A new framework for constructing matching algorithms secure against the wolf attack in biometric authentication systems
نویسندگان
چکیده
In [4], we proposed a theoretical framework to construct matching algorithms for any biometric authentication systems. In this paper, we will introduce the results in [4] and add some comments on the accuracy (FAR and FRR) of our proposed matching algorithms (Lemma 6, 7, 8). Conventional matching algorithms are not necessarily secure against strong intentional impersonation attacks such as wolf attacks. The wolf attack is an attempt to impersonate a genuine user by presenting a “wolf” to a biometric authentication system without the knowledge of a genuine user’s biometric sample. A “wolf” is a sample which can be accepted as a match with multiple templates. The wolf attack probability (WAP) is the maximum success probability of the wolf attack, which was proposed by Une, Otsuka, Imai, as a measure for evaluating security of biometric authentication systems [9], [10]. In [4], we presented a principle for construction of secure matching algorithms against the wolf attack for any biometric authentication systems. The ideal matching algorithm determines a threshold for each input value depending on the probability distribution of the (Hamming) distances. Then we showed that if the information about the probability distribution for each input value is perfectly given, then our matching algorithm is secure against the wolf attack (Theorem 9, 10) [4]. Our generalized matching algorithm gives a theoretical framework to construct secure matching algorithms. How lower WAP is achievable depends on how accurately the entropy is estimated. Then there is a trade-off between the efficiency and the achievable WAP . Almost every conventional matching algorithm employs a fixed threshold and hence it can be regarded as an efficient but insecure instance of our theoretical framework. Daugman’s algorithm proposed in [3] can also be regarded as a non-optimal instance of our framework.
منابع مشابه
Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems
In this paper, we propose a theoretical framework to construct matching algorithms for any biometric authentication systems. Conventional matching algorithms are not necessarily secure against strong intentional impersonation attacks such as wolf attacks. The wolf attack is an attempt to impersonate a genuine user by presenting a “wolf” to a biometric authentication system without the knowledge...
متن کاملWolf Attack Probability: A New Security Measure in Biometric Authentication Systems
This paper will propose a wolf attack probability (WAP ) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wol...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملSecure Biometric Systems
SECURE BIOMETRIC SYSTEMS By Umut Uludag Traditional personal authentication systems that are based on knowledge (e.g., password) or physical tokens (e.g., ID card) are not able to meet strict security performance requirements of a number of modern applications. These applications generally make use of computer networks (e.g., Internet), affect a large portion of population, and control financia...
متن کاملDetection of PARD Attack on Secure Authentication System Based on Fingerprint Impression
The trustworthy information security mechanisms are required to contend with the rising atrociousness of identity theft in the cyber and electronic society, the biometric like fingerprint authentication can be used to ensure that only the legitimate user can access to intended system. Although the biometric authentication systems are very secured but the biometric systems are also exposed to a ...
متن کامل