Paper 2016/803

Biometric Based Network Security Using MIPS Cryptography Processor

Kirat Pal Singh

Abstract

—The empowerment in network on chip (NOC) and System on chip (SOC) in Microelectronics and Sensors have developed the various wireless communication Network technologies. In the past few years, many researchers have been focusing on building system architecture of network monitoring to improve the technical requirement specially designed for network security. Less research was found in providing the strong biometric based network security system to provide bulletproof security. The popular MIPS based cryptography processor is used for hardware and software products and standards require big cryptography keys length for higher security level. The major weakness of Normal cryptography system based on asymmetric algorithms need the storage of secret keys. Stored keys are often protected by poorly selected user passwords that can either be guessed or obtained through brute force attacks. Combining biometric with MIPS cryptography processor is as a possible solution. In this paper I propose a new approach to network security using MIPS based crypto processor based on contactless palm vein biometric system. This approach takes into account NOC constraints and its topology. It provides more security with less key length and there is no need to store any private key anywhere.

Note: International Journal of Exploration in Engineering and Technology (IJEET), Vol. 1, No. 2, ISSN:2394-7918, pp. 33-37

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Minor revision. International Journal of Exploration in Engineering and Technology
DOI
10.13140/RG.2.1.5014.7280
Keywords
BiometricNetwork SecurityCryptographMIPS ProcessorSystem on Chip
Contact author(s)
kirat_addiwal @ yahoo com
History
2016-08-24: received
Short URL
https://ia.cr/2016/803
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/803,
      author = {Kirat Pal Singh},
      title = {Biometric Based Network Security Using {MIPS} Cryptography Processor},
      howpublished = {Cryptology {ePrint} Archive, Paper 2016/803},
      year = {2016},
      doi = {10.13140/RG.2.1.5014.7280},
      url = {https://eprint.iacr.org/2016/803}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.