W. Gareth J. Howells
University of Kent
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by W. Gareth J. Howells.
2008 Bio-inspired, Learning and Intelligent Systems for Security | 2008
Sanaul Hoque; Michael C. Fairhurst; W. Gareth J. Howells
In traditional cryptosystems, user authentication is based on the possession of secret keys/tokens. Such keys can be forgotten, lost, stolen, or may be illegally shared, but an ability to relate a cryptographic key to biometric data can enhance the trustworthiness of a system. In this paper, we demonstrate how biometric keys can be generated directly from live biometrics, under certain conditions, by partitioning feature space into subspaces and partitioning these into cells, where each cell subspace contributes to the overall key generated. We evaluate the proposed scheme on real biometric data, representing both genuine samples and attempted imitations. Experimental results then demonstrate the extent to which the proposed technique can be implemented reliably in possible practical scenarios.
Software and Systems Modeling | 2007
David H. Akehurst; W. Gareth J. Howells; Klaus D. McDonald-Maier
A significant current software engineering problem is the conceptual mismatch between the abstract concept of an association as found in modelling languages such as UML and the lower level expressive facilities available in object-oriented languages such as Java. This paper introduces some code generation patterns that aid the production of Java based implementations from UML models. The work is motivated by a project to construct model driven development tools in support of the construction of embedded systems. This involves the specification and implementation of a number of meta-models (or models of languages). Many current UML oriented tools provide code generation facilities, in particular the generation of object-oriented code from class diagrams. However, many of the more complex aspects of class diagrams, such as qualified associations are not supported. In addition, several concepts introduced in UML version 2.0 are also not supported.The aim of the work presented in this paper is to develop a number of code generation patterns that allow us to support the automatic generation of Java code from UML class diagrams that support these new and complex association concepts. These patterns significantly improve the code generation abilities of UML tools, providing a useful automation facility that bridges the gap between the concept of an association and lower level object-oriented programming languages.
adaptive hardware and systems | 2009
Evangelos Papoutsis; W. Gareth J. Howells; Andrew B. T. Hopkins; Klaus D. McDonald-Maier
This paper investigates the practicalities of combining values derived from measurable features of given integrated electronic circuits in order to derive a robust encryption key, a technique termed ICmetrics. Specifically the paper explores options for the precise techniques required to combine the derived feature values in order to ensure key stability. Key stability is an essential component of any encryption system but this must be combined with a guarantee of key diversity between devices.
Electronic Communication of The European Association of Software Science and Technology | 2008
David H. Akehurst; Steffen Zschaler; W. Gareth J. Howells
ion / Binding
IEEE Transactions on Information Forensics and Security | 2015
Xiaojun Zhai; Kofi Appiah; Shoaib Ehsan; W. Gareth J. Howells; Huosheng Hu; Dongbing Gu; Klaus D. McDonald-Maier
A potential threat to embedded systems is the execution of unknown or malicious software capable of triggering harmful system behavior, aimed at theft of sensitive data or causing damage to the system. Commercial off-the-shelf embedded devices, such as embedded medical equipment, are more vulnerable as these type of products cannot be amended conventionally or have limited resources to implement protection mechanisms. In this paper, we present a self-organizing map (SOM)-based approach to enhance embedded system security by detecting abnormal program behavior. The proposed method extracts features derived from processors program counter and cycles per instruction, and then utilises the features to identify abnormal behavior using the SOM. Results achieved in our experiment show that the proposed method can identify unknown program behaviors not included in the training set with over 98.4% accuracy.
Information Management & Computer Security | 2012
Weiguo Sheng; W. Gareth J. Howells; Michael C. Fairhurst; Farzin Deravi; Shengyong Chen
Purpose – Biometric authentication, which requires storage of biometric templates and/or encryption keys, raises a matter of serious concern, since the compromise of templates or keys necessarily compromises the information secured by those keys. To address such concerns, efforts based on dynamic key generation directly from the biometrics have recently emerged. However, previous methods often have quite unacceptable authentication performance and/or small key spaces and therefore are not viable in practice. The purpose of this paper is to propose a novel method which can reliably generate long keys while requires storage of neither biometric templates nor encryption keys.Design/methodology/approach – This proposition is achieved by devising the use of fingerprint orientation fields for key generation. Additionally, the keys produced are not permanently linked to the orientation fields, hence, allowing them to be replaced in the event of key compromise.Findings – The evaluation demonstrates that the propo...
2008 Bio-inspired, Learning and Intelligent Systems for Security | 2008
Karl Harmer; Weiguo Sheng; W. Gareth J. Howells; Michael C. Fairhurst; Farzin Deravi
With the increasing employment of biometric authentication systems worldwide, there has been significant concern over the security of stored biometric templates. In this paper, a solution to this problem employing a fuzzy vault fingerprint smartcard implementation, unlocked via an orientation-based feature vector, is presented. The fuzzy vault contains an unknown key which can be used either for identification or for file encryption/decryption.
2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security (BLISS 2007) | 2007
W. Gareth J. Howells; Klaus D. McDonald-Maier; T. Binzegger; M. P. Young
Constructive type theory (CTT) is both a formal logic and a programming language which contains inherent benefits both in terms of formality and program correctness and in the potential for efficient concurrent execution. In contrast, the mammalian visual cortex represents a naturally occurring visual processing system capable of the rapid concurrent evaluation of complex data domains. The efficient exploitation of a merger between these two systems would represent major advantages in such diverse fields as machine reading, automated guidance, navigation and, significantly, biometrically based security identification systems. The current paper explores the possibilities of achieving such a merger and the technological challenges and opportunities it would represent in constructing a practical remote biometric based identification system.
ieee/sice international symposium on system integration | 2016
V. Canoz; Michael Gillham; Paul Oprea; P. Chaumont; A. Bodin; P. Laux; M. Lebigre; W. Gareth J. Howells; Konstantinos Sirlantzis
Literature is abound with smart wheelchair platforms of various developments, yet to date there has been little technology to find its way to the market place. Many trials and much research has taken place over the last few decades however the end user has benefited precious little. There exists two fundamental difficulties when developing a smart powered wheelchair assistive system, the first is need for the system to be fully compatible with all of the manufacturers, and the second is to produce a technology and business model which is marketable and therefore desirable to the manufacturers. However this requires the researchers to have access to hardware which can be used to develop practical systems which will seamlessly integrate and communicate with existing manufacturers wheelchair systems. We have developed a low-cost embedded system which integrates with 95% of the powered wheelchair controller market; our system allows researchers to access the low level embedded system with more powerful computational devices running sophisticated software enabling rapid development of algorithms and techniques. When they have been evaluated they can be easily ported to the embedded processor for real-time evaluation and clinical trial.
european conference on model driven architecture foundations and applications | 2008
Stephen K. Wood; David H. Akehurst; W. Gareth J. Howells; Klaus D. McDonald-Maier
With the continuing advances in semiconductor technology driving the rise in complexity of electronic embedded systems, there is a demand for the development of high level modelling environments for computer-aided design. The modelling of highly repetitive structures in graphical form poses a particular challenge if a hierarchical approach is not adopted. This paper proposes a mechanism for describing such component structures in a compact form based upon extensions of the Array Oriented Language (Array-OL). An example is given as to how the structure described is subsequently mapped into VHDL code.