M. Derawi, D. Gafurov, R. Larsen, C. Busch, Patrick A. H. Bours
{"title":"Fusion of gait and fingerprint for user authentication on mobile devices","authors":"M. Derawi, D. Gafurov, R. Larsen, C. Busch, Patrick A. H. Bours","doi":"10.1109/IWSCN.2010.5497989","DOIUrl":"https://doi.org/10.1109/IWSCN.2010.5497989","url":null,"abstract":"A new multi-modal biometric authentication approach using gait signals and fingerprint images as biometric traits is proposed. The individual comparison scores derived from the gait and fingers are normalized using four methods (min-max, z-score, median absolute deviation, tangent hyperbolic) and then four fusion approaches (simple sum, user-weighting, maximum score and minimum core) are applied. Gait samples are obtained by using a dedicated accelerometer sensor attached to the hip. The proposed method is evaluated using 7200 fingerprint images and gait samples. Fingerprints are collected by a capacitive line sensor, an optical sensor with total internal reflection and a touch-less optical sensor. The fusion results of these two biometrics show an improved performance and a large step closer for user authentication on mobile devices.","PeriodicalId":217163,"journal":{"name":"2010 2nd International Workshop on Security and Communication Networks (IWSCN)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126965836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast VPN mobility across Wi-Fi hotspots","authors":"A. Zúquete, C. Frade","doi":"10.1109/IWSCN.2010.5497995","DOIUrl":"https://doi.org/10.1109/IWSCN.2010.5497995","url":null,"abstract":"Wi-Fi hotspots deployed by domestic networks are an attractive approach to foster ubiquitous Internet access for mobile computers. However, it raises several security issues, since the owners of such hotspots cannot be trusted to be honest; therefore, visitors should consider them as potential Man-in-the-Middle attackers. On the other hand, the owners of such hotspots should not be legally accounted for illegal or unethical activities performed by visitors. We defend that both issues can be tackled by using a VPN-based access architecture for visitors. However, current VPN solutions do not handle gracefully the mobility of clients, an interesting possibility to navigate in a sea of user-provided hotspots. In this paper, we propose a modification of OpenVPN, a very effective and secure, open-source VPN solution, to support the seamless mobility of VPN clients. The proposed modification allows OpenVPN tunnels to be reconfigured as soon as possible after a client handover, in order to minimize outage delays and traffic losses. Performance evaluation with an implemented prototype in different test scenarios showed that we can reduce the handover delay imposed at the VPN level down to 1.7% of the current value, at least.","PeriodicalId":217163,"journal":{"name":"2010 2nd International Workshop on Security and Communication Networks (IWSCN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121701407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Abid, S. Kanade, D. Petrovska-Delacrétaz, B. Dorizzi, H. Afifi
{"title":"Iris based authentication mechanism for e-Passports","authors":"M. Abid, S. Kanade, D. Petrovska-Delacrétaz, B. Dorizzi, H. Afifi","doi":"10.1109/IWSCN.2010.5497990","DOIUrl":"https://doi.org/10.1109/IWSCN.2010.5497990","url":null,"abstract":"E-Passports are widely issued all over the world, although they suffer from security flaws. Many guidelines were proposed to solve these security considerations, like the guideline of the International Civil Aviation Organization (ICAO), the Extended Access Control (EAC), and other solutions for the third e-Passport generation. In this paper, an iris based authentication mechanism for e-Passport is proposed and validated. This mechanism is based on Elliptic Curve Cryptography (ECC). The iris based cryptographic key regeneration scheme is used to obtain a stable input from biometric data which is used to generate the security parameters of the elliptic curve. Another important aspect of this work is that it is evaluated on a publicly available biometric database. The results show a good performance especially from a biometric point of view (False Acceptance Rate of 0.2% and False Rejection Rate of 3.6%) on a subset of the NIST-ICE database.","PeriodicalId":217163,"journal":{"name":"2010 2nd International Workshop on Security and Communication Networks (IWSCN)","volume":"47 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120899348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}