The Biometric System Models with Secure Network Protocols in Open Network Environment

被引:0
|
作者
Shin, Woochang
Shin, Yong-Nyuo
机构
来源
SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS | 2008年
关键词
telebiometrics; biometric network protocol; authentication model; TLS extensions; AVISPA;
D O I
10.1109/SecTech.2008.44
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Biometric technology has beer? adopted in important elements of the national infrastructure, such as electronic passports and immigration control systems. However, the threats of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. We introduce nine telebiometrics authentication models and a biometric network protocol that is secure and compatible with international standards. We also prove the security of the suggested protocol using AVISPA tools.
引用
收藏
页码:155 / 158
页数:4
相关论文
共 50 条
  • [31] Using Network Traces to Generate Models for Automatic Network Application Protocols Diagnostics
    Holkovic, Martin
    Rysavy, Ondrej
    Polcak, Libor
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 1: DCNET, ICE-B, OPTICS, SIGMAP AND WINSYS (ICETE), 2019, : 37 - 47
  • [32] OpenEdge: A Dynamic and Secure Open Service Edge Network
    Kunz, Josh
    Becker, Christopher
    Jamshidy, Mohamed
    Kasera, Sneha
    Ricci, Robert
    Van der Merwe, Jacobus
    NOMS 2016 - 2016 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2016, : 257 - 264
  • [33] Content-based Image Hiding Method for Secure Network Biometric Verification
    Che, Xiangjiu
    Kong, Jun
    Dai, Jiangyan
    Gao, Zhanheng
    Qi, Miao
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2011, 4 (04) : 596 - 605
  • [34] Towards a secure and lightweight network function virtualisation environment
    Benedictis, Marco De
    Lioy, Antonio
    Smiraglia, Paolo
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2020, 11 (02) : 243 - 252
  • [35] Secure active network environment architecture: realization in switchware
    Alexander, D.Scott
    Arbaugh, William A.
    Keromytis, Angelos D.
    Smith, Jonathan M.
    IEEE Network, 12 (03): : 37 - 45
  • [36] A Cluster-Based Secure Active Network Environment
    CHEN Xiao-lin 1
    2.State Key Laboratory of Novel Software Technology
    WuhanUniversityJournalofNaturalSciences, 2005, (01) : 142 - 146
  • [37] A Secure Active Network Environment architecture: Realization in SwitchWare
    Alexander, DS
    Arbaugh, WA
    Keromytis, AD
    Smith, JM
    IEEE NETWORK, 1998, 12 (03): : 37 - 45
  • [38] - Experimental Platform for Usability Testing of Secure Medical Sensor Network Protocols
    Andersen, Jacob
    Lo, Benny
    Yang, Guang-Zhong
    2008 5TH INTERNATIONAL SUMMER SCHOOL AND SYMPOSIUM ON MEDICAL DEVICES AND BIOSENSORS, 2008, : 215 - +
  • [39] On automating the verification of secure ad-hoc network routing protocols
    Ta Vinh Thong
    Buttyan, Levente
    TELECOMMUNICATION SYSTEMS, 2013, 52 (04) : 2611 - 2635
  • [40] Secure Neural Network Prediction in the Cloud-Based Open Neural Network Service
    Huang, Wen
    Zhang, Ganglin
    Liao, Yongjian
    Peng, Jian
    Huang, Feihu
    Yang, Julong
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (02) : 659 - 673