iiCardiac rhythm — Biometrie based secure authentication for IEEE 802.15.6

Today's network is switching towards the world of ubiquitous computing. Since the technology follows you at your finger tip and practical orientation of these ubiquitous services needs three main criteria. Firstly, WAN for internet cloud; secondly, remote servers using LAN and WLAN and finally with personal area ubiquitous network called HAN (IEEE 802.15.6). Since the data transmission is ease due to the higher level security in OSI layer as well as in physical. According to the concern of data transmission, secured layer is its perfect fit of focus. According to the focus of the technology; Data rates, inbound and outbound requests are not defined periodically; hence there may be chance of data theft during data transmission. Hence a secured authentication mechanism with a unique solution for authorization and identity verification is desirable. Hence in this paper, we proposed a new methodology to recognize the identity of two HAN enabled devices. The main key idea is to effectively utilize NYMI, an authentic hardware solution to provide the biométrie security. The extensible idea is to fix the cardiac rhythm as password entity. The system verifies each sign of the cardiac rhythm for authentication during data transmission. The clear view of the research is described in the experimental setup and the result shows the efficacy of the algorithm.

[1]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[2]  Dimitrios Hatzinakos,et al.  Analysis of Human Electrocardiogram for Biometric Recognition , 2008, EURASIP J. Adv. Signal Process..

[3]  Zygmunt J. Haas,et al.  The zone routing protocol (zrp) for ad hoc networks" intemet draft , 2002 .

[4]  Dimitrios Hatzinakos,et al.  ECG biometric analysis in cardiac irregularity conditions , 2009, Signal Image Video Process..

[5]  Imrich Chlamtac,et al.  A distance routing effect algorithm for mobility (DREAM) , 1998, MobiCom '98.

[6]  L. Biel,et al.  ECG analysis: a new approach in human identification , 1999, IMTC/99. Proceedings of the 16th IEEE Instrumentation and Measurement Technology Conference (Cat. No.99CH36309).

[7]  Koen Langendoen,et al.  An adaptive energy-efficient MAC protocol for wireless sensor networks , 2003, SenSys '03.

[8]  Joseph Y. Halpern,et al.  Gossip-based ad hoc routing , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[9]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[10]  Nitin H. Vaidya,et al.  Location-aided routing (LAR) in mobile ad hoc networks , 1998, MobiCom '98.

[11]  Clemens Elster,et al.  Verification of humans using the electrocardiogram , 2007, Pattern Recognit. Lett..