Abstract
Ambient Intelligent applications involve the deployment of sensors and hardware devices into an intelligent environment surrounding people, meeting users’ requirements and anticipating their needs (Ambient Intelligence-AmI). Biometrics plays a key role in surveillance and security applications. Fingerprint, iris and voice/speech traits can be acquired by contact, contact-less, and at-a-distance sensors embedded in the environment. Biometric traits transmission and delivery is very critical and it needs real-time transmission network with guaranteed performance and QoS. Wireless networks become suitable for AmI if they are able to satisfy real-time communication and security system requirements. In this paper an hierarchical network architecture, made up of several independent Wireless Automation Cells grouped in Automation Clusters, is presented. The performance evaluation of the proposed architecture, in terms of authentication accuracy and network scheduling efficiency, is also outlined.














Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Ambalakat P (2011) Security of biometric authentication systems. In: Proc. of 21st computer science seminar SA1-T1-1, p 2. http://www.rh.edu/~rhb/cs_seminar_2005/SessionA1/ambalakat.pdf. Accessed 11 Nov 2011
Bazen AM, Verwaaijen GTB, Gerez SH, Veelenturf LPJ, Van der Zwaag BJ (2000) A correlation-based fingerprint verification system. In: Proc of workshop on circuits, systems and signal processing, pp 205–213
Bertillon A (1885) La Couleur de l’Iris. Rev Sci 36(3):65–73
Bresenham J (1996) Pixel-processing fundamentals. IEEE J Comput Graph Appl 16(1):74–82. doi:10.1109/38.481626
Buttazzo GC (2005) Hard real time and computing system. In: Predictable scheduling algorithms and application, 2nd edn. Springer, Berlin
Campbell JP Jr (1997) Speaker recognition: a tutorial. Proc IEEE 85(9):1437–1462
Canny J (1986) A computational approach to edge detection. IEEE Trans Pattern Anal Mach Intell 8(6):679–698. doi:10.1109/TPAMI.1986.4767851
Chen W, Yuan S (2003) A novel personal biometric authentication technique using human iris based on fractal dimension features. Proc IEEE Int Conf Acoust Speech Signal Process 3:201–204
Collotta M, Mirabella O, Lo Bello L (2007) Comparison between RT scheduling techniques for Bluetooth networks in DPCSs. Proc of international symposium on industrial embedded systems, pp 320–323. doi:10.1109/SIES.2007.4297352
Conti V, Militello C, Vitabile S, Sorbello F (2009) A Multimodal technique for an embedded fingerprint recognizer in mobile payment systems. Int J Mobile Inform Syst (IOS Press Ed.) 5(2):105–124. ISSN: 1574-017X. doi:10.3233/MIS-2009-0076
Conti V, Militello C, Sorbello F, Vitabile S (2010) A frequency-based approach for features fusion in fingerprint and iris multimodal biometric identification systems. IEEE Trans Syst Man Cybern Part C Appl Rev 40(4):384–395. ISSN: 1094-6977. doi:10.1109/TSMCC.2010.2045374
Daugman JG (1993) High confidence visual recognition of persons by a test of statistical independence. IEEE Trans Pattern Anal Mach Intell 15(11):1148–1161
Daugman JG, Downing C (2001) Epigenetic randomness, complexity and singularity of human iris patterns. In: Proc of Royal Society, London, pp 1737–1740
Davies AC (2002) An overview of Bluetooth wireless technology and some competing lan standard. In: Proc. of 1st IEEE international conference on circuits and systems for communications, pp 206–211
De Marsico M, Nappi M, Riccio D, Wechsler H (2011) Iris segmentation using pupil location, linearization, and limbus boundary reconstruction in Ambient Intelligent environments. J Ambient Intell Human Comput (Springer) 2(2):153–162
De Mira J Jr, Mayer J (2003) Image feature extraction for application of biometric identification of iris—a morphological approach. In: Proc of the XVI Brazilian symposium on computer graphics and image processing, vol 1, pp 12–20
Flom L, Safir A (1987) Iris recognition system. US Patent, no 4,641,394, U.S. Government Printing Office, Washington DC
Furui S (1996) An overview of speaker recognition technology. In: Automatic speech and speaker recognition: advanced topics. Kluwer Academic, Dordrecht
Gibbon D, Moore R, Winski R (1998) Handbook of standard and resources for spoken language systems. Mouton de Gruyter, Germany
Guennoun M, Zandi M, El-Khatib K (2008) On the use of biometrics to secure wireless biosensor networks. In: Proc of the 3rd international conference on information and communication technologies: from theory to applications, pp 1–5
Hameed M, Trsek H, Graeser O, Jasperneite J (2008) Performance investigation and optimization of IEEE802.15.4 for industrial wireless sensor networks. In: Proc of international ieee conference emerging technologies and factory automation, pp 1016–1022. doi:10.1109/ETFA.2008.4638518
Hong L, Wan Y, Jain AK (1998) Fingerprint image enhancement, algorithm and performance evaluation. IEEE Trans Pattern Anal Mach Intell 20(8):777–789
Hough PVC (1962) Method and means for recognizing complex patterns. US Patent no 3.069.654
HTK (2011) HTK. http://htk.eng.cam.ac.uk. Accessed 11 Nov 2011
IEEE Std 802.15.4 (2006) IEEE standard for information technology—telecommunications and information exchange between systems—local and metropolitan area networks—specific requirements part 15.4: wireless medium access control (mac) and physical layer (phy) specifications for low-rate wireless. http://standards.ieee.org/about/get/802/802.15.html. Accessed 11 Nov 2011
IEEE Std 802.11 (2007) IEEE standard for information technology—telecommunications and information exchange between systems—local and metropolitan area networks—specific requirements—part 11: wireless lan medium access control (mac) and physical layer (phy) specifications, C1-1184. http://standards.ieee.org/findstds/interps/802.11-2007.html. Accessed 11 Nov 2011
Jain AK (1997) On-line fingerprint verification. IEEE Trans Pattern Anal Mach Intell 19(4):302–314
Jianjun Y, Changjun J, Zuowen J (2011) A biometric-based user authentication for wireless sensor networks. Wuhan Univ J Nat Sci 15(3):272–276. doi:10.1007/s11859-010-0318-2
Kumar A, Pang GKH (2002) Defect detection in textured materials using Gabor filters. IEEE Trans Ind Appl 38(2):425–440
Lee CH, Juang BH (1996) A survey on Automatic Speech Recognition with an illustrative example on continuous speech recognition of mandarin. Int J Comput Linguist Chin Lang Process 1(1):1–36
Liam L, Checkima A, Fan L, Dargham J (2002) Iris Recognition using self-organizing neural network. In: Proc of student conference on research and developing systems, pp 169–172
Liang L, Huang L, Jiang X, Yao V (2008) Design and implementation of wireless smart-home sensor network based on zigbee protocol. In: Proc of international conference on communications, circuits and systems, pp 434–438
Liu J, Yu R (2009) Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks. IEEE Trans Wireless Commun 8(2):806–815
Ma L, Wang Y, Zhang D (2004) Efficient iris recognition by characterizing key local variations. IEEE Trans Image Process 13(6):739–750
Mali M, Novak F, Biasizzo A (2005) Hardware implementation of AES algorithm. J Electric Eng 56(9–10):265–269
Maltoni D, Maio D, Jain AK, Prabhakar S (2003) Handbook of fingerprint recognition. Springer, New York
Maltoni D, Maio D, Jain AK, Prabhakar S (2008) Handbook of fingerprint recognition, 2nd edn. Springer, Heidelberg
Masek L (2003) Recognition of human iris patterns for biometric identification. Dissertation, University of Western Australia
Matey JR, Naroditsky O, Hanna K, Kolczynski R, LoIacono D, Mangru S, Tinker M, Zappia T, Zhao WY (1996) Iris on the MoveTM: acquisition of images for iris recognition in less constrained environments. Proc IEEE 94(11):1936–1947
Matsumoto T, Matsumoto H, Yamada K, Hoshino S (2002). Impact of artificial “Gummy” fingers on fingerprint systems. Proc SPIE (Optical Security and Counterfeit Deterrence Techniques IV, Rudolf L. van Renesse Editor) 4677:275–289
Mehtre BM, Chatterjee B (1989) Segmentation of fingerprint images—a composite method. Pattern Recog 22(4):381–385. ISSN: 0031-3203
Militello C, Conti V, Vitabile S, Sorbello F (2010a). An embedded iris recognizer for portable and mobile devices. Special issue on “Frontiers in Complex, Intelligent and Software Intensive Systems”. Int J Comput Syst Sci Eng 25(2):33–45. ISSN: 0267-6192
Militello C, Conti V, Vitabile S, Sorbello F (2010b). Embedded access points for trusted data and resources access in HPC systems. J Supercomput Int J High-Perform Comput Design Anal Use. (Springer, Netherlands) 55(1):4–27. ISSN: 0920-8542. ISSN Online 1573-0484. doi: 10.1007/s11227-009-0379-1
NIST (2009). http://www.itl.nist.gov/iad/mig//publications/ASRhistory/index.html. Accessed 11 Nov 2011
Noh S, Bae K, Park KR, Kim J (2005) A new iris recognition method using independent component analysis. IEICE Trans Inform Syst E88-D(11):2573–2581. doi:10.1093/ietisy/e88-d.11.2573
OMNeT++ (2011) http://www.omnetpp.org. Accessed 11 Nov 2011
Pospisil ML (2000) The human iris structure and its usages. Proc Acta Univ Palacki Phisica 39:87–95
Prabhakar S, Jain AK, Jianguo W (2000) Minutiae verification and classification for fingerprint matching. In: Proc of the 15th international conference on pattern recognition, pp 25–29. doi:10.1109/ICPR.2000.905269
Rabiner LR, Juang BH (1993) Fundamentals of speech recognition. Prentice Hall, New Jersey
Reynolds DA (2002) An overview of automatic speaker recognition technology. In: IEEE international conference on acoustics, speech, and signal processing, vol 4, pp IV-4072–IV-4075
Siniscalchi SM, Gennaro F, Andolina S, Vitabile S, Gentile A, Sorbello F (2006) Embedded knowledge-based speech detectors for real-time recognition tasks. In: International conference on parallel processing workshops, pp 353–360
Sphinx (2011). http://www.speech.cs.cmu.edu/sphinx. Accessed 11 Nov 2011
Sung H, Lim J, Park J, Lee Y (2004) Iris recognition using collarette boundary localization. In: Proc of the 17th international conference on pattern recognition, vol 4, pp 857–860. doi:10.1109/ICPR.2004.1333907
Surie D, Laguionie O, Pederson T (2008) Wireless sensor networking of everyday objects in a smart Home Environment. In: Proc of international conference on intelligent sensor, sensor networks and information processing, pp 189–194
Tapia D, De Paz Y, Bajo J (2009) Ambient Intelligence based architecture for automated dynamic environments. Proc of the 10th international work-conference on artificial neural networks: part 1: bio-inspired systems: computational and Ambient Intelligence, pp 171–180
Tistarelli M, Schouten B (2011) Biometrics in ambient intelligence. J Ambient Intell Human Comput 2(2):113–126 (Springer)
Wildes R (1997) Iris recognition: an emerging biometric technology. Proc IEEE 85(9):1348–1363. doi:10.1109/5.628669
Xu M, Ma L, Xia F, Yuan T, Qian J, Shao M (2010) Design and implementation of a wireless sensor network for smart homes. In: Proc of the 7th conference on ubiquitous intelligence and computing and the 7th conference on autonomic and trusted computing, pp 239–243
Zhu Y, Tan T, Wang Y (2000) Biometric personal identification on iris patterns. In: Proc of the 15th international conference on pattern recognition, vol 2, pp 805–808
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Vitabile, S., Conti, V., Collotta, M. et al. A real-time network architecture for biometric data delivery in Ambient Intelligence. J Ambient Intell Human Comput 4, 303–321 (2013). https://doi.org/10.1007/s12652-011-0104-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-011-0104-9