the use of biometric ID for user and apparatus authentication over broadband wireless networks (e.g. GPRS, UMTS, WiFi, LANs) and narrow band local networks (e.g. BlueTooth, Zigbee, PANs, BANs).


2011 ◽  
pp. 4110-4120
Author(s):  
Stelios C.A. Thompoulos ◽  
Nikolaos Argyreas

Broadband communication networks have begun to spread rapidly over fixed networks, with wireless networks following at close distance. The excess capacity allows the offering of broadband services at competitive rates. Location based services (LBS) over wireless broadband networks are becoming mainstream in an emerging ambient intelligence society. For LBS over broadband and, in particular, pier-to-pier networks, such as ad-hoc networks, unambiguous user authentication is of paramount importance to user trust and safety, thus ultimately to the success of such service. Biometric authentication is an approach to providing irrefutable identity verification of a user, thus providing the highest level of security. This chapter addresses some of the issues associated with the use of biometric ID for user and apparatus authentication over broadband wireless networks (e.g. GPRS, UMTS, WiFi, LANs) and narrow band local networks (e.g. BlueTooth, Zigbee, PANs, BANs).


2013 ◽  
Vol 3 (1) ◽  
pp. 20 ◽  
Author(s):  
Dalia Elewely ◽  
Marwa Areed ◽  
Hesham Ali

Ad-hoc networks consist of a set of mobile nodes with a restricted power supply resources that can communicate with each other without any established infrastructure or centralized administration. The loss of some nodes may cause significant topological changes, undermine the network operation, and affect the lifetime of the network. This paper discusses the energy consumption problem and summaries the existing power saving techniques in ad-hoc wireless networks. The main objective of this paper is to introduce a new power aware multi-path node disjoint routing scheme based on the Dynamic Source Routing protocol (DSR), which can prolong MANETs lifetime, reduce routing delay and increase the reliability of the packets reaching its destination. Therefore, a comprehensive study of DSR protocol has been drawn using NS-2 simulator, to evaluate the performance of DSR as a routing strategy and investigate its efficiency in saving wireless networks resources, as a prelude to avoid its performance shortcomings in our proposed routing scheme. Keywords: Power aware protocol, node disjoint, network simulation 2, multipath routing, Dsr protocol, ad-hoc network.


2020 ◽  
Author(s):  
Indushree Banerjee ◽  
Martijn Warnier ◽  
Frances M. T Brazier

Abstract When physical communication network infrastructures fail, infrastructure-less communication networks such as mobile ad-hoc networks (MANET), can provide an alternative. This, however, requires MANETs to be adaptable to dynamic contexts characterized by the changing density and mobility of devices and availability of energy sources. To address this challenge, this paper proposes a decentralized context-adaptive topology control protocol. The protocol consists of three algorithms and uses preferential attachment based on the energy availability of devices to form a loop-free scale-free adaptive topology for an ad-hoc communication network. The proposed protocol has a number of advantages. First, it is adaptive to the environment, hence applicable in scenarios where the number of participating mobile devices and their availability of energy resources is always changing. Second, it is energy-efficient through changes in the topology. This means it can be flexibly be combined with different routing protocols. Third, the protocol requires no changes on the hardware level. This means it can be implemented on all current phones, without any recalls or investments in hardware changes. The evaluation of the protocol in a simulated environment confirms the feasibility of creating and maintaining a self-adaptive ad-hoc communication network, consisting of multitudes of mobile devices for reliable communication in a dynamic context.


Author(s):  
Tamaghna Acharya ◽  
Santi P. Maity

The acute scarcity of radio frequency spectrum has inspired to think of a new communication technology where the devices are expected to be able to sense and adapt to their spectral environment, thereby appearing as cognitive radios (CR) who can share opportunistically the bands assigned to primary users (PUs). At the same time, low cost, increased coverage, enhanced capacity, infrastructure-less configuration, and so forth, become the essence of future wireless networks. Although the two research fields came up independently, in due time it is observed that CR has a promising future and has excellent applications in wireless networks. To this aim, this chapter explores some scope of integration in CR and ad hoc networks (called here CRAHNETs) in some specific design perspective. First, a brief literature review on CR power allocation and energy aware routing in wireless ad hoc networks (WANETs) is done that highlights the importance for the scope of their integration. Then, power allocation in CRAHNETs with extended network lifetime is considered as an example problem. More specifically, the design problem is: given a set of paths (routes) between a pair of source (S) and destination (D) nodes in CRAHNETs, how to allocate optimal power to the source and relay nodes such that outage probability for data transmission is minimized and network lifetime is enhanced, while meeting the limits of total transmit power of CRs and interference threshold to PU simultaneously. A solution for the stated problem is proposed along with performance evaluation. A few related research problems are mentioned as future research directions.


Author(s):  
Piyush Kumar Shukla ◽  
Kirti Raj Bhatele

Wireless Networks are vulnerable in nature, mainly due to the behavior of node communicating through it. As a result, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operation. In this chapter, we analyze the security problems in MANET. On the prevention side, various key and trust management schemes have been developed to prevent external attacks from outsiders. Both prevention and detection method will work together to address the security concern in MANET.


Author(s):  
Arundhati Arjaria

Mobile ad hoc networks are infrastructure-less wireless networks; all nodes can quickly share information without using any fixed infrastructure like base station or access point. Wireless ad hoc networks are characterized by frequent topology changes, unreliable wireless channel, network congestion, and resource contention. Multimedia applications usually are bandwidth hungry with stringent delay, jitter, and loss requirements. Designing ad hoc networks which support multimedia applications, hence, is considered a hard task. The hidden and exposed terminal problems are the main which consequently reduces the network capacity. Hidden and exposed nodes reduce the performance of the wireless ad hoc networks. Access delay is the major parameter that is to be taken under consideration. Due to hidden and exposed terminal problems, the network suffers from a serious unfairness problem.


Author(s):  
Ramprasad Subramanian ◽  
Farhana Afroz ◽  
Kumbesan Sandrasegaran ◽  
Xiaoying Kong

This chapter forays into the literature of emerging field of Self-Organization Network (SON) and its application in the area of location-based services. SON is a widely applied technology in the ad hoc networks, wireless sensor networks and automatic computer networks. This chapter deal exclusively about the projects, standards and literature of SON in the context of the cellular networks and how it can aid to achieve higher position accuracy information of the subscriber. Additionally, in this chapter a clear understanding of SON taxonomy and the guidelines for the design of SON has been presented and a comparison of SON with the existing solutions about its strength and weakness has been made in this chapter. The key research areas for further development is also highlighted in this chapter. This literature will provide comprehensive guidance for anyone interested to delve into the research of SON in cellular wireless communication and location based services.


Sign in / Sign up

Export Citation Format

Share Document