• DocumentCode
    3336024
  • Title

    Biometric-Kerberos authentication scheme for secure mobile computing services

  • Author

    Fengling Han ; Alkhathami, Mohammed ; van Schyndel, Ron

  • Author_Institution
    Sch. of Inf. Technol. & Comput. Sci., RMIT Univ., Melbourne, VIC, Australia
  • Volume
    03
  • fYear
    2013
  • fDate
    16-18 Dec. 2013
  • Firstpage
    1694
  • Lastpage
    1698
  • Abstract
    Kerberos is an authentication protocol in which client and server can mutually authenticate each other across an insecure network connection. After the identity authentication, client and server can encrypt all of subsequent communications to ensure privacy and data integrity. In this paper, a biometric Kerberos-based user identity authentication scheme is presented. In the scheme, smart phones having computing capability and an internal mobile camera are the only device required at the user-end. The combination of owner biometrics and device information will be used for identity authentication. A watermark links the device to its user. The watermark is produced and embedded by using the internal functions of smart phones entirely and the watermark embedding key is the by-product in Kerberos authentication. Only the trusted key distribution center has enough knowledge to detect and remove the watermark. The ticket for the permission to access an application resource will only be issued upon successful biometric authentication. The watermark also offers forensic traceability in a resource constraint environment. As a result, cost effective strong security can be attained in mobile computing services.
  • Keywords
    authorisation; client-server systems; cryptographic protocols; data integrity; data privacy; digital forensics; message authentication; mobile computing; smart phones; telecommunication security; trusted computing; watermarking; Kerberos authentication protocol; biometric Kerberos-based user identity authentication scheme; client; communications encryption; computing capability; data integrity; device information; forensic traceability; insecure network connection; internal mobile camera; owner biometrics; privacy; resource constraint environment; secure mobile computing services; server; smart phones; trusted key distribution center; watermark embedding key; Authentication; Cryptography; Mobile communication; Mobile handsets; Protocols; Servers; Watermarking; Biometrics; Kerberos Authentication; Mobile Computing; Watermarking;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Image and Signal Processing (CISP), 2013 6th International Congress on
  • Conference_Location
    Hangzhou
  • Print_ISBN
    978-1-4799-2763-0
  • Type

    conf

  • DOI
    10.1109/CISP.2013.6743949
  • Filename
    6743949