356 research outputs found
Non-Intrusive Subscriber Authentication for Next Generation Mobile Communication Systems
Merged with duplicate record 10026.1/753 on 14.03.2017 by CS (TIS)The last decade has witnessed massive growth in both the technological development, and
the consumer adoption of mobile devices such as mobile handsets and PDAs. The recent
introduction of wideband mobile networks has enabled the deployment of new services
with access to traditionally well protected personal data, such as banking details or
medical records. Secure user access to this data has however remained a function of the
mobile device's authentication system, which is only protected from masquerade abuse by
the traditional PIN, originally designed to protect against telephony abuse.
This thesis presents novel research in relation to advanced subscriber authentication for
mobile devices. The research began by assessing the threat of masquerade attacks on
such devices by way of a survey of end users. This revealed that the current methods of
mobile authentication remain extensively unused, leaving terminals highly vulnerable to
masquerade attack. Further investigation revealed that, in the context of the more
advanced wideband enabled services, users are receptive to many advanced
authentication techniques and principles, including the discipline of biometrics which
naturally lends itself to the area of advanced subscriber based authentication.
To address the requirement for a more personal authentication capable of being applied
in a continuous context, a novel non-intrusive biometric authentication technique was
conceived, drawn from the discrete disciplines of biometrics and Auditory Evoked
Responses. The technique forms a hybrid multi-modal biometric where variations in the
behavioural stimulus of the human voice (due to the propagation effects of acoustic
waves within the human head), are used to verify the identity o f a user. The resulting
approach is known as the Head Authentication Technique (HAT).
Evaluation of the HAT authentication process is realised in two stages. Firstly, the
generic authentication procedures of registration and verification are automated within a
prototype implementation. Secondly, a HAT demonstrator is used to evaluate the
authentication process through a series of experimental trials involving a representative
user community. The results from the trials confirm that multiple HAT samples from
the same user exhibit a high degree of correlation, yet samples between users exhibit a
high degree of discrepancy. Statistical analysis of the prototypes performance realised
early system error rates of; FNMR = 6% and FMR = 0.025%. The results clearly
demonstrate the authentication capabilities of this novel biometric approach and the
contribution this new work can make to the protection of subscriber data in next
generation mobile networks.Orange Personal Communication Services Lt
Recommended from our members
A COMPARATIVE ANALYSIS OF DEVICES VIA THE BLUETOOTH PROTOCOL IN A TIME SERIES ANALYSIS
The utilization of the Bluetooth protocol has provided many with the seamless transmission of data to multiple devices. Given its versatility and being an efficient process of connectivity, it has become one of the preferred methods of wireless connections. Despite this, an aspect of the Bluetooth function is still vulnerable to being exploited by having the data transmission stolen. This project answered the following questions: “How does one reduce the vulnerability by comparing normal and abnormal Bluetooth data?”, “How does one identify outlying variables within the data?” and “How can we improve the Bluetooth function?”. This project relied on previous research based on establishing patterns of life in Bluetooth devices in order to categorize such devices using their data. By applying a similar approach, this research is focused on creating a methodology of capturing, detecting, and analyzing normal and abnormal Bluetooth data. By creating two scenarios involving Bluetooth devices, one where a normal transmission happens and another where a Bluetooth Hijacking occurs, comparable scans were made and then compared. The findings were as follows: The analysis shows it is possible to categorize the Bluetooth devices and attribute their data to create a pattern of life. By comparing normal and abnormal Bluetooth data, vulnerability can be reduced by detecting abnormal data much sooner and thus alerting the user of any attacks. To identify the outlying variables, certain characteristics within the Bluetooth packet in Wireshark can be selected and shown in the RStudio graph. Having these variables displayed creates a better visual to further analyze the data captured and identify any outlying variables. This project also introduced methods that the Bluetooth function can be improved on by including the introduction of more pin inputs when entering Bluetooth networks, as well as the idea to introduce a feature that authenticates the termination of a Bluetooth connection. The conclusion of this project revealed that these captures and analysis allow for establishing a pattern of life of what would be considered normal and abnormal data within the Bluetooth IoT and can be expanded into other Bluetooth devices
Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems
Caller ID spoofing is a global industry problem and often acts as a critical
enabler for telephone fraud. To address this problem, the Federal
Communications Commission (FCC) has mandated telecom providers in the US to
implement STIR/SHAKEN, an industry-driven solution based on digital signatures.
STIR/SHAKEN relies on a public key infrastructure (PKI) to manage digital
certificates, but scaling up this PKI for the global telecom industry is
extremely difficult, if not impossible. Furthermore, it only works with
IP-based systems (e.g., SIP), leaving the traditional non-IP systems (e.g.,
SS7) unprotected. So far the alternatives to the STIR/SHAKEN have not been
sufficiently studied. In this paper, we propose a PKI-free solution, called
Caller ID Verification (CIV). CIV authenticates the caller ID based on a
challenge-response process instead of digital signatures, hence requiring no
PKI. It supports both IP and non-IP systems. Perhaps counter-intuitively, we
show that number spoofing can be leveraged, in conjunction with Dual-Tone
Multi-Frequency (DTMF), to efficiently implement the challenge-response
process, i.e., using spoofing to fight against spoofing. We implement CIV for
VoIP, cellular, and landline phones across heterogeneous networks (SS7/SIP) by
only updating the software on the user's phone. This is the first caller ID
authentication solution with working prototypes for all three types of
telephone systems in the current telecom architecture. Finally, we show how the
implementation of CIV can be optimized by integrating it into telecom clouds as
a service, which users may subscribe to.Comment: 25 pages, 12 figures, 2 table
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems
Abstract. In this paper we propose an architecture which combines watermarking with traditional cryptographic key agreement protocols to establish an authenticated or encrypted channel in teleconferencing systems. Technically the proposed method embeds messages of the key agreement protocol within an audio or video stream and is based on the assumption that the human communication partners can recognize each other easily; the watermark establishes a close coupling between the cryptographic key exchange messages and the media stream. We argue that the security of the scheme is based on a yet unexplored security property of digital watermarks; furthermore we present preliminary research results that suggest that this property holds in standard watermarking schemes
Security Analysis of Multi-Factor Authentication Security Protocols
Multi-Factor Authentication (MFA) is being increasingly adopted by on- line services in order to achieve an adequate level of security. MFA is based on security protocols, called MFA protocols, that integrate the use of credentials with additional identity proofs, called authentication factors (based on knowledge, possession or inherence). The authentication factors are provided through specific objects, called authenticators (e.g., hardware token). To date, MFA has been widely adopted in the most diverse security-critical application scenarios (e.g., online banking, eHealth). Various solutions have been proposed, leveraging MFA protocols which employ different kinds of authenticators and providing different user experience. When considering various MFA protocols, few questions may arise. How do MFA protocols differ in terms of (i) level of protection, (ii) compliance w.r.t. current regulations and (iii) complexity for the user?
To answer the question concerning the level of protection, traditional verification techniques for security protocols require a formal specification of the protocol under analysis. However, as a matter of fact, several service providers employ ad-hoc MFA protocols and do not disclose their internals. In addition, classical attacker models, such as the Dolev-Yao adversary, hardly apply. Hence, new protocol modeling techniques and new attacker models should be investigated.
Concerning regulations, public and private authorities have introduced directives and guidelines for the design of MFA protocols (e.g., recommendations for online payment services from the European Banking Authority, and the guidelines from NIST about the digital identity management through MFA). In principle, these initiatives aim to guide the design of more secure and usable MFA protocols, but there is no evidence that the existing MFA protocols actually comply with the aforementioned regulations. Thus, a novel methodology is needed to provide such an evidence.
The ease-of-use is a relevant aspect to be considered in the analysis of an MFA protocol. Indeed, the use of multiple authenticators in the execution of an MFA protocol can negatively affect user experience, which can have an impact on its security as well. However, none of the research works managed to measure the usability of a conspicuous number of MFA protocols design. Hence, a methodology for evaluating the ease-of-use of an MFA protocol should be identified.
In this work, we propose a framework to analyze MFA protocols, which does not rely on the implementation details, being able to assess the (i) level of protection, (ii) compliance w.r.t. current regulations and (iii) complexity for the user.
To this aim, we define a specification language which is compatible with the typical (amount of) information publicly released by service providers on the employed MFA protocols. For what concerns the security analysis, we propose an evaluation of MFA protocols in terms of resistance against a set of attacker models, tailored for the specific case of MFA protocols. For what concerns the regulatory aspects and best practices, we include the possibility to evaluate a protocol in terms of compliance with a customizable set of requirements and best practices. Furthermore, for what concerns the ease-of-use of an MFA protocol, we propose a new metric, called complexity, for evaluating a protocol in terms of efforts that an user is required to perform during its execution.
The aforementioned framework has been then implemented in a working tool, MuFASA, allowing (even non-expert) users to model an MFA protocol and to automatically analyze it.
Finally, the presented framework has been applied on some selected use cases. First, it has been employed in the early stages of the design of a novel MFA protocol, integrated into the Citizens\u2019 Clinical Record platform developed in the Trentino region (Italy). Then, it has been used for performing a latitudinary study on online banking services, allowing us to model and analyze more than 150 MFA protocols employed by banks all over the world
Advanced user authentification for mobile devices
Access to the full-text thesis is no longer available at the author's request, due to 3rd party copyright restrictions. Access removed on 28.11.2016 by CS (TIS).Metadata merged with duplicate record ( http://hdl.handle.net/10026.1/1101 - now deleted) on 20.12.2016 by CS (TIS).Recent years have witnessed widespread adoption of mobile devices. Whereas initial
popularity was driven by voice telephony services, capabilities are now broadening to
allow an increasing range of data orientated services. Such services serve to extend the
range of sensitive data accessible through such devices and will in turn increase the
requirement for reliable authentication of users.
This thesis considers the authentication requirements of mobile devices and proposes novel
mechanisms to improve upon the current state of the art. The investigation begins with an
examination of existing authentication techniques, and illustrates a wide range of
drawbacks. A survey of end-users reveals that current methods are frequently misused and
considered inconvenient, and that enhanced methods of security are consequently required.
To this end, biometric approaches are identified as a potential means of overcoming the
perceived constraints, offering an opportunity for security to be maintained beyond pointof-
entry, in a continuous and transparent fashion.
The research considers the applicability of different biometric approaches for mobile
device implementation, and identifies keystroke analysis as a technique that can offer
significant potential within mobile telephony. Experimental evaluations reveal the potential
of the technique when applied to a Personal Identification Number (PIN), telephone
number and text message, with best case equal error rates (EER) of 9%, 8% and 18%
respectively. In spite of the success of keystroke analysis for many users, the results
demonstrate the technique is not uniformly successful across the whole of a given
population. Further investigation suggests that the same will be true for other biometrics,
and therefore that no single authentication technique could be relied upon to account for all
the users in all interaction scenarios. As such, a novel authentication architecture is
specified, which is capable of utilising the particular hardware configurations and
computational capabilities of devices to provide a robust, modular and composite
authentication mechanism. The approach, known as IAMS (Intelligent Authentication
Management System), is capable of utilising a broad range of biometric and secret
knowledge based approaches to provide a continuous confidence measure in the identity of
the user. With a high confidence, users are given immediate access to sensitive services
and information, whereas with lower levels of confidence, restrictions can be placed upon
access to sensitive services, until subsequent reassurance of a user's identity.
The novel architecture is validated through a proof-of-concept prototype. A series of test
scenarios are used to illustrate how IAMS would behave, given authorised and impostor
authentication attempts. The results support the use of a composite authentication approach
to enable the non-intrusive authentication of users on mobile devices.Orange Personal Communication Services Ltd
Advancing User Authentication and Access Management
In order for online systems to transact business or exchange other sensitive information, there must be an environment where the parties involved can verify that the other is who they claim to be. Authentication mechanisms provide this verification process, thereby, improving confidence in the confidentiality and integrity of communications.
However, attackers can exploit this trust if they are able to successfully impersonate a legitimate user and gain access to the system with all the rights and privileges of that user. One particularly difficult class of attacks of this sort involves an attacker inserting themselves between the end user and the system they are communicating with. This man-in-the-middle (MITM) scenario affords the attacker access to passwords, transaction details and other sensitive information, which they may then modify or use to suit their purposes resulting in identity theft, information compromise and misappropriation of funds via electronic transfer, among other scenarios.
Current solutions are able to mitigate some of this risk, but more work is needed here given the difficulty in detecting MITM attacks. This thesis deals generally with the subject of identity and access management with a specific focus in the area of authentication within an IT system.
The research described here provide new approaches to user-centric and transaction-centric authentication as well as capabilities to improve support for the broader authentication system. The first category of user-centric improvements involves mechanisms which:
- leverage a communications side channel so that the user can know with greater certainty that the website they are interacting with is the one they intend,
- allow a service provider to detect a MITM by determining the user’s geographical location is consistent across multiple channels,
- allow for the detection of a MITM through an out of band voice prompt presented to the user and
- improve confidence that a user is who they claim to be by dynamically verifying that they are
geographically where they are expected to be even when traveling.
The second category of transaction-centric improvements involves mechanisms which leverage out of band communications to verify transaction details have not been tampered with through:
- a voice call in which transaction amounts, accounts, etc. are read aloud to the user for confirmation and
- a specially constructed QR code which contains these details and can be verified with a purpose-built
mobile app.
The third category of broader authentication system support mechanisms which:
- detect a MITM attack by recognizing changes in login traffic patterns,
- detect rogue domain name service providers which might attempt to redirect traffic to attacker websites,
- allow for non-disruptive, secure migration of users across authentication systems and
- allow for a secure means to regain access to a mobile device for which the passcode has been lost.
This research consists of a body of published works, most of which have taken the form of patent filings, which have been peer reviewed and granted by the US Patent and Trademark Office
ACHIEVING UNIVERSAL LIAISONS AND HEALTHCARE CONTACT CENTER CENTRALIZATION THROUGH THE USE OF DECISION SUPPORT TOOLS
Healthcare contact centers often experience a large volume of calls and traditional standardized guidelines can be difficult to follow during an active call. While more common workflows can be memorized, they change often because Healthcare is a dynamic field. Constant updates to workflows, an abundance of different processes and provider preferences, and a fast paced environment can lead Customer Service Liaisons (CSLs) to handle patient inquiries incorrectly. Active decision support tools enable a CSL to follow an updated workflow without needing to navigate through complex guidelines and emails. This research shows that contact center centralization through the use of decision support tools can reduce Average Speed to Answer by 70 seconds even with an increase to Average Handle Time by 30 seconds. This research also identifies key features the tool may need to facilitate widespread adoption by clinicians and CSL alike
Käyttäjien välinen henkilöllisyyden todentaminen nykyaikaisissa kommunikaatio- ja yhteistyöympäristöissä
This thesis describes a method for person-to-person identification on Google Wave networks.
The method can also be used for strong authentication on the Wave network.
The solution is based on using a trusted third party.
The users must first authenticate themselves to a trusted third party and then prove to it that they control a said Wave user account.
After these steps, the trusted third party is then able to identify the users participating in a Wave discussion and report the identification results to the other participants.
The users can request the trusted third party to reauthenticate a user if needed.
The thesis describes also a federated model for person-to-person identification on the Wave network using multiple trusted third parties.
The method described can be generalized to any communication networks where the origin of messages can be reliably traced on a domain name level.
A proof-of-concept of the identification model was developed and it was used to evaluate the applicability of the model in the real world.Diplomityössä kuvataan menetelmä käyttäjien väliseen henkilöllisyyden todentamiseen Google Wave-verkossa.
Kuvattua menetelmää voidaan käyttää myös henkilöiden vahvaan tunnistamiseen Wave-verkossa.
Ratkaisu perustuu luotetun kolmannen tahon käyttöön.
Käyttäjien tulee ensin tunnistautua luotetulle kolmannelle taholle ja sen jälkeen osoittaa luotetulle taholle omaavansa tietyn Wave-käyttäjätunnuksen.
Tämän jälkeen luotettu kolmas taho voi tunnistaa käyttäjät Wave-verkossa ns.
Wave-robotin avulla ja kertoa tunnistamisen tulokset muille osallistujille.
Tarvittaessa käyttäjät voivat pyytää robotin avulla luotettua tahoa uudelleentunnistamaan käyttäjät.
Työssä esitetään myös malli henkilöiden väliseen tunnistamiseen useamman luotetun tahon avulla.
Menetelmä on yleistettävissä käytettäväksi sellaisissa keskusteluverkoissa, joissa voidaan luotettavasti tunnistaa, miltä verkon palvelimelta kommunikaatio on tapahtunut.
Työssä toteutettiin tekninen kokeilu kehitetystä todennusmenetelmästä ja arvioitiin menetelmän soveltuvuutta käytäntöön
Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems
Caller ID spoofing is a global industry problem and often acts as a critical enabler for telephone fraud. To address this problem, the Federal Communications Commission (FCC) has mandated telecom providers in the US to implement STIR/SHAKEN, an industry-driven solution based on digital signatures. STIR/SHAKEN relies on a public key infrastructure (PKI) to manage digital certificates, but scaling up this PKI for the global telecom industry is extremely difficult, if not impossible. Furthermore, it only works with IP-based systems (e.g., SIP), leaving the traditional non-IP systems (e.g., SS7) unprotected. So far the alternatives to the STIR/SHAKEN have not been sufficiently studied. In this paper, we propose a PKI-free solution, called Caller ID Verification (CIV). CIV authenticates the caller ID based on a challenge-response process instead of digital signatures, hence requiring no PKI. It supports both IP and non-IP systems. Perhaps counter-intuitively, we show that number spoofing can be leveraged, in conjunction with Dual-Tone Multi-Frequency (DTMF), to efficiently implement the challenge-response process, i.e., using spoofing to fight against spoofing. We implement CIV for VoIP, cellular, and landline phones across heterogeneous networks (SS7/SIP) by only updating the software on the user’s phone. This is the first caller ID authentication solution with working prototypes for all three types of telephone systems in the current telecom architecture. Finally, we show how the implementation of CIV can be optimized by integrating it into telecom clouds as a service, which users may subscribe to
- …