{"title":"A solution to remote biometric identification","authors":"P. Bodnar","doi":"10.1109/INFTECH.2008.4621615","DOIUrl":null,"url":null,"abstract":"Identification is an essential part of security in most systems. There are many technologies and protocols supporting this functionality. Biometrics is considered promising because of ease of use from the user's viewpoint. They are also helpful if physical user presence has to be guaranteed. This paper studies security of biometrics if used in distributed and unprotected contexts. It demonstrates that an unprotected architecture is vulnerable to trivial attacks and that the use of biometric technologies in the user identification process may significantly undermine the security chain of the whole system. A solution which removes most of the difficulties is presented and discussed in the context of a distributed e-health application.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 1st International Conference on Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFTECH.2008.4621615","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Identification is an essential part of security in most systems. There are many technologies and protocols supporting this functionality. Biometrics is considered promising because of ease of use from the user's viewpoint. They are also helpful if physical user presence has to be guaranteed. This paper studies security of biometrics if used in distributed and unprotected contexts. It demonstrates that an unprotected architecture is vulnerable to trivial attacks and that the use of biometric technologies in the user identification process may significantly undermine the security chain of the whole system. A solution which removes most of the difficulties is presented and discussed in the context of a distributed e-health application.