769 research outputs found

    EXTRINSIC CHANNEL-LIKE FINGERPRINT EMBEDDING FOR TRANSMITTER AUTHENTICATION IN WIRELESS SYSTEMS

    Get PDF
    We present a physical-layer fingerprint-embedding scheme for wireless signals, focusing on multiple input multiple output (MIMO) and orthogonal frequency division multiplexing (OFDM) transmissions, where the fingerprint signal conveys a low capacity communication suitable for authenticating the transmission and further facilitating secure communications. Our system strives to embed the fingerprint message into the noise subspace of the channel estimates obtained by the receiver, using a number of signal spreading techniques. When side information of channel state is known and leveraged by the transmitter, the performance of the fingerprint embedding can be improved. When channel state information is not known, blind spreading techniques are applied. The fingerprint message is only visible to aware receivers who explicitly preform detection of the signal, but is invisible to receivers employing typical channel equalization. A taxonomy of overlay designs is discussed and these designs are explored through experiment using time-varying channel-state information (CSI) recorded from IEEE802.16e Mobile WiMax base stations. The performance of the fingerprint signal as received by a WiMax subscriber is demonstrated using CSI measurements derived from the downlink signal. Detection performance for the digital fingerprint message in time-varying channel conditions is also presented via simulation

    On the implementation of modified fuzzy vault for biometric encryption

    Full text link
    Abstract—Biometrics, such as irises and fingerprints, enable se-cure and non-repudiable authentication. Fuzzy vault is a scheme that can monolithically bind secret to biometric templates. Moreover, the modified fuzzy vault (MFV) leads to less entropy loss and requires less memory for storing the sketches. This paper proposes a novel low-complexity scheme to compute the monic polynomial for the sketch during the enrollment process of the MFV. An innovative interpolation method is also developed to reduce the computation complexity and latency of the verification process. Efficient hardware implementation architectures are developed in this paper for the proposed schemes and their complexities are analyzed in detail. I

    Binary Biometrics: An Analytic Framework to Estimate the Bit Error Probability under Gaussian Assumption

    Get PDF
    In recent years the protection of biometric data has gained increased interest from the scientific community. Methods such as the helper data system, fuzzy extractors, fuzzy vault and cancellable biometrics have been proposed for protecting biometric data. Most of these methods use cryptographic primitives and require a binary representation from the real-valued biometric data. Hence, the similarity of biometric samples is measured in terms of the Hamming distance between the binary vector obtained at the enrolment and verification phase. The number of errors depends on the expected error probability Pe of each bit between two biometric samples of the same subject. In this paper we introduce a framework for analytically estimating Pe under the assumption that the within-and between-class distribution can be modeled by a Gaussian distribution. We present the analytic expression of Pe as a function of the number of samples used at the enrolment (Ne) and verification (Nv) phases. The analytic expressions are validated using the FRGC v2 and FVC2000 biometric databases

    Design and Implementation of a Secure i-Voting System

    Get PDF
    There is concern ih many democracies about the declining rates in voter's turnout and more generally, the (perceived) t~end towards political apathy. The reason is attributed to lack of trust in the political/democratic proces.( One of the measures considered to encourage participation in the polity is to simplify the election procedure by introducing electronic voting, and in particular, Internet voting. It is expected that this will incrhase voter's convenience and voter's confidence in the accuracy of election results. Internet voting mett1zs the casting of a secure and secret electronic ballot that is transmitted to electoral officials using th'e Internet. Internet voting is a new way of implementing democracy and eliminating some of the .fallp.cies of paper ballot voting. This paper propose~ the development (~fa dynamic online voter registration system; provides a robust /-voting architectw'e; and designs and implements a secure Internet voting system based on Biometric features using filzge1print authentication mechanism. The system runs on platforms such as the personal computers, Op'eni:ting Systems (UNIX, and Windows XP), and Browsers (Microsoft Internet Explorer, etc.). The ballots \vere formatted using HTML and ]avaScript, and audio sound integrated into it with the use of SWiSH max software. The server side is a java/Php application that provides access to MySQL database rzuzning dn an Apache web server. Security is incorpoiated into the system with the use of the N- Tier architecture inc01porating the Demilitarized Zone [DMZ). The system offers enhanced speed and efficiency, and it eliminates the "grey" area of voting, lwnian (!rror and bias. Further, it will allow for a broader spectrum ~f voters to exercise their rights anywh~re there is Internet access and at the voters' convenience. Furthermore, the system offered bimodal authentication mechanisms through the use of fingerprint and password, 'which helped a great deal to prevent multiple registrations l~{ voters. It also helps to increase the confidence of voters in the electoral process. In addition, the interest of the disabled, particularly, the sight impaired is taking into consideration through the provision of audio sound to aid them in the process of casting their votes

    Implementing Resiliency of Adaptive Multi-Factor Authentication Systems

    Get PDF
    Multifactor authentication (MFA) is getting increasingly more popular to safeguard systems from unauthorized users access. Adaptive Multi-Factor Authentication (A-MFA) is an enhanced version of MFA that provides a method to allow legitimate users to access a system using different factors that are changing based on different considerations. In other words, authentication factors include passwords, biometrics among others are adaptively selected by the authentication system based on criteria (e.g., whether the user is trying to log in from within system boundary, or whether or not the user is trying to access during organization operating hours). The criteria (i.e. triggering events) that A-MFA uses to select authentication factors adaptively are usually pre-defined and hard-coded in the authentication system itself. In this paper, the graphical user interface application is designed to add more resiliency to the existing Adaptive Multi-Factor Authentication (A-MFA) method by enabling system administrators to rank the triggering criteria based on the users’ roles, system assets, tolerance to risks, etc. The proposed tool allows system administrators to determine when to tighten and soften user access to the system. The tool uses multiple criteria decision making (MCDM) method to allow system admins to access the trustworthiness of user. Based on the trustworthiness of the user, the tool selects the number and complexity of the authentication methods. This tool will help to utilize the systems administrator situational awareness to improve security. This work aims to preserve the AMFA strengths and at the same time give system administrators more flexibility and authority in controlling access to systems
    • …
    corecore