Journal of Computer Engineering & Information TechnologyISSN : 2324-9307

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Short Communication, Jceit Vol: 9 Issue: 4

Radio Fingerprinting Authentication Framework

Lakshmi Vasudha Yirrinki*

Department of Microbiology, Andhra University, Vishakhapatnam, India

*Corresponding Author: Lakshmi Vasudha Yirrinki
Department of Microbiology, Andhra University Vishakhapatnam, India
E-mail: lakshmivasudha20@gmail.com

Received: September 10, 2020 Accepted: September 21, 2020 Published: September 28, 2020

Citation: Yirrinki LV (2020) Radio Fingerprinting Authentication Framework .J Comput Eng Inf Technol 9:4 .DOI: 10.37532/jceit.2020.9(4).235

Abstract

An authentication framework system permits a system to certify a user with a particular one among a plurality of authentication processes. Every of the authentication processes encompasses a distinct sequence of steps and a novel input/output (I/O) interface for exchanging authentication info with the pc system. The invention includes associate authentication framework within the system. Associate computer programmer interface within the authentication framework provides associate interface to associate I/O element, like a graphical interface (GUI), of the pc system. A plurality of authentication modules interface with the framework. Every module encompasses a oral communication operate driver shaping a programmed sequence of steps to certify a user with a definite authentication method. A oral communication operate within the computer programmer interface, defines a programmed sequence of steps for dominant the I/O element in response to generic directions that have a similar format however totally different sequences for every of the authentication modules.

Keywords: Radio Fingerprinting; Framework; Biometric Techniques

Introduction

Patient watching outside the hospital surroundings is one case for net of Things (Iota) in tending. Whereas remote patient watching could improve tending, patient authentication may be a challenge during this state of affairs. Authentication mechanisms that need the user to gift credentials solely at first don’t verify the claimed identity of the patient when the initial authentication. We tend to propose a unique authentication framework supported biometric modalities and wireless device radio procedure. The framework is capable of supportive that the monitored information belongs to the right patient throughout the complete session, it additionally ensures the integrity and trust of the received information. We tend to analyses our framework in sight of some problems for the Iota in health like context and site awareness, resource constraints, and dynamicsurroundings.

Biometric techniques

Authentication may be a necessary demand in any system to make sure the provision of data to approved users solely. The authentication mechanisms area unit developed mistreatment passwords, secret keys, tokens, and biometric options. The verification is performed supported credentials like one thing we all know (password, passphrase, personal identification number), one thing we’ve (tokens, scientific discipline keys), one thing we tend to area unit (physiological and behavioral characteristics like fingerprints, face, iris, palm prints, voice, hand pure mathematics, DNA (DNA), diagnostic technique (ECG), keystroke dynamics, gait, and signature). Authentication systems could need use of 1 of those factors (knowledge, possession, associated inherence) once an entity presents proof for its identity. A typical answer to scale back the chance of associate entity presenting false proof is to use various factors together, yielding multi-factor authentication. Identity verification is taken into account a lot of stronger in comparison to Arcanum or token based mostly authentication as a result of the biometric characteristics of each human area unit unambiguously place able, non-transferable, and no reproducible. Multi-factor authentication is taken into account stronger than single issue authentication. Authentication mechanisms is divided into 2 categories: static and continuous authentication ways. Static authentication mechanisms certify the user at first however don’t monitor post authentication session to discover if it’s a similar user accessing the system. However, some systems will use periodic static authentication moreover for re-authentication mistreatment same static credentials. Continuous authentication ways monitor a system throughout the period of a session to discover if it’s a similar user accessing the system. Continuous authentication mechanisms area unit an understandable alternative for the rev state of affairs as a result of they need the potential to answer the elemental question of patient verification throughout the complete session of remote watching. We are able to additionally use over one biometric attribute or use static and continuous at the same time to verify the patient and increase the trust level on the receivedinformation.

Radio procedure technique

The radio procedure technique uses the hardware properties of the wireless devices and their signal characteristics for the aim of distinctive identification. The radio fingerprints area unit generated by analyzing the properties of radio wave and area unit determined by extracting device specific options that area unit caused by hardware impairments. The radio fingerprints area unit extracted by analyzing the received radio wave for specific properties like frequency, amplitude, and phase. Radio procedure is comprised of pre- processing, detection, feature extraction, and classification processes phases. The aim of radio procedure is to unambiguously determine the transmitter severally of any symbol within the information payload that may be solid simply. Radio procedure is accustomed determine cellular phones or alternative wireless devices, and to forestall fraud and mobile phone biological research .The productive identification of wireless devices will probably enable alternative applications like intrusion detection system and rhetorical information assortment to use radio procedure . Radio fingerprints enable U.S.A. to check associated distinguish totally different wireless devices with every other and is employed in an authentication mechanism equally to human identity verification. The radio procedure technique consists of incoming and verification operations. Radio procedure is employed in message authentication as a result of it helps against message replay attacks.

international publisher, scitechnol, subscription journals, subscription, international, publisher, science

Track Your Manuscript

Awards Nomination