29-10-2010, 10:54 AM
[b]Design of Secure Mobile Communication using Fingerprint[/b]
Seifedine Kadry
Aziz Barbar
American University of Science and Technology
Department of Computer Science
[hr\
Abstract
Mobile handheld device is a popular device that provides secure, private, authentic,
and accurate communication and exchange of confidential information. In this paper we
propose a technique to solve the authenticity problem in mobile communication. This
technique is mainly based on the usage of the Fingerprint to identify both the speaker and
the sender. This technique is simple, requires less calculation than other public/private key
techniques, assures more authenticity than digital signature, and eliminates the need for a
third party. Moreover, when applied to mobile phones, this technique resists any forge
imposed by another party.
1. Introduction
A recent survey carried by Interactive Statistics Corporation (IDC) shows that around 90% of mobile
users use messaging as their main communication tool disregarding the safety level of such a
communication system; if phones are lost or shared, anyone can access the data on the phone. This is
known as the AUTHENTICITY in cryptography science. That is why, scientists should come up with a
concept that minimizes the risk associated with losing or sharing a phone, thus offering a safe
environment for communication.
This paper presents a solution for the above mentioned problem. “Fingerprint Identification
Technique” is the most effective technique for solving such a problem. This technique works on the
Fingerprint basis whereby the phone can be accessed when it identifies the Fingerprint of the user(s).
This paper is organized as follows: In section 2, we provide an overview of the secure
communication in mobile handheld device. Then, section 3 describes the digital signature scheme and
the related algorithm RSA [3]. In section 4, we write the code of the RSA algorithm in JAVA for the
performance purpose. Section 5 gives a literature review of fingerprint matching technique. Next in
section 6, we describe the proposed design which is based on the fingerprint to authenticate the caller,
the performance of our design is given in section 7 and finally section 8 concludes the paper with
future work.
for more ::->
http://eurojournalsejsr_30_1_11.pdf