Friday, July 17, 2015

Software-Operating systems

The core functionality of every pervasive computing device is determined by its operating system.

• The major differences of operating systems for pervasive devices from the user's point  of view are the human-machine interface, and the speed with which a task can be performed.

• For pervasive devices, there will likely be no equivalent to the Windows/Intel  monopoly in the near future because pervasive devices do have a wide range of usages  (from mobile phones to set-top boxes) with very con-strained hardware.

Security

 Issues in biometrics

Types of circumvention

o Biometrics is secure but not secret

o Permanently associated with user

o Used across multiple applications

o Can be covertly captured

o Denial of service attacks(1)

o Fake biometrics attack(2)

o Replay and Spoof attacks(3,5)


o Trojan horse attacks(4,6,7)

o Back end attacks(8)

o Collusion

o Coercion

Fingerprints

�Minutiae: Local anomalies in the ridge flow

�Pattern of minutiae are unique to each Individual

No comments:

Post a Comment