Enhancing security and privacy in biometrics-based authentication systems

被引:872
|
作者
Ratha, NK [1 ]
Connell, JH [1 ]
Bolle, RM [1 ]
机构
[1] IBM Res Div, Thomas J Watson Res Ctr, Hawthorne, NY 10532 USA
关键词
D O I
10.1147/sj.403.0614
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. It is important that such biometrics-based authentication systems be designed to withstand attacks when employed in security-critical applications, especially in unattended remote applications such as e-commerce. In this paper we outline the inherent strengths of biometrics-based authentication, identify the weak links in systems employing biometrics-based authentication, and present new solutions for eliminating some of these weak links. Although, for illustration purposes, fingerprint authentication is used throughout, our analysis extends to other biometrics-based methods.
引用
收藏
页码:614 / 634
页数:21
相关论文
共 50 条
  • [1] Security protocols for biometrics-based cardholder authentication in smartcards
    Rila, L
    Mitchell, CJ
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 254 - 264
  • [2] Denial of access in biometrics-based authentication systems
    Rila, L
    [J]. INFRASTRUCTURE SECURITY, PROCEEDINGS, 2002, 2437 : 19 - 29
  • [3] Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
    Gunasinghe, Hasini
    Bertino, Elisa
    [J]. NETWORK AND SYSTEM SECURITY, 2014, 8792 : 389 - 408
  • [4] Evaluation techniques for biometrics-based authentication systems (FRR)
    Bolle, RM
    Pankanti, S
    Ratha, NK
    [J]. 15TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOL 2, PROCEEDINGS: PATTERN RECOGNITION AND NEURAL NETWORKS, 2000, : 831 - 837
  • [5] Biometrics-based authentication: a new approach
    Sui, Yan
    Zou, Xukai
    Du, Eliza Yingzi
    [J]. 2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
  • [6] Enhancing Security and Privacy in Biometrics Based Authentication System Using Multiple Secret Sharing
    Patil, Sonali
    Tajane, Kapil
    Sirdeshpande, Janhavi
    [J]. 1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 190 - 194
  • [7] A note on biometrics-based authentication with portable device
    Ohtsuka, Shinsuke
    Kawamoto, Satoshi
    Takano, Shigeru
    Baba, Kensuke
    Yasuura, Hiroto
    [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 99 - 102
  • [8] On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
    Phan, RCW
    Goi, BM
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, VOL 4, PROCEEDINGS, 2005, 3483 : 1065 - 1074
  • [9] Security Improvement on a Biometrics-Based Authentication Protocol for Multi-server Environment
    Gu, Yi
    Li, Shengqiang
    [J]. 2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 1322 - 1327
  • [10] A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information Systems
    Yan, Xiaopeng
    Li, Weiheng
    Li, Ping
    Wang, Jiantao
    Hao, Xinhong
    Gong, Peng
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (05)