A Biometric Authentication Protocol for 3G Mobile Systems: Modelled and Validated Using CSP and Rank Functions

作者: Christos K. Dimitriadis , Siraj A. Shaikh

DOI: 10.6633/IJNS.200707.5(1).12

关键词:

摘要: This paper describes a protocol, called BIO3G, for establishing secure and privacy friendly biometric authentication in 3G mobile environments. BIO3G provides real end-to-end strong user to the operator, requiring no storing or transferring of data eliminating need enrolment administration procedures, which are time-consuming expensive operator. was modelled evaluated using formal process algebra CSP.

参考文章(13)
Karine Gandolfi, Christophe Mourtel, Francis Olivier, Electromagnetic Analysis: Concrete Results cryptographic hardware and embedded systems. ,vol. 2162, pp. 251- 261 ,(2001) , 10.1007/3-540-44709-1_21
Christos K. Dimitriadis, Despina Polemi, Application of Multi-criteria Analysis for the Creation of a Risk Assessment Knowledgebase for Biometric Systems Lecture Notes in Computer Science. pp. 724- 730 ,(2004) , 10.1007/978-3-540-25948-0_98
Jean-Paul Linnartz, Pim Tuyls, New shielding functions to enhance privacy and prevent misuse of biometric templates Lecture Notes in Computer Science. pp. 393- 402 ,(2003) , 10.1007/3-540-44887-X_47
G Lowe, B Roscoe, M Goldsmith, S Schneider, P Ryan, Modelling and analysis of security protocols Addison-Wesley. ,(2001)
Steve Schneider, Verifying authentication protocol implementations formal methods for open object based distributed systems. pp. 5- 24 ,(2002) , 10.1007/978-0-387-35496-5_2
D. Dolev, A. Yao, On the security of public key protocols IEEE Transactions on Information Theory. ,vol. 29, pp. 198- 208 ,(1983) , 10.1109/TIT.1983.1056650
S. Schneider, Verifying authentication protocols in CSP IEEE Transactions on Software Engineering. ,vol. 24, pp. 741- 758 ,(1998) , 10.1109/32.713329
A. W. Roscoe, The Theory and Practice of Concurrency Prentice Hall PTR. ,(1997)
S. Prabhakar, S. Pankanti, A.K. Jain, Biometric recognition: security and privacy concerns ieee symposium on security and privacy. ,vol. 1, pp. 33- 42 ,(2003) , 10.1109/MSECP.2003.1193209