Authentication is the key parameter to speak the truth of an attribute claimed by the real entity. There are several ways to make authentication more robust and biometrics is one among them. From past decade, Biometric technology is widely adopted and accepted everywhere to authenticate an individual's identity. Also the adopted technology overcomes the limitations faced by the traditional authentication process such as knowledge based issues including password and token for the authentication of an individual. This paper makes a comprehensive study of the existing biometric methodologies, their usage and limitations that are employed in real time cases. It also presents the motivation for adapting biometrics in current situations. In addition to this, it also makes an attempt to talk on the technical and security related issues towards biometric systems.
Speech is the natural mode of communication between humans. Human-to-machine interaction is gaining importance in the past few decades which demands the machine to be able to analyze, respond and perform tasks at the same speed as performed by human. This task is achieved by Automatic Speech Recognition (ASR) system which is typically a speech-to-text converter. In order to recognize the areas of further research in ASR, one must be aware of the current approaches, challenges faced by each and issues that needs to be addressed. Therefore, in this paper human speech production mechanism is discussed. The various speech recognition techniques and models are addressed in detail. The performance parameters that measure the accuracy of the system in recognizing the speech signal are described.
The use of wireless sensor networks has been increasing tremendously in the past decades mainly because of its applications in military, medicine, under water survey and various other fields. Depending on the applications the sensor nodes are placed in different areas and the data sensed will be sent to the base station. The process of transmitting and receiving data sensed by the sensor nodes continues till the sensors have battery life. This leads to generate data redundancy and reduces efficiency of the network. In order to overcome the limitations faced by the wireless sensor networks, the fusion of data known as data aggregation is introduced. In data aggregation, the data sensed by the various nodes are aggregated and sent to the base station as a single data packet. In this paper, a brief review on various data aggregation methods, challenges and issues are addressed. In addition to this, performance parameters of various data fusion methods to measure the efficiency of the network are discussed. The design of single aggregator models are easy compared to the multiple aggregator models. However, the security to most of the data fusion schemes is provided by using message authentication code. It also uses public keys and symmetric to achieve end to end or hop by hop encryptions.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.