Using Mobile Agents for Secure Biometric Authentication
نویسندگان
چکیده
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastructure. When the user authentication procedure involves personal devices, the Multi Agent System model helps in the distribution of data and algorithms thanks to a better partitioning of roles and responsibilities, enhancing robustness to eavesdropping and tampering by properly moving agents around the system itself. The system architecture is based on specialized agents tied to the different devices, which safely communicate using both symmetric encryption for messages and asymmetric encryption to check principals’ roles. Moreover, agents can carry on biometric parameters matching algorithms, bringing computation on those nodes with enough computing power. A complete authentication protocol has been developed and two different demos have been devised and tested. They differ for the tasks assigned to the mobile devices in use. Experiments show that agent capabilities, together with their power of migration, help in maintaining a higher level of security when mobile devices are involved.
منابع مشابه
A Robust Biometric Authentication and PIN Distribution Technique for Secure Mobile Commerce Applications
In a mobile emerging world, user authentication, service provider authentication and security is very important in mobile commerce. User authentication is performed by using fingerprint based biometric methodology. Existing system used for Mobile purchasing/payment services in handheld devices does not analyze fingerprint matching and feature extraction techniques in an efficient way. Also the ...
متن کاملA Multifactor Security Protocol for Wireless Payment Secure Web Authentication Using Biometric Characteristics
This authentication technique uses a best approach for secure web transaction. It uses a Biometric property of user for authentication and SMS (Short Message Service) to enforce an extra security level along with the traditional Login/password system. Biometric properties are needed when a user wants a transaction then the user gives their fingerprint information. In this technique uses a encry...
متن کاملA Biometric Authentication Protocol for 3G Mobile Systems: Modelled and Validated Using CSP and Rank Functions
This paper describes a protocol, called BIO3G, for establishing secure and privacy friendly biometric authentication in 3G mobile environments. BIO3G provides real end-to-end strong user authentication to the mobile operator, requiring no storing or transferring of biometric data and eliminating the need for biometric enrolment and administration procedures, which are time-consuming for the use...
متن کاملMobile Multimodal Biometric System for Security
Among our huge life requirements, the most important requirement which has a vital role in our daily life is the security. Recently using biometrics in the security systems has a wide range of research interests since they provide systems have more efficient, reliable, and secure than the others. In the present time researches for mobile biometric devices are provided with a fingerprint only wh...
متن کاملTemplate Protection for Biometric Gait Data
Biometric gait recognition is a well suited method for authentication on mobile devices as it is unobtrusive and concurrent. Hence, in contrast to PIN authentication it is no extra-effort for the user. The characteristic gait of a subject can be recorded using accelerometers which are nowadays already contained in many mobile devices. From this data biometric feature vectors can be extracted an...
متن کامل