SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Downloaden Sie, um offline zu lesen
A BIOMETRIC-BASED SECURITY FOR DATA
AUTHENTICATION IN WIRELESS BODY AREA
NETWORK(WBAN)
By
Shreyas S. Tote
Under the guidance
Prof. J.H.Saturwar
Department Of Computer Science and Engineering
Jawaharlal Darda Institute of Engineering & Technology,
Yavatmal, (M.S), India-445001
Session 2014-2015
CONTENTS
 What is Biometric Security?
 What is WBAN?
 Security Issues In WBAN
 Why Biometric based Security Approach for
Data authentication
 Applications of WBAN
 Advantages and Disadvantages of Biometrics
 Conclusion
WHAT IS BIOMETRIC SECURITY?
 It is a security mechanism used to
authenticate.
 Based on Human Characteristic.
 Often used Critical Environment.
BIOMETRIC DEVICES
WHAT IS WBAN?
 Smart biomedical sensor platform
 Analyze the measured signals and
transmit them to user interface
wirelessly.
 Consist of a set of a mobile and small size
intercommunicating sensors.
 Limited Resources
Working of WBAN
SECURITY ISSUES IN WBAN
 Security Problems in WBAN
 Less Extent on Evolving Network Protocol
 Cryptography Techniques are used in WBAN
 Problems in Cryptographic Technique
 Complex and Difficult to use
WHY BIOMETRIC BASED SECURITY
APPROACH FOR DATA AUTHENTICATION
 Universal
 Distinctive
 Permanent
 Collectable
 Effective
 Invulnerable
 Acceptable
HEART RATE VARIABILITY(HRV)
 Unique Characteristics
 Time interval between heart varies
 Autonomic Nervous System comprise two basic
component
*Sympathetic
*Parasympathetic
WHY ELETROCARDIOGRAM(ECG)
PREFERRED
 Universality
 Uniqueness
 Robustness
 Liveness detection
R-PEAK DETECTION
Schematic representation of normal ECG
R-PEAK DETECTION
Fig. Before and After Preprocessing of NOISY ECG signal
R-peak
Detection
HRV
calculation
Binary
Conversion
Sender Receiver
Authentication
Sender Protocol
Fig:- Biometric Feature Used to Calculate MAC
Preprocessing
Message MAC
Likelihood
algorithm
Estimation
Hash
Function
Schematic representation of normal ECG
Biometric Feature
(from medical
database)
Authentication(Yes/No)
Biometric Feature
Fig-Proposed biometric based security for data authentication
|
|
|_ _ _ _ _ _ _ _ _ _ _ _ _ _ __ _ _ _ __ _ _ _ _ __
Original message
APPLICATIONS OF BIOMETRICS
 Biometric Time and Attendance
 Biometric Safe and Locks
 Securing Access To PC‟s
 High End Security
 Identifying Criminals
APPLICATION’S OF WBAN
ADVANTAGES & DISADVANTAGES OF
BIOMETRICS
ADVANTAGES
 Error
 Mistakes
 Fraud,
 Forgery
DISADVANTAGES
 limited by many situations
 Affordability
CONCLUSION
 Secure communications in BANs are strongly
required to preserves a person‟s health, privacy and
safety.
 Senders electrocardiogram feature is selected as the
biometric key for data authentication mechanism.
 The security system implemented with low computational
complexity and high power efficiency instead of
cryptographic key distribution.
REFERENCES
[1]P.Abina, K.Dhivyakala, L.Suganya, S.Mary Praveena
“Biometric Authentication System for Body Area Network Vol.
3, Issue 3, International Journal of Advanced Research in
Electrical, Electronics and Instrumentation Engineering,
Coimbatore, India March 2014
[2] Sofia Najwa Ramlil, Rabiah Ahmad, Mohd Faizal Abdollah,
Eryk Dutkiewicz4 “A Biometric-based Security for Data
Authentication in Wireless Body Area NetworK(WBAN),ICACT
January 27 ,2013
[3]Systems and Network Analysis Center Information Assurance
Directorate by National Security Agency,United states of
America,2013
[5] L. Eschenauer and V. D. Gligor, „A Key Management
Scheme forDistributed Sensor Networks‟, Version: pp.
41–47, November 18–22, 2002
[4] Lin Yao, Bing Liu, GuoweiWu, Kai Yao and
JiaWang1,” A Biometric Key Establishment Protocol for
Body Area Networks”, IJDSN, vol 2011
Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)

Weitere ähnliche Inhalte

Was ist angesagt?

Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
subhradeep mitra
 

Was ist angesagt? (20)

WSN IN BODY AREA NETWORK BASED ON EGERGY CONSERVATION
WSN IN BODY AREA NETWORK BASED ON EGERGY CONSERVATIONWSN IN BODY AREA NETWORK BASED ON EGERGY CONSERVATION
WSN IN BODY AREA NETWORK BASED ON EGERGY CONSERVATION
 
wireless body area networks(WBAN)
wireless body area networks(WBAN)wireless body area networks(WBAN)
wireless body area networks(WBAN)
 
Wireless body area network
Wireless body area networkWireless body area network
Wireless body area network
 
WIRELESS BODY AREA NETWORK
WIRELESS BODY AREA NETWORKWIRELESS BODY AREA NETWORK
WIRELESS BODY AREA NETWORK
 
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN)
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN) ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN)
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN)
 
Body Area Networks (BANs) - PPT (By Study PPT)
Body Area Networks (BANs) - PPT (By Study PPT)Body Area Networks (BANs) - PPT (By Study PPT)
Body Area Networks (BANs) - PPT (By Study PPT)
 
Wireless body area network
Wireless body area networkWireless body area network
Wireless body area network
 
Body Area Network Presentation
Body Area Network PresentationBody Area Network Presentation
Body Area Network Presentation
 
Seminar on Body Area Networks
Seminar on Body Area NetworksSeminar on Body Area Networks
Seminar on Body Area Networks
 
Wireless Body Area Networks
Wireless Body Area Networks Wireless Body Area Networks
Wireless Body Area Networks
 
Wban, kavya
Wban,    kavyaWban,    kavya
Wban, kavya
 
WBAN
WBANWBAN
WBAN
 
Wireless Body Area Network (WBAN) by Rayhan Khoka
Wireless Body Area Network (WBAN) by Rayhan KhokaWireless Body Area Network (WBAN) by Rayhan Khoka
Wireless Body Area Network (WBAN) by Rayhan Khoka
 
Wireless Body Area Network
Wireless Body Area NetworkWireless Body Area Network
Wireless Body Area Network
 
Wireless Body Area Network (WBAN)
Wireless Body Area Network (WBAN)Wireless Body Area Network (WBAN)
Wireless Body Area Network (WBAN)
 
A SURVEY ON WIRELESS BODY AREA NETWORK
A SURVEY ON WIRELESS BODY AREA NETWORKA SURVEY ON WIRELESS BODY AREA NETWORK
A SURVEY ON WIRELESS BODY AREA NETWORK
 
A review of security protocols in m health wireless body area networks (wban)...
A review of security protocols in m health wireless body area networks (wban)...A review of security protocols in m health wireless body area networks (wban)...
A review of security protocols in m health wireless body area networks (wban)...
 
Cloud based wireless Body Area Network for Health management
Cloud based wireless Body Area Network for Health management Cloud based wireless Body Area Network for Health management
Cloud based wireless Body Area Network for Health management
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
 
Wireless Body Sensor Networks
Wireless Body Sensor Networks Wireless Body Sensor Networks
Wireless Body Sensor Networks
 

Andere mochten auch

Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
anoop80686
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
Santosh Kumar
 

Andere mochten auch (16)

Seminar
SeminarSeminar
Seminar
 
becan
becanbecan
becan
 
Student biometric identification srs
Student biometric identification srsStudent biometric identification srs
Student biometric identification srs
 
DFD
DFDDFD
DFD
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
Pendrive to pendrive data transfer without pc
Pendrive to pendrive data transfer without pcPendrive to pendrive data transfer without pc
Pendrive to pendrive data transfer without pc
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
Software Requirement Specification For Smart Internet Cafe
Software Requirement Specification For Smart Internet CafeSoftware Requirement Specification For Smart Internet Cafe
Software Requirement Specification For Smart Internet Cafe
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Biometrics
BiometricsBiometrics
Biometrics
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 

Ähnlich wie Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)

DEBJIT Doira ......... ..................
DEBJIT Doira ......... ..................DEBJIT Doira ......... ..................
DEBJIT Doira ......... ..................
ARKARAJSAHA1
 
HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...
HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...
HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...
IJCNCJournal
 
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
Editor IJCATR
 
Tutorial on Wireless Security in Medical Devices
Tutorial on Wireless Security in Medical DevicesTutorial on Wireless Security in Medical Devices
Tutorial on Wireless Security in Medical Devices
gvrangaraj
 

Ähnlich wie Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN) (20)

Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia Network
 
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
IRJET-  	  Secured Mind Uploading Method in Wireless Body Area NetworkIRJET-  	  Secured Mind Uploading Method in Wireless Body Area Network
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
 
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKSECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORK
 
(2006) Wireless and Biometrics
(2006) Wireless and Biometrics(2006) Wireless and Biometrics
(2006) Wireless and Biometrics
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
 
A lightweight and secure multilayer authentication scheme for wireless body a...
A lightweight and secure multilayer authentication scheme for wireless body a...A lightweight and secure multilayer authentication scheme for wireless body a...
A lightweight and secure multilayer authentication scheme for wireless body a...
 
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSA SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKS
 
DEBJIT Doira ......... ..................
DEBJIT Doira ......... ..................DEBJIT Doira ......... ..................
DEBJIT Doira ......... ..................
 
A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol
 
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
 
d6 major project.pptx
d6 major project.pptxd6 major project.pptx
d6 major project.pptx
 
Veena kakati
Veena kakatiVeena kakati
Veena kakati
 
Integrated Framework for Secure and Energy Efficient Communication System in ...
Integrated Framework for Secure and Energy Efficient Communication System in ...Integrated Framework for Secure and Energy Efficient Communication System in ...
Integrated Framework for Secure and Energy Efficient Communication System in ...
 
HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...
HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...
HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...
 
Kr3618261830
Kr3618261830Kr3618261830
Kr3618261830
 
Tutorial on Wirless Security in Medical Devices
Tutorial on Wirless Security in Medical DevicesTutorial on Wirless Security in Medical Devices
Tutorial on Wirless Security in Medical Devices
 
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
 
Tutorial Dr G V Rangaraj Wireless Security in Medical Devices
Tutorial Dr G V Rangaraj Wireless Security in Medical DevicesTutorial Dr G V Rangaraj Wireless Security in Medical Devices
Tutorial Dr G V Rangaraj Wireless Security in Medical Devices
 
Tutorial on Wireless Security in Medical Devices
Tutorial on Wireless Security in Medical DevicesTutorial on Wireless Security in Medical Devices
Tutorial on Wireless Security in Medical Devices
 
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Biometric-based Security for Data Authentication in Wireless Body Area Network(WBAN)

  • 1. A BIOMETRIC-BASED SECURITY FOR DATA AUTHENTICATION IN WIRELESS BODY AREA NETWORK(WBAN) By Shreyas S. Tote Under the guidance Prof. J.H.Saturwar Department Of Computer Science and Engineering Jawaharlal Darda Institute of Engineering & Technology, Yavatmal, (M.S), India-445001 Session 2014-2015
  • 2. CONTENTS  What is Biometric Security?  What is WBAN?  Security Issues In WBAN  Why Biometric based Security Approach for Data authentication  Applications of WBAN  Advantages and Disadvantages of Biometrics  Conclusion
  • 3. WHAT IS BIOMETRIC SECURITY?  It is a security mechanism used to authenticate.  Based on Human Characteristic.  Often used Critical Environment.
  • 4.
  • 6. WHAT IS WBAN?  Smart biomedical sensor platform  Analyze the measured signals and transmit them to user interface wirelessly.  Consist of a set of a mobile and small size intercommunicating sensors.  Limited Resources
  • 8. SECURITY ISSUES IN WBAN  Security Problems in WBAN  Less Extent on Evolving Network Protocol  Cryptography Techniques are used in WBAN  Problems in Cryptographic Technique  Complex and Difficult to use
  • 9. WHY BIOMETRIC BASED SECURITY APPROACH FOR DATA AUTHENTICATION  Universal  Distinctive  Permanent  Collectable  Effective  Invulnerable  Acceptable
  • 10. HEART RATE VARIABILITY(HRV)  Unique Characteristics  Time interval between heart varies  Autonomic Nervous System comprise two basic component *Sympathetic *Parasympathetic
  • 11. WHY ELETROCARDIOGRAM(ECG) PREFERRED  Universality  Uniqueness  Robustness  Liveness detection
  • 13. R-PEAK DETECTION Fig. Before and After Preprocessing of NOISY ECG signal
  • 15. Preprocessing Message MAC Likelihood algorithm Estimation Hash Function Schematic representation of normal ECG Biometric Feature (from medical database) Authentication(Yes/No) Biometric Feature Fig-Proposed biometric based security for data authentication | | |_ _ _ _ _ _ _ _ _ _ _ _ _ _ __ _ _ _ __ _ _ _ _ __ Original message
  • 16. APPLICATIONS OF BIOMETRICS  Biometric Time and Attendance  Biometric Safe and Locks  Securing Access To PC‟s  High End Security  Identifying Criminals
  • 18. ADVANTAGES & DISADVANTAGES OF BIOMETRICS ADVANTAGES  Error  Mistakes  Fraud,  Forgery DISADVANTAGES  limited by many situations  Affordability
  • 19. CONCLUSION  Secure communications in BANs are strongly required to preserves a person‟s health, privacy and safety.  Senders electrocardiogram feature is selected as the biometric key for data authentication mechanism.  The security system implemented with low computational complexity and high power efficiency instead of cryptographic key distribution.
  • 20. REFERENCES [1]P.Abina, K.Dhivyakala, L.Suganya, S.Mary Praveena “Biometric Authentication System for Body Area Network Vol. 3, Issue 3, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Coimbatore, India March 2014 [2] Sofia Najwa Ramlil, Rabiah Ahmad, Mohd Faizal Abdollah, Eryk Dutkiewicz4 “A Biometric-based Security for Data Authentication in Wireless Body Area NetworK(WBAN),ICACT January 27 ,2013 [3]Systems and Network Analysis Center Information Assurance Directorate by National Security Agency,United states of America,2013
  • 21. [5] L. Eschenauer and V. D. Gligor, „A Key Management Scheme forDistributed Sensor Networks‟, Version: pp. 41–47, November 18–22, 2002 [4] Lin Yao, Bing Liu, GuoweiWu, Kai Yao and JiaWang1,” A Biometric Key Establishment Protocol for Body Area Networks”, IJDSN, vol 2011