Abstract
The authentication of the Wireless Body Area Networks (WBANs) nodes is a vital factor in its medical applications. This paper, investigates methods of authentication over these networks. Also, an effective unimodal and multimodal biometrics identification approaches based on individual face and voice recognition or combined using different fusion types are presented. The cryptography and non-cryptography-based authentication are discussed in this research work and its suitability with the medical applications. Cryptographic based authentication is not suitable for WBANs. The biometrics authentication is discussed and its challenges. In this work, different fusion types in multimodal biometric are presented. There are two unimodal schemes have been presented based on using the voice and face image individually, these two biometrics have been used in the multimodal biometric scheme. The presneted multimodal scheme is evaluated and applied using the feature and score fusion. The mechanism operation of presented algorithm starts with capturing the biometics signals ‘Face/Voice’, the second step is the feature extracting from each biometric individually. The Artificial Neural Network (ANN), The Support Vector Machine (SVM) and the Gaussian Mixture Model (GMM) classifiers have been employed to perform the classification process individually. The computer simulation experiments reveal that the cepstral coefficients and statistical coefficients for voice recognition performed better for the voice scenario. Also, the Eigenface and support vector machine tools in the face recognition scheme performed better than other schemes. The multimodal results better than the unimodal schemes. Also, the results of the scores fusion-based multimodal biometric scheme is better than the feature fusion-based scheme. Hence, the biometric-based authentication is effective and applicable for the WBANs authentication and personality continuous authentication on these medical applications wireless networks.













Similar content being viewed by others
References
Abdel Karim N, Shukur Z (2015) Review of user authentication methods in online examination. Asian Journal of Information Technology 14(5):166–175
Abhishree TM, Latha J, Manikantan K, Ramachandran S (2015) Face recognition using gabor filter based feature extraction with anisotropic diffusion as a pre-processing technique. Procedia Computer Science 45:312–321
Agashe NM, Nimbhorkar S (2015) A survey paper on continuous authentication by multimodal biometric. Int J Adv Res Comput Eng Technol 4(11)
Al-Sharif S, Iqbal F, Baker T, Khattack A (2016) White-hat hacking framework for promoting security awareness. In: 2016 8th IFIP international conference on new technologies, mobility and security (NTMS). https://doi.org/10.1109/NTMS.2016.7792489
Altinok A, Turk M (2013) Temporal integration for continuous multimodal biometrics. In: Proc. workshop on multimodal user authentication, pp 131–137
Asim M, Yautsiukhin A, Brucker AD, Baker T, Shi Q, Lempereur B (2018) Security policy monitoring of BPMN-based service compositions. Journal Software: Evaluation and Process 30(9). https://doi.org/10.1002/smr.1944
Azzini A, Marrara S (2009) Impostor users discovery using a multimodal biometric continuous authentication, Fuzzy system, lecture notes in artificial intelligence, vol 5178. Proceedings of the 12th international conference on knowledge - based intelligent information and engineering systems, part II, section II, pp 371–378
Azzini A, Marrara S, Sassi R, Scotti F (2010) A fuzzy approach to multimodal biometric continuous authentication. Fuzzy Optim Decis Making 7:243–256
Baken RJ, Orlikoff RF (2000) Clinical measurement of speech and voice – second edition. Singular Publishing Group
Baken RJ, Orlikoff RF (2016) Evaluating the diagnostic accuracy of Arabic SNAP test for children with hypernasality. Singular Publishing Group 85:102
Baker T, Mackay M, Shaheed A, Aldawsari B (2015) Security-oriented cloud platform for SOA-based SCADA. In: 15th IEEE/ACM international symposium on cluster, cloud and grid computing. https://doi.org/10.1109/CCGrid.2015.37
Burges C (1998) A tutorial on support vector machines for pattern recognition. In: Data mining and knowledge discovery, vol 2. Kluwer Academic Publishers, Boston
Cai L, Zeng K, Chen H, Mohapatra P (2011) Good neighbor: ad hoc pairing of nearby wireless devices by multiple antennas. In: Network and distributed system security symposium
Ceccarelli A, Montecchi L, Brancati F, Lollini P, Bondavalli A (2013) Continuous and transparent user identity verification for secure internet services. IEEE Transactions On Dependable And Secure Computing
Chetty G, Wagner M (2008) A multibiometric speaker authentication system with SVM audio reliability. Image Vis Comput 26:1249
Chetty G, Wagner M (2008) Robust face-voice based speaker identity verification using multilevel fusion. Image Vis Comput 26:1249–1260
Cristianini N, Shawe-Taylor J (2000) An introduction to support vector machines and other kernel-based learning methods. Cambridge University Press
De A, Saha A, Pal MC (2015) A human facial expression recognition model based on eigen face approach. Procedia Computer Science 45:282
De A, Saha A, Pal MC (2015) A human facial expression recognition model based on Eigen face Approac. Procedia Computer Science 45:282–289
Dodangeh P, Jahangir AH (2018) A biometric security scheme for wireless body area networks. Journal of Information Security and Applications 41:62–74. https://doi.org/10.1016/j.jisa.2018.06.001
Du W, Deng J, Han Y, Varshney P, Katz J, Khalili A (2005) A pairwise key predistribution scheme for wireless sensor networks. ACM Trans Inf Syst Secur 8(2):228–258
Kasban H, El-Bendary MAM (2017) Performance improvement of digital image transmission over mobile WiMAX networks. Wirel Pers Commun 94:1087–1103. https://doi.org/10.1007/s11277-016-3671-4
El-Bendary MAM (2017) FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attack. Multimed Tools Appl 76(24):26463–26501
Elmir Y, Elberrichi Z, Adjoudj R (2014) Multimodal biometric using a hierarchical fusion of a person’s face, voice, and online signature. J Inf Process Syst
Abouelfadl AA, MAM El-Bendary, F Shawki (2014) Enhancing transmission over wireless image sensor networks based on ZigBee Network. Life Sci 11(8):342–354
Fookes C, Lin F, Chandran V, Sridharan S (2012) Face recognition performance with superresolution. J Vis Commun Image Represent 23(1):75
Fookes C, Lin F, Chandran V, Sridharan S (2012) Evaluation of image resolution and super-resolution on face recognition performance. J Vis Commun Image Represent 23(1):75–93
Gad R, El-Fishawy N, El-Sayed A, Zorkany M (2015) Multi-biometric systems: a state of the art survey and research directions. Int J Adv Comput Sci Appl 6(6)
Galka J, Masior M, Salasa M (2014) Automatic speech segmentation in syllable centric speech recognition system. IEEE Trans Consum Electron 60(4):653
Galka J, Masior M, Salasa M (2014) Voice authentication embedded solution for secured access control. IEEE Trans Consum Electron 60(4):653–661
Halvia S, Ramapurb N, Rajac KB, Prasadd S (2017) Fusion based face recognition system using 1D transform domains. Procedia Computer Science 115:383–390
Holig C, Focker J, Best A, Roder B, Buchel C (2014) Cross-modal processing of voices and faces in developmental prosopagnosia and developmental phonagnosia. NeuroImage 103:374
Hussain AJ, Marcinonyte DM, Iqbal F (2018) Smart home systems security. In: 2018 IEEE 20th international conference on high performance computing and communications. https://doi.org/10.1109/HPCC/SmartCity/DSS.2018.00235
Inthavisas K, Lopresti D (2012) Secure speech biometric templates for user authentication. IET Biometrics 1(1):46–54
Jain AK, Prabhakar S, Chen S (1999) Combining multiple matchers for a high SecurityFingerprint verification system. Pattern Recogn Lett 20(11–13):1371–1379
Jain AK, Dass SC, Nandakumar K (2004) Soft biometric traits for personal recognition systems. LNCS 3072:731–738
Jain A, Nandakumar K, Ross A (2005) Score normalizations in multimodal biometric systems. Pattern Recogn 38:2270–2285
Nassar SS, Ayad NM, Kelash HM, El-Sayed HS, El-Bendary MAM, Abd El-Samie FE, Faragallah OS (2016) Content verification of encrypted images transmitted over wireless AWGN channels. Wirel Pers Commun 88:479–491. https://doi.org/10.1007/s11277-015-3142-3
Jain A, Nandakumar K, Ross A (2005) Score normalisation in multimodal biometric systems. Pattern Recogn 38:2270–2285
Jain AK, Ross A, Pankanti S (2013) Biometrics: a tool for information security. IEEE Trans Inf Forensics Secur 1(2):125–143
Jain AK, Ross A, Prabhakar S (2014) An introduction to bio - metric recognition. IEEE Trans Circuits Syst Video Technol 14(1):4–20
Kang H-B, Ju M-H (2012) Multi - modal feature integration for secure authentication. In: International conference on intelligent computing, pp 1191–1200
Karam Y, Baker T, Taleb-Bendiab A (2012) Security support for intention driven elastic cloud computing. In: 2012 sixth UKSim/AMSS european symposium on computer modeling and simulation. https://doi.org/10.1109/EMS.2012.17
Karlof C, Sastry N, Wagner D (2004) TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, (SenSys '04), Baltimore, Md, USA, pp 162–175
Kasban H (2017) A robust multimodal biometric authentication scheme with voice and face recognition. Arab Journal of Nuclear Sciences and Applications 50(3):120–130
Kinnunen T, Karpov E, Franti P (2006) Efficient speaker recognition for mobile devices. IEEE Trans Audio Speech Lang Process 14(1):277
Kinnunen T, Karpov E, Franti P (2006) Real time speaker identification and verification. IEEE Trans Audio Speech Lang Process 14(1):277–288
Kumar HCS, Janardhan NA (2016) An efficient personnel authentication through multi modal biometric system. International Journal of Scientific Engineering and Applied Science 2(1)
Kumar S, Sim T, Janakiraman R, Zhang S Using continuous biometric verification to protect inter-active login sessions. School of Computing, National University of Singapore
Li H, Suen CY (2016) A methodology for feature selection using multiobjective genetic algorithms for handwritten digit string recognition. Pattern Recogn 60:13
Li H, Suen CY (2016) Robust face recognition based on dynamic rank representation. Pattern Recogn 60:13–24
Liu Z, Wang H (2014) A novel speech content authentication algorithm based on Bessel–Fourier moments. Digital Signal Process 24:197–208
Liu T, Mi JX, Liu Y, Li C (2016) Multi-step linear representation-based classification for face recognition. Neurocomputing 214:944
Liu T, Mi JX, Liu Y, Li C (2016) Robust face recognition via sparse boosting representation. Neurocomputing 214:944–957
Lu S, Li M, Yu S, Yuan J BANA: body area network authentication exploiting channel characteristics. In: Proceedings of the fifth ACM conference on security and privacy in wireless and mobile networks, April 16-18, 2012, Tucson, Arizona, USA
Lumini A, Nanni L (2017) Overview of the combination of biometric matchers. Information Fusion 33:71–85
Morgen B (2012) Voice biometrics for customer authentication. Biom Technol Today 2012(2):8–11
Palanivel S, Yegnanarayana B (2008) Multimodal person authentication using face and speech. Comput Vis Image Underst 109:44
Palanivel S, Yegnanarayana B (2008) Multimodal person authentication using speech, face and visual speech. Comput Vis Image Underst 109:44–55
Poh N, Korczak J (2001) Hybrid biometric person authentication using face and voice features. In: International conference, audio and video based biometric person authentication, Halmstad, Sweden, pp 348–353
Qia M, Chena J, Chen Y (2018) A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC. Comput Methods Prog Biomed 164:101–109
Raghavendra R, Rao A, Kumar GH (2010) Multimodal person verification system using face and speech. Procedia Computer Science 2:181–187
Reynolds DA, Quatieri TF, Dunn RB (2000) Speaker verification using adapted Guassian mixture models. Digital Signal Process 10:19–41
Sim T, Zhang S, Janakiraman R, Kumar S (2011) Continuous verification using multimodal biometrics. IEEE Trans Pattern Anal Mach Intell 29(4):687–700
Soltane M (2015) State of the Art of finite GMM based biometrics face authentication systems. Int J Eng Technol 03:52
Soltane M (2015) Greedy expectation maximization tuning algorithm of finite GMM based face, voice and signature multi-modal biometric verification fusion systems. Int J Eng Technol 15(03):41–52
Suo X, Zhu Y, Owen G (2012) Graphical passwords: a survey. In: Proc. annu. computer security applications, pp 463–472
Szczechowiak P, Oliveira LB, Scott M, Collier M, Dahab R (2008) NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In: Proceedings of the 5th European conference on wireless sensor networks, Bologna, Italy, pp 305–320
Tan CC, Wang H, Zhong S, Li Q (2008) Body sensor network security: an identity-based cryptography approach. In: ACM WiSec ‘08, pp 148–153
Tariq N, Asim M, Al-Obeidat F, Farooqi MZ, Baker T, Hammoudeh M, Ghafir I (2019) The security of big data in fog-enabled IoT applications including blockchain: a survey. Sensors 19(8). https://doi.org/10.3390/s19081788
Turk M, Pentland A (1991) Eigenfaces for face detection/recognition. J Cogn Neurosci 3(1):71
Turk M, Pentland A (1991) Eigenfaces for recognition. J Cogn Neurosci 3(1):71–86
Varun R, Kini YV, Manikantan K, Ramachandran S (2015) Face recognition using Hough transform based feature extraction. Procedia Computer Science 46:1491–1500
Venkatasubramanian K, Gupta S (2010) Physiological value-based efficient usable security solutions for body sensor networks. ACM Trans Sen Netw 6(4):1–36
Venkatasubramanian KK, Gupta SKS (2010) Physiological value-based efficient usable security solutions for body sensor networks. ACM Trans Sen Netw 6:31:1–31:36
Xu F, Qin Z, Tan C, Wang B, Li Q (2011) Imdguard: Securing implantable medical devices with the external wearable guardian. In: The 30th IEEE international conference on computer communications (INFOCOM 2011), Shanghai, P.R.China, pp 1862–1870
Xuan S, Xiang S, Ma H (2016) Person Re-identification by encoding free energy feature maps. Computer Vision 10(6):493
Xuan S, Xiang S, Ma H (2016) Subclass representation-based face-recognition algorithm derived from the structure scatter of training samples. Computer Vision 10(6):493–502
Zhang S, Janakiraman R, Sim T, Kumar S (2010) Continuous verification using multimodal biometrics. In: Proc.Second Int’l Conf. Biometrics, pp 562–570
Zheng CH, Hou YF, Zhang J (2016) Bi-dimensional empirical mode decomposition and nonconvex penalty minimization L q (q = 0.5) regular sparse representation-based classification for image recognition. Neurocomputing 198:114
Zheng CH, Hou YF, Zhang J (2016) Improved sparse representation with low-rank representation for robust face recognition. Neurocomputing 198:114–124
Zhou Z, Du EY, Thomas NL, Delp EJ (2012) A new human identification method: sclera recognition. IEEE Trans Syst Man Cybern Syst Hum 42(3)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
El-Bendary, M.A.M., Kasban, H., Haggag, A. et al. Investigating of nodes and personal authentications utilizing multimodal biometrics for medical application of WBANs security. Multimed Tools Appl 79, 24507–24535 (2020). https://doi.org/10.1007/s11042-020-08926-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-08926-2