Secured Offline Authentication on Industrial Mobile Robots Using Biometric Data

被引:0
|
作者
Haas, Sarah [1 ]
Ulz, Thomas [2 ]
Steger, Christian
机构
[1] Infineon Technol Austria AG, Dev Ctr Graz, Graz, Austria
[2] Graz Univ Technol, Inst Tech Informat, Graz, Austria
来源
关键词
D O I
10.1007/978-3-030-00308-1_12
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The increased usage of mobile robots in the industrial context entails higher safety risks for employees on the production floor. To enable safety, the usage of security concepts on industrial mobile robots is essential. One step towards security is authentication that is necessary to prevent unauthorized people from manipulating an industrial mobile robot's software or configuration. Traditional authentication schemes that utilize username and password are not feasible for industrial mobile robots as either (a) a remote connection would be necessary to check the credentials or (b) the credentials need to be checked locally on the robot. Remote connections are problematic due to connectivity problems similar to them at RoboCup Logistics League competitions. If the credentials need to be checked on the robot, the usernames and passwords of all authorized people need to be stored and maintained there. As both possibilities are not feasible for industrial mobile robots, we propose an offline authentication approach that uses biometric data to authenticate a user on a mobile robot. The approach uses expiring passwords and a smart card to authenticate authorized people on the mobile robot. The smart card is equipped with a fingerprint reader to check that only authorized people are allowed to authenticate at a mobile robot. To show that the approach is able to provide secured authentication, a threat analysis is performed.
引用
收藏
页码:143 / 155
页数:13
相关论文
共 50 条
  • [1] A Secured Offline Authentication Approach for Industrial Mobile Robots
    Haas, Sarah
    Wallner, Andreas
    Toegl, Ronald
    Ulz, Thomas
    Steger, Christian
    [J]. 2017 13TH IEEE CONFERENCE ON AUTOMATION SCIENCE AND ENGINEERING (CASE), 2017, : 308 - 313
  • [2] IT and SLT Characterizations of Secured Biometric Authentication Systems
    Schmid, Natalia A.
    Wechsler, Harry
    [J]. MEDIA FORENSICS AND SECURITY II, 2010, 7541
  • [3] Biometric Iris Recognition using Sobel Edge Detection for Secured Authentication
    Vishwakarma, Nisha
    Patel, Vinod
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMMUNICATION AND COMPUTATIONAL TECHNIQUES (ICCT), 2019, : 119 - 123
  • [4] A Secured and Reliable Biometric User Authentication Using Keystroke Template Method
    Visumathi, J.
    Jayarin, P. Jesu
    [J]. JOURNAL OF APPLIED SECURITY RESEARCH, 2015, 10 (03) : 375 - 384
  • [5] Multimodal Biometric-Based Authentication with Secured Templates
    Choudhary, Swati K.
    Naik, Ameya K.
    [J]. INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2021, 21 (02)
  • [6] Authentication system for biometric applications using mobile devices
    Hu, Jian-feng
    Mu, Zhen-dong
    [J]. FRONTIERS OF MECHANICAL ENGINEERING AND MATERIALS ENGINEERING II, PTS 1 AND 2, 2014, 457-458 : 1224 - 1227
  • [7] Biometric Authentication on Mobile Devices
    Mayron, Liam M.
    [J]. IEEE SECURITY & PRIVACY, 2015, 13 (03) : 70 - 73
  • [8] Secure remote authentication using biometric data
    Boyen, X
    Dodis, Y
    Katz, J
    Ostrovsky, R
    Smith, A
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 147 - 163
  • [9] Securing Healthcare Data Using Biometric Authentication
    Jahan, Sharmin
    Chowdhury, Mozammel
    Islam, Rafiqul
    Chaudhry, Junaid
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 239 : 123 - 132
  • [10] A Haar casecade based Biometric Approach for Ensuring Secured Authentication
    Vijayapriya, V.
    Krishnan, Bala R.
    Kumar, Rajesh N.
    Raajan, N. R.
    Meganathan, S.
    [J]. RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2016, 7 (04): : 1467 - 1471