AN EFFICIENT IRIS AUTHENTICATION USING CHAOS THEORY BASED CRYPTOGRAPHY FOR E-COMMERCE
#1

[attachment=14654]
ABSTRACT
E-commerce is an outcome of globalization and technology outbreak of 21st century. Increasingly, more products and services are sold over Internet; hence, there is a growing need for a combination of legislation and technical solutions to globally secure customer privacy. Credit card fraud is one of the crimes especially when it is used for Web-based transaction. In this paper, a technical solution using Iris authentication technique is proposed for protecting identity theft in e-commerce transactions because Iris patterns are unique to an individual. Further, this research proposes authentication of e-commerce users by using Iris biometric technique as one of the most secure biometric algorithms. Therefore, this research proposes a Web-based architecture which uses a combination of image processing and secure transmission of customers' Iris templates along with credit card details for decreasing credit card frauds over Internet.
Categories and Subject Descriptors
C.2.2 [Computer-Communication Networks]: Network Protocols – Applications.
General Terms
Performance, Design, Standardization.
Keywords
Web applications, Web of Things, REST, CoAP.
1. INTRODUCTION
Recent advances in Wireless Sensor Network (WSN) technology and the use of the Internet Protocol (IP) in resource constrained devices has radically changed the Internet landscape. Trillions of smart objects will be connected to the Internet to form the so called Internet of Things (IoT). The IoT will connect physical (analogic) environments to the (digital) Internet, unleashing exciting possibilities and challenges for a variety of application domains, such as smart metering, e-health logistics, building and home automation [7].
The use of IP technology on embedded devices has been recently promoted by the work of the IP for Smart Objects (IPSO) Alliance1, a cluster of major IT/telecom players and wireless silicon vendors. At the same time, the Internet Engineering Task Force (IETF) has done substantial standardization activity on IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) [8]. This new standard enables the use of IPv6 in Low-power and Lossy Networks (LLNs), such as those based on the IEEE 802.15.4 standard [10]. In addition to 6LowPAN, IETF Routing over Low-power and Lossy networks (ROLL) Working Group has designed and specified a new IP routing protocol for smart object internetworking. The protocol is called IPv6 Routing Protocol for Low-power and Lossy networks (RPL) [9]. One of the major benefits of IP based networking in LLNs is to enable the use of standard web service architectures without using application gateways. As a consequence, smart objects will not only be integrated with the internet but also with the Web. This integration is defined as the Web of Things (WoT). The advantage of the WoT is that smart object applications can be built on top Representational State Transfer (REST) architectures. REST architectures allow applications to rely on loosely coupled services which can be shared and reused. In a REST architecture a resource is an abstraction controlled by the server and identified by a Universal Resource Identifier (URI). The resources are decoupled by the services and therefore resources can be arbitrarily represented by means of various formats, such as XML or JSON. The resources are accessed and manipulated by an application protocol based on client/server request/responses. REST is not tied to a particular application protocol. However, the vast majority of REST architectures nowadays use Hypertext Transfer Protocol (HTTP). HTTP manipulates resources by means of its methods GET, POST, PUT, etc [6]. REST architectures allow IoT and Machine-to-Machine (M2M) applications to be developed on top of web services which can be shared and reused. The sensors become abstract resources identified by URIs, represented with arbitrary formats and manipulated with the same methods as HTTP. As a consequence, RESTful WSNs drastically reduce the application development complexity. The use of web service in LLNs is not straightforward as a consequence of the differences between Internet applications and IoT or M2M applications. IoT or M2M applications are shortlived
and web services reside in battery operated devices which most of the time sleep and wakeup only when there is data traffic to be exchanged. In addition, such applications require a multicast and asynchronous communication compared to the unicast and synchronous approach of standard Internet applications [11]. The Internet Engineering Task Force (IETF) Constrained RESTful environments (CoRE) Working Group has done major standardization work for introducing the web service paradigm into networks of smart objects. The CoRE group has defined a REST based web transfer protocol called Constrained Application Protocol (CoAP). CoAP includes the HTTP functionalities which have been re-designed taking into account the low processing power and energy consumption constraints of small embedded devices such as sensors. In order to make the protocol suitable to IoT and M2M applications, various new functionalities have been added [12]. With 6LoWPAN technology becoming mature, the WoT has started playing major role among the research community. Various research papers proposing REST/HTTP architectures for WSNs have recently appeared. The work in [1] proposes a RESTful architecture which allows instruments and other producers of physical information to directly publish their data. In [2], the authors propose a REST/HTTP framework for Home Automation. The work in [3] proposes a toolkit which allows the user to create web services provided by a specific device and to automatically expose them via a REST API. The authors in [4] show how different applications can be built on top of RESTful WSNs. The work in [5] illustrates the real world implementation of a RESTful WSN. The network is deployed across various university buildings and it is thought for the development of applications and services for professors and students. The aforementioned research work focuses on RESTful WSNs but do not use CoAP as application protocol. The activity of the CoRE group has only recently started and therefore CoAP has not yet been considered. In this work we present a RESTful WSN based on CoAP. It has twofold objective. Firstly, it describes the major differences between CoAP and HTTP and compares the two protocols in terms of power consumption and overhead. In order to demonstrate the benefits of CoAP, we ran two simple experiments with the Contiki Operating System: the first one using CoAP over 6LoWPAN and the second one using HTTP over 6LoWPAN. The results show that the power consumption is drastically lower when using CoAP compared to HTTP. Secondly, the paper describes the design and development of an end-to-end IP based architecture integrating a CoAP over 6LowPAN Contiki based WSN with an HTTP over IP based application. The application allows a user to access WSN data directly from a Web browser. The system has been designed for Greenhouse monitoring. However, it is work in progress and it has not yet been deployed. Therefore, the aim of the paper is to show how the use of CoAP and 6LoWPAN simplifies the integration of WSNs with Web applications. The paper provides an overview of the basic application building blocks focusing on the gateway which connects HTTP clients to the WSN.
The rest of the paper is organized as follows. Section 2 describes the major functionalities of CoAP highlighting the differences with HTTP. It also gives a brief overview of the existing open source implementation of CoAP. Section 3 reports the results of an experiment illustrating the benefit of CoAP in terms of power consumption compared to HTTP. Section 4 describes the design and development of an end-to-end IP based architecture
integrating a CoAP over 6LowPAN Contiki based WSN with an HTTP over IP based application. Section 5 concludes the paper.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: chaos theory alliancention for wireless multicast, contiki cruises, scramble the image using chaos matlab code, authentication in cryptography, magnetostriction chaos et applications, 6lowpan, chaos theory activation,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Color Iris Recognition Using Quaternion Phase Correlation matlab project project topics 3 3,413 02-07-2016, 09:38 AM
Last Post: visalakshik
  GSM based SCADA implementation using Microcontroller project report tiger 19 27,550 31-05-2016, 12:13 PM
Last Post: dhanabhagya
  Micro Controller based Security System using Sonar seminar projects crazy 3 3,641 28-09-2014, 05:50 PM
Last Post: Guest
  SMS Based Wireless Electronic Notice Board using GSM/CDMA/3G Mobile Phone seminar class 20 18,260 30-04-2014, 10:43 PM
Last Post: ShawnHasson
  PIC BASED INTELLIGENT TRACKING SYSTEM USING SOLAR POWER project report helper 3 4,098 27-03-2014, 05:35 AM
Last Post: Guest
  WAVELET BASED EMBEDDED COLOR IMAGE CODING TECHNIQUE USING BLOCK-TREE APPROACH smart paper boy 1 2,109 03-01-2013, 11:52 AM
Last Post: seminar details
  An Effective Wavelet-Based Watermarking Scheme Using Human Visual System seminar class 1 1,599 19-12-2012, 11:48 AM
Last Post: seminar details
  Real Time Web based Vehicle Tracking using GPS smart paper boy 3 2,334 26-11-2012, 12:55 PM
Last Post: seminar details
  gsm based home security system using microcontroller prakash1088 3 4,079 19-11-2012, 02:29 PM
Last Post: Guest
  CLAP SWITCH THEORY seminar class 1 5,814 20-10-2012, 12:05 PM
Last Post: seminar details

Forum Jump: