Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Manisha Mehta et al, Int. J. Comp. Tech. Appl., Vol 2 (6), 3019-3022
Abstract
Mission critical applications uses mobile ad hoc
network. Security is required to protect this data while
transmitting in network. Biometric characteristic such
as face, fingerprint, voice, iris, and retina can be
potential alternative to generate a cryptographic key
and enhance the security. In this paper non-invertible
key generation using cancelable fingerprint is
discussed. From the receivers fingerprint minutiae are
generated. Applying one way transformation
cancelable template is generated and stored into
vectors. After shuffling vector data, a genetic operator
two point crossover is applied and 256 bit key is
generated for the encryption AES-256 algorithm.
Authentication is done by watermarked face of the
sender. The proposed model is analysed against
security attributes authentication, confidentiality,
integrity. It is also analyse for brute force attack. It is
found that it survive against all attack.
2. Proposed Model
This paper proposed cryptographic key generation
from the cancelable fingerprint. Firstly, minutiae are
extracted from the fingerprint and then apply the one
way transform function to obtain transformed point. In
next point this transformed minutia are used to generate
the cryptographic key. To randomize the key two point
crossover genetic operator is applied. The main purpose
of the proposed system is to enhance the data security
in MANET.
3019
ISSN:2229-6093
Manisha Mehta et al, Int. J. Comp. Tech. Appl., Vol 2 (6), 3019-3022
3020
ISSN:2229-6093
Manisha Mehta et al, Int. J. Comp. Tech. Appl., Vol 2 (6), 3019-3022
.. Pxn
The main title (on the first page) should begin 1-3/8
inches (3.49 cm) from the top edge of the page,
centered, and in Times 14-point, boldface type.
Capitalize the first letter of nouns, pronouns, verbs,
adjectives, and adverbs; do not capitalize articles,
coordinate conjunctions, or prepositions (unless the
title begins with such a word). Leave two 12-point
blank lines after the title.
Rand() mod (|PDE|- k ) ; where k=0,2,4,6 | PDE|.
3021
ISSN:2229-6093
Manisha Mehta et al, Int. J. Comp. Tech. Appl., Vol 2 (6), 3019-3022
3. SECURITY ANALYSIS
Following network security attributes are analysed.
Confidentiality: In proposed model we have used one
way transformed function to get the cancelable version
of fingerprint minutiae. If attacker wants to read the
original message, he needs a key. The key can be
generated from the fingerprint of the receiver. So it is
computationally infeasible to generate the key and
confidentiality is maintained.
Authentication: In proposed model, group users of ad
hoc network can authenticate each other using
watermarked face biometric. After decrypting message,
receiver can extract to verify the authenticity of
legitimate sender after retrieving watermark from the
face.
Integrity: In proposed mode, the original message is
not recovered if it is tempered. By the property of one
way transform it is computationally infeasible to
modify the cipher text by the attacker.
Man-in-the-Middle Attack: In our proposed system,
original message is secured using genetic two point
crossover, so attacker cannot view the original message
from the available cipher text.
6. Acknowledgement
I am highly obliged to my guide Prof. Hiteishi Diwanji
for her invaluable guidance. I am also thankful to my
head of the department Dr. Jagdish S. Shah who gave
me opportunity to work under him. I am also thankful
to Prof. S. S. Pathan.idance. Lastly I am thankful to my
class mates who always stood by me.
7. References
[1] S. Pankanti, S. Prabhakar, A.K. Jain, On the individuality
of fingerprints, IEEE Trans. Pattern Analysis and Machine
Intelligence, Vol. 24, No. 8, pp.10101025, 2002.Bowman,
M., Debray, S. K., and Peterson, L. L. 1993. Reasoning about
naming systems.
[2] N. Lalithamani and K.P. Soman, An Efficient Approach
For Non-Invertible Cryptographic Key Generation From
Cancelable Fingerprint Biometrics. International conference
on Advances in Recent Technologies in communication and
Computing, 2009. 978-0-7695-3845-7/09 2009 IEEE
Pg.47-52
[3] http://en.wikipedia.org/wiki/One-way_function
[4]
RSA
Factoring
Challenge
from
http://en.wikipedia.org/wiki/RSA_Factoring_Challenge
[5]Neeraj Kumar, Investigations in Brute Force Attack on
Cellular Security Based on Des and Aes, IJCEM International
Journal of Computational Engineering & Management, Vol.
14, October 2011.
4. Result Analysis
The proposed system is implemented using mat lab.
The minutia points are generated and transformed into
the cancelable version. Then cryptography key is
generated from the cancelable version. The time
3022