DocumentCode :
2717682
Title :
Biometrics assisted secure network transactions
Author :
Kunnil, V. Oliyil ; Pillai, A. ; Milshtein, S.
Author_Institution :
ECE Dept., Univ. of Massachusetts, Lowell, MA, USA
fYear :
2011
fDate :
15-17 Nov. 2011
Firstpage :
69
Lastpage :
74
Abstract :
Biometric methods of authentication such as fingerprints, hand geometry, face recognition, voice, retina and iris scan are being increasingly used for security purposes. However online transactions still use traditional knowledge based, i.e., Personal Identification Number (PIN) or password for authentication. Such methods have proved ineffective over the course of time. Traditional key based authentication has been in use over the years, but not many forays have been made in to securing network transactions using biometrics. The length of the authentication key used in authentication systems is an important piece of the authentication process. In non-biometric authentication processes such as passwords or PIN numbers, depending on the length of the key, the information may be vulnerable to access by unauthorized users. Our system makes conventional key based authentication obsolete by replacing or supplementing the normal key characters with a personal identifier of the user. Without this biometric key the service is inaccessible. In this study we propose novel authentication protocol, based on use of a contactless undistorted fingerprint images to generate authentication key. The authentication process will be reinforced by randomly selected areas of a fingerprint that are used to generate keys. An additional layer of security is provided by using blood vessel map to determine a live finger is being used. We assert that usage of contactless, thus non-distorted, fingerprint as input to generate single session keys will enhance security of network transactions because of the amount of information in randomly selected segments of a fingerprint which is available to generate unique keys.
Keywords :
blood vessels; cryptographic protocols; fingerprint identification; random processes; transaction processing; authentication key; authentication process; authentication protocol; biometric key; blood vessel map; contactless undistorted fingerprint images; live finger; network transaction security; online transactions; personal identifier; Authentication; Biomedical imaging; Biometrics; Blood vessels; Fingerprint recognition; Servers; encryption; keys; network security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Technologies for Homeland Security (HST), 2011 IEEE International Conference on
Conference_Location :
Waltham, MA
Print_ISBN :
978-1-4577-1375-0
Type :
conf
DOI :
10.1109/THS.2011.6107849
Filename :
6107849
Link To Document :
بازگشت