Measuring and mitigating targeted biometric impersonation
نویسندگان
چکیده
This study is concerned with the reliability of biometric verification systems when used in forensic applications. In particular, when such systems are subjected to targeted impersonation attacks. The authors expand on the existing work in targeted impersonation, focusing on how best to measure the reliability of verification systems in forensic contexts. It identifies two scenarios in which targeted impersonation effects may occur: (i) the forensic investigation of criminal activity involving identity theft; and (ii) implicit targeting as a result of the forensic investigation process. Also, the first partial countermeasure to such attacks is presented. The countermeasure uses client-specific Z-score normalisation to provide a more consistent false acceptance rate across all enrolled subjects. This reduces the effectiveness of targeted impersonation without impairing the systems accuracy under random zero-effort attacks.
منابع مشابه
Robust biometric-based user authentication scheme for wireless sensor networks
Wireless sensor networks (WSNs) are applied widely a variety of areas such as realtime traffic monitoring, measurement of seismic activity, wildlife monitoring and so on. User authentication in WSNs is a critical security issue due to their unattended and hostile deployment in the field. In 2010, Yuan et al. proposed the first biometric-based user authentication scheme for WSNs. However, Yoon e...
متن کاملELITE: zEro Links Identity managemenT systEm
Résumé Modern day biometric systems, such as those used by governments to issue biometric-based identity cards, maintain a deterministic link between the identity of the user and her biometric information. However, such a link brings in serious privacy concerns for the individual. Sensitive information about the individual can be retrieved from the database by using her biometric information. I...
متن کاملComments on He et al.’s Robust Biometric-based User Authentication Scheme for WSNs
In order to guarantee secure communication for wireless sensor networks (WSNs), many user authentication schemes have successfully drawn researchers’ attention and been studied widely. In 2012, He et al. proposed a robust biometric-based user authentication scheme for WSNs. However, this paper demonstrates that He et al.’s scheme has some drawbacks: poor reparability problem, user impersonation...
متن کاملAn Efficient and Reliable Three-Entity Remote User and Server Authentication Technique
Authentication of remote user and server is a great research challenge in today’s advanced wired and wireless communication. Recently Das proposed a flexible remote system authentication using smart card [7]. Xu et al. proved that Khan et al.’s fingerprint based remote user authentication is vulnerable to the impersonation and parallel session attack [10]. In this paper, we show that Das’s sche...
متن کاملImproving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks
User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authenticati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IET Biometrics
دوره 3 شماره
صفحات -
تاریخ انتشار 2014