Integrating Cancellable Biometrics with Geographical Location for Effective Unattended Authentication of Users of Mobile Devices

نویسندگان

  • Hisham Al-Assam
  • Ihsan Alshahib Lami
  • Torben Kuseler
چکیده

Over the past decade, security and privacy concerns about the growing deployment of biometrics as a proof of identity have motivated researchers to investigate solutions such as cancellable biometrics to enhance the security of biometric systems. However, the open nature of newly emerged mobile authentication scenarios has made these solutions impractical and necessitated the need for new innovative solutions. This paper proposes an effective authentication scheme for remote users on mobile-handsets. The proposal incorporates cancellable biometrics with actual mobile-handset location to produce a one-time authentication token. For added security, the location is obtained and verified via two independent sources, and the authentication token is robustly stamped by the transaction time to guarantee the liveliness. This makes the proposed scheme immune against replay and other remote fraudulent attacks. Trials and simulations based on using biometric datasets and real GPS/Cellular measurements show the viability of our scheme for unattended and mobile authentication. 

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

Biometrics for Authentication on Mobile Devices

Mobile devices are rapidly becoming the most popular user end computing and networking device. Mobile devices are often used to access and store personal information. Due to their size and portability, they are a common target for thieves and malicious activity. Unauthorized authentication of mobile devices can result in a great deal of damage to the legitimate owner. However, securing mobile d...

متن کامل

Classifier ensembles and optimization techniques to improve the performance of cancellable fingerprint

The main aim of biometric-based identification systems is to automatically recognize individuals based on their physiological and/or behavioural characteristics such as fingerprint, face, hand-geometry, among others. These systems offer several advantages over traditional forms of identity protection. However, there are still some important aspects that need to be addressed in these systems. Th...

متن کامل

Touchscreen Biometrics Across Multiple Devices

As the cost of mobile devices decreases, it is becoming increasingly common for users to own more than one. The presence of multiple pieces of mobile technology complicates the question of how to secure them. Utilizing different authentication solutions on different devices may create usability challenges, while using the same authentication technique on more than one device raises the possibil...

متن کامل

Transparent Handwriting Verification for Mobile Devices

The popularity of mobile devices and the evolving nature of the services and information they can delivery make them increasingly desirable targets for misuse. The ability to provide effective authentication of the user becomes imperative if protection against misuse of personally and financially sensitive information is to be provided. Traditional measures, such as the PIN, although commensura...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JCM

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2013