Biometric handshake protocol on telebiometric system mechanism for national infrastructure

Yong Nyuo Shin, Yong Jun Lee, Woochang Shin, Jin Young Choi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover the unique biometric information of an individual following a security breach. For this reason, confidence among service bodies must be guaranteed. In this paper, we suggest nine bio-authentication models that differ according to template storage location, and define the threats and resolutions of these threats for each model. The suggested models can enhance web-based biometric security by providing security from the stage of transmission, and give stable performance by supplying standards-based encryptions. By designing and realizing Biometric Handshake protocols and Biometric Transfer protocols through the extension of TLS (Transport Layer Security), and applying them to each model, these models can be applied to elements of the national infrastructure, such as electronic passports and immigration control systems.

Original languageEnglish
Title of host publicationProceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
Pages57-60
Number of pages4
DOIs
Publication statusPublished - 2008 Sep 15
Event2nd International Conference on Information Security and Assurance, ISA 2008 - Busan, Korea, Republic of
Duration: 2008 Apr 242008 Apr 26

Other

Other2nd International Conference on Information Security and Assurance, ISA 2008
CountryKorea, Republic of
CityBusan
Period08/4/2408/4/26

Fingerprint

Biometrics
infrastructure
threat
open system
Smart cards
Open systems
invasion
control system
Authentication
Cryptography
certification
privacy
immigration
confidence
biometrics
electronics
Control systems
performance
Threat

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems and Management
  • Electrical and Electronic Engineering
  • Communication

Cite this

Shin, Y. N., Lee, Y. J., Shin, W., & Choi, J. Y. (2008). Biometric handshake protocol on telebiometric system mechanism for national infrastructure. In Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008 (pp. 57-60). [4511534] https://doi.org/10.1109/ISA.2008.24

Biometric handshake protocol on telebiometric system mechanism for national infrastructure. / Shin, Yong Nyuo; Lee, Yong Jun; Shin, Woochang; Choi, Jin Young.

Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. 2008. p. 57-60 4511534.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Shin, YN, Lee, YJ, Shin, W & Choi, JY 2008, Biometric handshake protocol on telebiometric system mechanism for national infrastructure. in Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008., 4511534, pp. 57-60, 2nd International Conference on Information Security and Assurance, ISA 2008, Busan, Korea, Republic of, 08/4/24. https://doi.org/10.1109/ISA.2008.24
Shin YN, Lee YJ, Shin W, Choi JY. Biometric handshake protocol on telebiometric system mechanism for national infrastructure. In Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. 2008. p. 57-60. 4511534 https://doi.org/10.1109/ISA.2008.24
Shin, Yong Nyuo ; Lee, Yong Jun ; Shin, Woochang ; Choi, Jin Young. / Biometric handshake protocol on telebiometric system mechanism for national infrastructure. Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. 2008. pp. 57-60
@inproceedings{90cf26ccac5f49cb9b7b76a9c7ae8a27,
title = "Biometric handshake protocol on telebiometric system mechanism for national infrastructure",
abstract = "The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover the unique biometric information of an individual following a security breach. For this reason, confidence among service bodies must be guaranteed. In this paper, we suggest nine bio-authentication models that differ according to template storage location, and define the threats and resolutions of these threats for each model. The suggested models can enhance web-based biometric security by providing security from the stage of transmission, and give stable performance by supplying standards-based encryptions. By designing and realizing Biometric Handshake protocols and Biometric Transfer protocols through the extension of TLS (Transport Layer Security), and applying them to each model, these models can be applied to elements of the national infrastructure, such as electronic passports and immigration control systems.",
author = "Shin, {Yong Nyuo} and Lee, {Yong Jun} and Woochang Shin and Choi, {Jin Young}",
year = "2008",
month = "9",
day = "15",
doi = "10.1109/ISA.2008.24",
language = "English",
isbn = "9780769531267",
pages = "57--60",
booktitle = "Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008",

}

TY - GEN

T1 - Biometric handshake protocol on telebiometric system mechanism for national infrastructure

AU - Shin, Yong Nyuo

AU - Lee, Yong Jun

AU - Shin, Woochang

AU - Choi, Jin Young

PY - 2008/9/15

Y1 - 2008/9/15

N2 - The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover the unique biometric information of an individual following a security breach. For this reason, confidence among service bodies must be guaranteed. In this paper, we suggest nine bio-authentication models that differ according to template storage location, and define the threats and resolutions of these threats for each model. The suggested models can enhance web-based biometric security by providing security from the stage of transmission, and give stable performance by supplying standards-based encryptions. By designing and realizing Biometric Handshake protocols and Biometric Transfer protocols through the extension of TLS (Transport Layer Security), and applying them to each model, these models can be applied to elements of the national infrastructure, such as electronic passports and immigration control systems.

AB - The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover the unique biometric information of an individual following a security breach. For this reason, confidence among service bodies must be guaranteed. In this paper, we suggest nine bio-authentication models that differ according to template storage location, and define the threats and resolutions of these threats for each model. The suggested models can enhance web-based biometric security by providing security from the stage of transmission, and give stable performance by supplying standards-based encryptions. By designing and realizing Biometric Handshake protocols and Biometric Transfer protocols through the extension of TLS (Transport Layer Security), and applying them to each model, these models can be applied to elements of the national infrastructure, such as electronic passports and immigration control systems.

UR - http://www.scopus.com/inward/record.url?scp=51349161233&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=51349161233&partnerID=8YFLogxK

U2 - 10.1109/ISA.2008.24

DO - 10.1109/ISA.2008.24

M3 - Conference contribution

AN - SCOPUS:51349161233

SN - 9780769531267

SP - 57

EP - 60

BT - Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008

ER -