ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Capacity Planning for Scalable Fingerprint Authentication
Cited 0 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Byung Kwan Park, Dae Sung Moon, Yong Wha Chung, Jin Won Park
Issue Date
2006-10
Citation
International Conference on Knowledge-Based and Intelligent Information and Engineering Systems (KES) 2006 (LNCS 4251), v.4251, pp.906-915
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1007/11892960_109
Abstract
As the fingerprint authentication technique becomes widely used at close range such as for the door lock, it will be applied for the remote user authentication as the next step. For large-scale remote user authentication services such as board control using bio-passport, the real-time as well as the security/privacy requirements should be satisfied. However, nothing is known about the collective performance of the fingerprint verification and the authentication protocol on the client-server model. In this paper, we analyzed the collective performance of the task assignment of the fingerprint authentication on the client-server model. To obtain the characteristics of the workload of both the fingerprint verification and the authentication protocol, we first consider three types of primitive operations on the client and the server; fingerprint verification module, cryptography module and communication module. Then, based on these primitive operations, the workload of each scenario of the task assignment was applied to the M/D/1 queueing model representing the client-server model, and the collective performance of each scenario was analyzed quantitatively. The modeling results showed that the server could handle the lowest level of workload when the server does decryption, verification and matching. On the contrary, the server can handle 9.57 times heavier workload when the clients do decryption, verification and matching. The modeling results also showed that the workload manageable by the server depends largely on the communication setup time. © Springer-Verlag Berlin Heidelberg 2006.