Skip to main content

Advertisement

Log in

A real-time network architecture for biometric data delivery in Ambient Intelligence

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Ambient Intelligent applications involve the deployment of sensors and hardware devices into an intelligent environment surrounding people, meeting users’ requirements and anticipating their needs (Ambient Intelligence-AmI). Biometrics plays a key role in surveillance and security applications. Fingerprint, iris and voice/speech traits can be acquired by contact, contact-less, and at-a-distance sensors embedded in the environment. Biometric traits transmission and delivery is very critical and it needs real-time transmission network with guaranteed performance and QoS. Wireless networks become suitable for AmI if they are able to satisfy real-time communication and security system requirements. In this paper an hierarchical network architecture, made up of several independent Wireless Automation Cells grouped in Automation Clusters, is presented. The performance evaluation of the proposed architecture, in terms of authentication accuracy and network scheduling efficiency, is also outlined.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Ambalakat P (2011) Security of biometric authentication systems. In: Proc. of 21st computer science seminar SA1-T1-1, p 2. http://www.rh.edu/~rhb/cs_seminar_2005/SessionA1/ambalakat.pdf. Accessed 11 Nov 2011

  • Bazen AM, Verwaaijen GTB, Gerez SH, Veelenturf LPJ, Van der Zwaag BJ (2000) A correlation-based fingerprint verification system. In: Proc of workshop on circuits, systems and signal processing, pp 205–213

  • Bertillon A (1885) La Couleur de l’Iris. Rev Sci 36(3):65–73

    Google Scholar 

  • Bresenham J (1996) Pixel-processing fundamentals. IEEE J Comput Graph Appl 16(1):74–82. doi:10.1109/38.481626

    Article  Google Scholar 

  • Buttazzo GC (2005) Hard real time and computing system. In: Predictable scheduling algorithms and application, 2nd edn. Springer, Berlin

  • Campbell JP Jr (1997) Speaker recognition: a tutorial. Proc IEEE 85(9):1437–1462

    Article  Google Scholar 

  • Canny J (1986) A computational approach to edge detection. IEEE Trans Pattern Anal Mach Intell 8(6):679–698. doi:10.1109/TPAMI.1986.4767851

    Article  Google Scholar 

  • Chen W, Yuan S (2003) A novel personal biometric authentication technique using human iris based on fractal dimension features. Proc IEEE Int Conf Acoust Speech Signal Process 3:201–204

    Google Scholar 

  • Collotta M, Mirabella O, Lo Bello L (2007) Comparison between RT scheduling techniques for Bluetooth networks in DPCSs. Proc of international symposium on industrial embedded systems, pp 320–323. doi:10.1109/SIES.2007.4297352

  • Conti V, Militello C, Vitabile S, Sorbello F (2009) A Multimodal technique for an embedded fingerprint recognizer in mobile payment systems. Int J Mobile Inform Syst (IOS Press Ed.) 5(2):105–124. ISSN: 1574-017X. doi:10.3233/MIS-2009-0076

    Google Scholar 

  • Conti V, Militello C, Sorbello F, Vitabile S (2010) A frequency-based approach for features fusion in fingerprint and iris multimodal biometric identification systems. IEEE Trans Syst Man Cybern Part C Appl Rev 40(4):384–395. ISSN: 1094-6977. doi:10.1109/TSMCC.2010.2045374

    Google Scholar 

  • Daugman JG (1993) High confidence visual recognition of persons by a test of statistical independence. IEEE Trans Pattern Anal Mach Intell 15(11):1148–1161

    Article  Google Scholar 

  • Daugman JG, Downing C (2001) Epigenetic randomness, complexity and singularity of human iris patterns. In: Proc of Royal Society, London, pp 1737–1740

  • Davies AC (2002) An overview of Bluetooth wireless technology and some competing lan standard. In: Proc. of 1st IEEE international conference on circuits and systems for communications, pp 206–211

  • De Marsico M, Nappi M, Riccio D, Wechsler H (2011) Iris segmentation using pupil location, linearization, and limbus boundary reconstruction in Ambient Intelligent environments. J Ambient Intell Human Comput (Springer) 2(2):153–162

    Google Scholar 

  • De Mira J Jr, Mayer J (2003) Image feature extraction for application of biometric identification of iris—a morphological approach. In: Proc of the XVI Brazilian symposium on computer graphics and image processing, vol 1, pp 12–20

  • Flom L, Safir A (1987) Iris recognition system. US Patent, no 4,641,394, U.S. Government Printing Office, Washington DC

  • Furui S (1996) An overview of speaker recognition technology. In: Automatic speech and speaker recognition: advanced topics. Kluwer Academic, Dordrecht

  • Gibbon D, Moore R, Winski R (1998) Handbook of standard and resources for spoken language systems. Mouton de Gruyter, Germany

    Google Scholar 

  • Guennoun M, Zandi M, El-Khatib K (2008) On the use of biometrics to secure wireless biosensor networks. In: Proc of the 3rd international conference on information and communication technologies: from theory to applications, pp 1–5

  • Hameed M, Trsek H, Graeser O, Jasperneite J (2008) Performance investigation and optimization of IEEE802.15.4 for industrial wireless sensor networks. In: Proc of international ieee conference emerging technologies and factory automation, pp 1016–1022. doi:10.1109/ETFA.2008.4638518

  • Hong L, Wan Y, Jain AK (1998) Fingerprint image enhancement, algorithm and performance evaluation. IEEE Trans Pattern Anal Mach Intell 20(8):777–789

    Article  Google Scholar 

  • Hough PVC (1962) Method and means for recognizing complex patterns. US Patent no 3.069.654

  • HTK (2011) HTK. http://htk.eng.cam.ac.uk. Accessed 11 Nov 2011

  • IEEE Std 802.15.4 (2006) IEEE standard for information technology—telecommunications and information exchange between systems—local and metropolitan area networks—specific requirements part 15.4: wireless medium access control (mac) and physical layer (phy) specifications for low-rate wireless. http://standards.ieee.org/about/get/802/802.15.html. Accessed 11 Nov 2011

  • IEEE Std 802.11 (2007) IEEE standard for information technology—telecommunications and information exchange between systems—local and metropolitan area networks—specific requirements—part 11: wireless lan medium access control (mac) and physical layer (phy) specifications, C1-1184. http://standards.ieee.org/findstds/interps/802.11-2007.html. Accessed 11 Nov 2011

  • Jain AK (1997) On-line fingerprint verification. IEEE Trans Pattern Anal Mach Intell 19(4):302–314

    Article  Google Scholar 

  • Jianjun Y, Changjun J, Zuowen J (2011) A biometric-based user authentication for wireless sensor networks. Wuhan Univ J Nat Sci 15(3):272–276. doi:10.1007/s11859-010-0318-2

    Google Scholar 

  • Kumar A, Pang GKH (2002) Defect detection in textured materials using Gabor filters. IEEE Trans Ind Appl 38(2):425–440

    Article  Google Scholar 

  • Lee CH, Juang BH (1996) A survey on Automatic Speech Recognition with an illustrative example on continuous speech recognition of mandarin. Int J Comput Linguist Chin Lang Process 1(1):1–36

    MathSciNet  Google Scholar 

  • Liam L, Checkima A, Fan L, Dargham J (2002) Iris Recognition using self-organizing neural network. In: Proc of student conference on research and developing systems, pp 169–172

  • Liang L, Huang L, Jiang X, Yao V (2008) Design and implementation of wireless smart-home sensor network based on zigbee protocol. In: Proc of international conference on communications, circuits and systems, pp 434–438

  • Liu J, Yu R (2009) Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks. IEEE Trans Wireless Commun 8(2):806–815

    Article  Google Scholar 

  • Ma L, Wang Y, Zhang D (2004) Efficient iris recognition by characterizing key local variations. IEEE Trans Image Process 13(6):739–750

    Article  Google Scholar 

  • Mali M, Novak F, Biasizzo A (2005) Hardware implementation of AES algorithm. J Electric Eng 56(9–10):265–269

    Google Scholar 

  • Maltoni D, Maio D, Jain AK, Prabhakar S (2003) Handbook of fingerprint recognition. Springer, New York

    MATH  Google Scholar 

  • Maltoni D, Maio D, Jain AK, Prabhakar S (2008) Handbook of fingerprint recognition, 2nd edn. Springer, Heidelberg

    Google Scholar 

  • Masek L (2003) Recognition of human iris patterns for biometric identification. Dissertation, University of Western Australia

  • Matey JR, Naroditsky O, Hanna K, Kolczynski R, LoIacono D, Mangru S, Tinker M, Zappia T, Zhao WY (1996) Iris on the MoveTM: acquisition of images for iris recognition in less constrained environments. Proc IEEE 94(11):1936–1947

    Article  Google Scholar 

  • Matsumoto T, Matsumoto H, Yamada K, Hoshino S (2002). Impact of artificial “Gummy” fingers on fingerprint systems. Proc SPIE (Optical Security and Counterfeit Deterrence Techniques IV, Rudolf L. van Renesse Editor) 4677:275–289

  • Mehtre BM, Chatterjee B (1989) Segmentation of fingerprint images—a composite method. Pattern Recog 22(4):381–385. ISSN: 0031-3203

    Google Scholar 

  • Militello C, Conti V, Vitabile S, Sorbello F (2010a). An embedded iris recognizer for portable and mobile devices. Special issue on “Frontiers in Complex, Intelligent and Software Intensive Systems”. Int J Comput Syst Sci Eng 25(2):33–45. ISSN: 0267-6192

    Google Scholar 

  • Militello C, Conti V, Vitabile S, Sorbello F (2010b). Embedded access points for trusted data and resources access in HPC systems. J Supercomput Int J High-Perform Comput Design Anal Use. (Springer, Netherlands) 55(1):4–27. ISSN: 0920-8542. ISSN Online 1573-0484. doi: 10.1007/s11227-009-0379-1

  • NIST (2009). http://www.itl.nist.gov/iad/mig//publications/ASRhistory/index.html. Accessed 11 Nov 2011

  • Noh S, Bae K, Park KR, Kim J (2005) A new iris recognition method using independent component analysis. IEICE Trans Inform Syst E88-D(11):2573–2581. doi:10.1093/ietisy/e88-d.11.2573

  • OMNeT++ (2011) http://www.omnetpp.org. Accessed 11 Nov 2011

  • Pospisil ML (2000) The human iris structure and its usages. Proc Acta Univ Palacki Phisica 39:87–95

    Google Scholar 

  • Prabhakar S, Jain AK, Jianguo W (2000) Minutiae verification and classification for fingerprint matching. In: Proc of the 15th international conference on pattern recognition, pp 25–29. doi:10.1109/ICPR.2000.905269

  • Rabiner LR, Juang BH (1993) Fundamentals of speech recognition. Prentice Hall, New Jersey

  • Reynolds DA (2002) An overview of automatic speaker recognition technology. In: IEEE international conference on acoustics, speech, and signal processing, vol 4, pp IV-4072–IV-4075

  • Siniscalchi SM, Gennaro F, Andolina S, Vitabile S, Gentile A, Sorbello F (2006) Embedded knowledge-based speech detectors for real-time recognition tasks. In: International conference on parallel processing workshops, pp 353–360

  • Sphinx (2011). http://www.speech.cs.cmu.edu/sphinx. Accessed 11 Nov 2011

  • Sung H, Lim J, Park J, Lee Y (2004) Iris recognition using collarette boundary localization. In: Proc of the 17th international conference on pattern recognition, vol 4, pp 857–860. doi:10.1109/ICPR.2004.1333907

  • Surie D, Laguionie O, Pederson T (2008) Wireless sensor networking of everyday objects in a smart Home Environment. In: Proc of international conference on intelligent sensor, sensor networks and information processing, pp 189–194

  • Tapia D, De Paz Y, Bajo J (2009) Ambient Intelligence based architecture for automated dynamic environments. Proc of the 10th international work-conference on artificial neural networks: part 1: bio-inspired systems: computational and Ambient Intelligence, pp 171–180

  • Tistarelli M, Schouten B (2011) Biometrics in ambient intelligence. J Ambient Intell Human Comput 2(2):113–126 (Springer)

    Google Scholar 

  • Wildes R (1997) Iris recognition: an emerging biometric technology. Proc IEEE 85(9):1348–1363. doi:10.1109/5.628669

    Article  Google Scholar 

  • Xu M, Ma L, Xia F, Yuan T, Qian J, Shao M (2010) Design and implementation of a wireless sensor network for smart homes. In: Proc of the 7th conference on ubiquitous intelligence and computing and the 7th conference on autonomic and trusted computing, pp 239–243

  • Zhu Y, Tan T, Wang Y (2000) Biometric personal identification on iris patterns. In: Proc of the 15th international conference on pattern recognition, vol 2, pp 805–808

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Vitabile.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Vitabile, S., Conti, V., Collotta, M. et al. A real-time network architecture for biometric data delivery in Ambient Intelligence. J Ambient Intell Human Comput 4, 303–321 (2013). https://doi.org/10.1007/s12652-011-0104-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-011-0104-9

Keywords