Performance and usage of biometrics in a testbed environment for tactical purposes
Verett, Marianna J.
Netzer, David W.
MetadataShow full item record
Naval Postgraduate School's (NPS) Tactical Network Topology (TNT) experiments seek to develop, implement and identify sensor-unmanned vehicle network, and network-centric operations to assist DoD warfighters in the Global War on Terrorism (GWOT). Using biometric data for rapid identification of High Value Targets (HVT) in ground and Maritiime Interdiction Operations (MIO) is critical to the emeging special operations concept. The goal is to explore solutions and operational constraints associated with biometric data analysis and rapid identification by means of adhoc self forming sensor unmanned vehicle (UV) wireless networks. The objectives of this thesis are to look at how biometrics has performed in a testbed environment that is simulating a real special operations environment in theatre. This thesis is meant to explore and explain the biometrics process that was conducted on top of the tactical network and evaluate its performance. This thesis provided the process model for biometrics identification in the tactical networks environment. This thesis also evaluated the length of time that it took to transmit the fingerprint data from the field to the ABIS databvase, with an identification result then sent back to the field. The longest time that was observed was 70 minutes (using low bandwidth Satellite communications), while the shortest time was 4 minutes for reachback to ABIS and 2 minutes for a local database.
Showing items related by title, author, creator and subject.
Reliability of iris recognition as a means of identity verification and future impact on transportation worker identification credential McLaren, Simon R. (Monterey, California. Naval Postgraduate School, 2008-03);The Department of Homeland Security is deploying the Transportation Worker Identification Credential (TWIC) to U.S. ports to help ensure only authorized individuals having undergone background checks have access to secure ...
Roth, Christopher (Monterey, California. Naval Postgraduate School, 2002-06);Password-based user identification and authentication in a network-based operating system generally relies upon a single file that contains user information and the encoded or hashed representations of each users' password. ...
Homeland Security Affairs Journal, Supplement - 2013: IEEE 2012 Conference on Technology for Homeland Security: Best Papers Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2013-04);IEEE Supplement 2013. Supplement: IEEE 2012 Conference on Technology for Homeland Security: Best Papers Homeland Security Affairs is proud to publish the best papers from the IEEE 2012 Conference on Technology for Homeland ...