Paper 2016/803
Biometric Based Network Security Using MIPS Cryptography Processor
Kirat Pal Singh
Abstract
—The empowerment in network on chip (NOC) and System on chip (SOC) in Microelectronics and Sensors have developed the various wireless communication Network technologies. In the past few years, many researchers have been focusing on building system architecture of network monitoring to improve the technical requirement specially designed for network security. Less research was found in providing the strong biometric based network security system to provide bulletproof security. The popular MIPS based cryptography processor is used for hardware and software products and standards require big cryptography keys length for higher security level. The major weakness of Normal cryptography system based on asymmetric algorithms need the storage of secret keys. Stored keys are often protected by poorly selected user passwords that can either be guessed or obtained through brute force attacks. Combining biometric with MIPS cryptography processor is as a possible solution. In this paper I propose a new approach to network security using MIPS based crypto processor based on contactless palm vein biometric system. This approach takes into account NOC constraints and its topology. It provides more security with less key length and there is no need to store any private key anywhere.
Note: International Journal of Exploration in Engineering and Technology (IJEET), Vol. 1, No. 2, ISSN:2394-7918, pp. 33-37
Metadata
- Available format(s)
- Publication info
- Published elsewhere. Minor revision. International Journal of Exploration in Engineering and Technology
- DOI
- 10.13140/RG.2.1.5014.7280
- Keywords
- BiometricNetwork SecurityCryptographMIPS ProcessorSystem on Chip
- Contact author(s)
- kirat_addiwal @ yahoo com
- History
- 2016-08-24: received
- Short URL
- https://ia.cr/2016/803
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2016/803, author = {Kirat Pal Singh}, title = {Biometric Based Network Security Using {MIPS} Cryptography Processor}, howpublished = {Cryptology {ePrint} Archive, Paper 2016/803}, year = {2016}, doi = {10.13140/RG.2.1.5014.7280}, url = {https://eprint.iacr.org/2016/803} }