Skip to main content

Risk Assessment in Authentication Machines

  • Chapter
  • First Online:

Part of the book series: Studies in Computational Intelligence ((SCI,volume 621))

Abstract

This work introduces an approach to building a risk profiler for use in authentication machines. Authentication machine application scenarios include the security of large public events, pandemic prevention, and border crossing automation. The proposed risk profiler provides a risk assessment at all phases of the authentication machine life-cycle. The key idea of our approach is to utilize the advantages of belief networks to solve large-scale multi-source fusion problems. We extend the abilities of belief networks by incorporating Dempster-Shafer Theory measures, and report the design techniques by using the results of the prototyping of possible attack scenarios. The software package is available for researchers.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    The e-passport and e-ID are defined by the ICAO standard, and are the key components of advanced border control technologies [54]. The face was recommended as the primary biometric, mandatory for global interoperability in the passport inspection systems. Fingerprint and iris were recommended as secondary biometrics.

References

  1. International Air Transport Association (IATA): Checkpoint of the future: Executive summary. 4th Proof. (2014). http://www.bing.com/search?q=iata

  2. Department of Homeland Security (DHS): Future Attribute Screening Technology (FAST) Project, Science and Technology Directorate (2008). http://www.dhs.gov/xlibrary/assets/privacy/privacy_pia_st_fast

  3. Daniels, D., Hudson, L.D., Laskey, K.B., et al.: Terrorism risk management. In: Pourret, O., Naim, P., Markot, B. (eds.) Bayesian Networks; A Practical Guide to Applications, pp. 239–262. Willey (2008)

    Google Scholar 

  4. ISO/IEC FDIS 30108-1:2015(E), Information technology—Biometric Identity Assurance Services—Part 1: BIAS services, International Organization for Standardization (2015)

    Google Scholar 

  5. Bolle, R., Connell, J., Pankanti, S., Ratha, N., Senior, A.: Guide to Biometrics. Springer, New York (2004)

    Book  Google Scholar 

  6. Jain, A., Bolle, R., Pankanti, S. (eds.): Biometrics: Personal Identification in a Networked Society. Kluwer (1999)

    Google Scholar 

  7. Miller, B.: Vital signs of identity. IEEE Spect. 31(2), 22–30 (1994)

    Article  Google Scholar 

  8. Back, J.: Posture monitoring system for context awareness in mobile computing. IEEE Trans. Instrum. Meas. 59(6), 1589–1599 (2010)

    Article  Google Scholar 

  9. Creese, S., Gibson-Robinson, T., Goldsmith, M., et al.: Tools for understanding identity. In: Proceedings IEEE Conference Technologies for Homeland (2013)

    Google Scholar 

  10. Mobile Biometric Identification: white paper, Motorola, (2008). http://www.motorolasolutions.com/web/Business/Products/

  11. NIST: Mobile ID Device Best Practice Recommendation Version 1.0, NISTSP 500-280 (2009)

    Google Scholar 

  12. Pavlidis, I., Levine, J.: Thermal image analysis for polygraph testing. IEEE Trans. Eng. Med. Biol. Mag. 6, 56–64 (2002)

    Article  Google Scholar 

  13. Poursaberi, A., Vana, J., Mracek, S., Dvora, R., Yanushkevich, S., Drahansky, M., Shmerko, V., Gavrilova, M.: Facial biometrics for situational awareness systems. IET Biom. 2(2), 35–47 (2013)

    Article  Google Scholar 

  14. Yanushkevich, S., Shmerko, V., Boulanov, O., Stoica, A.: Decision-making support in biometric-based physical access control systems: Design concept, architecture, and applications. In: Boulgouris, N.V., Plataniotis, K.N., Micheli-Tzanakou, E. (eds.) Biometrics: Theory, Methods, and Applications, pp. 599–631. IEEE Press, Wiley (2010)

    Google Scholar 

  15. AVATAR: Border patrol kiosk detects liars trying to enter U.S. Homeland Security News Wire (2012). http://www.homelandsecuritynewswire.com/

  16. DHS (Department of Homeland Security): Future Attribute Screening Technology (FAST) Project, Science and Technology Directorate, Department of Homeland Security (2008). www.dhs.gov/xlibrary/assets/privacy/privacy_pia_st_fast

  17. McBreen, H.M., Jack, M.A.: Evaluating humanoid synthetic agents in e-retail applications. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 31(5), 394–405 (2001)

    Article  Google Scholar 

  18. Eastwood, S.C., Yanushkevich, S.N., Drahansky, M.: Biometric intelligence in authentication machines: from talking faces to talking robots. In: Proceedings IIAI 3rd International Conference Advanced Applied Informatics, Japan, pp. 763–768 (2014)

    Google Scholar 

  19. Nunamaker Jr, J.F., Derrick, D.C., Elkins, A.C., Burgoon, J.K., Patton, M.W.: Embodied conversational agent-based kiosk for automated interviewing. J Manag. Inf. Syst. 28(1), 17–48 (2011)

    Article  Google Scholar 

  20. McLay, L.A., Lee, A.J., Jacobson, S.H.: Risk-based policies for airport security checkpoint screening. J. Transp. Sci. 44(3), 333–349 (2010)

    Article  Google Scholar 

  21. Nie, X., Batta, R., Drury, C.G., Lin, L.: Passenger grouping with risk levels in an airport security system. Eur. J. Oper. Res. 194(2), 574–584 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  22. Nuppeney, M.: Automated border control based on (ICAO compliant) eMRTDs, Federal Office for Information Security (2012). http://www.bsi.de

  23. SITA: END-to-end border management: An integrated approach to passenger data collection, identity verification and risk management. SITA positioning paper (2012)

    Google Scholar 

  24. Fiondella, L., Gokhale, S.S., Lownes, N., Accorsi, M.: Security and performance analysis of a passenger screening checkpoint for mass-transit systems. In: Proceedings IEEE Conference Technologies for Homeland Security (HST), pp. 312–318 (2012)

    Google Scholar 

  25. Campbell, J.W.M.: New Zealand SmartGate: Using quantitative performance information to improve convenience and security. In: Proceedings International Biometric Performance Testing Conference, NIST (2014). http://www.nist.gov/itl/iad/ig/ibpc2014

  26. Frontex: Best practice technical guidelines for automated border control (ABC) systems, Research and Development Unit, Frontex, Warsaw (2012). http://www.frontex.europa.eu

  27. Frontex: BIOPASS II Automated biometric border crossing systems based on electronic passports and facial recognition: RAPID and SmartGate. Research and Development Unit, Frontex, Warsaw (2010). http://www.frontex.europa.eu

  28. Bigo, D.S. et al.: Justice and Home Affairs Databases and a Smart Borders System at EU External Borders An Evaluation of Current and Forthcoming Proposals for European Policy Studies (CEPS), No. 52/Dec. (2012)

    Google Scholar 

  29. Florence, J., Friedman, R.: Profiles in terror: A legal framework for the behavioral profiling paradigm. George Mason Law Rev. 17(2), 423–481 (2010). http://www.georgemasonlawreview.org/doc/172Florenceand

  30. IATA (International Air Transport Association): Checkpoint of thefuture: Executive summary. 4th Proof (2014). http://www.bing.com/search?q=iata%3A+Checkpoint+of+the+future.+Executive+summary

  31. Eastwood, S.C., Shmerko, V.P., Yanushkevich, S.N., Drahansky, M., Gorodnichy, D.O.: Biometric-enabled authentication machines: A survey of open-set real-world applications. IEEE Trans. Hum. Mach. Syst. early access, May 2015

    Google Scholar 

  32. Yanushkevich, S.N., Eastwood, S.C., Drahansky, M., Shmerko, V.P.: Taxonomy of Impersonation Phenomenon in Authentication Machines for e-Borders. Proc. Int. Conf. Emerg. Secur. Technol. (2015)

    Google Scholar 

  33. Waltz, E., Llinas, J.: Multisensor Data Fusion. Artech House, MA (1990)

    Google Scholar 

  34. Eastwood, S.C., Yanushkevich, S.N.: Risk profiler in automated human authentication. In: Proceedings IEEE Workshop on Computational Intelligence in Biometrics and Identity Management—CIBIM, Orlando, Florida (2014)

    Google Scholar 

  35. Yanushkevich, S.N., Stoica, A., Shmerko, V.P.: Experience of design and prototyping of a multi-biometric early warning physical access control security system (PASS) and a training system (T-PASS). In: Proceedings of the 32nd Annual IEEE Industrial Electronics Society Conference, pp. 2347–2352. Paris, France (2006)

    Google Scholar 

  36. Sacanamboy, M., Cukic, B.: Combined performance and risk analysis for border management applications. In: Proceedings IEEE/IFIP Conference Dependable Systems and Networks (DSN), pp. 403–412 (2010)

    Google Scholar 

  37. DHS (Department of Homeland Security): DHS S&T and CBP Announce the Opening of the Maryland Test Facility (2014). http://www.dhs.gov/blog/2014/07/03/, http://www.dhs.gov/st-snapshot-new-dhs-facility-tests-biometric-technology-improves-air-entryexit-operations

  38. Software package Dempster-Shafer Bayesian Network (DSBN-01). Biometric Laboratory, University of Calgary, Canada (2015). http://www.ucalgary.ca/btlab/Software

  39. Aven, T.: Foundations of Risk Analysis, 2nd edn. Wiley (2012)

    Google Scholar 

  40. Koller, D., Friedman, N.: Probabilistic Graphical Models: Principles and Techniques, MIT Press (2009)

    Google Scholar 

  41. Frey, B.J., Jojic, N.: A comparison of algorithms for inference and learning in probabilistic graphical models. IEEE Trans. Pattern Anal. Mach. Intell. 27(9), 1392–1416 (2005)

    Article  Google Scholar 

  42. Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)

    MATH  Google Scholar 

  43. Smarandache, F., Dezert, J., Tacnet, J.-M.: Fusion of sources of evidence with different importances and reliabilities In: Proceedings Workshop on the Theory of Belief Functions (BELIEF 2010), Edinburgh, UK (2010). https://hal.archives-ouvertes.fr/file/index/docid/559233/filename/GR2010-PUB00030651.pdf

  44. Bishop, C.M.: Pattern Recognition and Machine Learning. Springer, New York (2006)

    MATH  Google Scholar 

  45. Delmotte, F., Smets, P.: Target identification based on the transferable belief model interpretation of Dempster-Shafer model. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 34(4), 457–471 (2004)

    Article  Google Scholar 

  46. Papakostas, G.A., et al.: Fuzzy cognitive maps for pattern recognition applications. Int. J. Pattern Recognit. Artif. Intell. 22, 1461–1486 (2008)

    Article  Google Scholar 

  47. Jang, J.-S.R.: ANFIS: adaptive-network-based fuzzy inference systems. IEEE Trans. Syst. Man Cybern. 23, 665–685 (1993)

    Article  Google Scholar 

  48. Yager, R.R., Filev, D.P.: Including probabilistic uncertainty in fuzzy logic controller modeling using Dempster-Shafer theory. IEEE Trans. Syst. Man Cybern. 25(8), 1221–1230 (1995)

    Article  Google Scholar 

  49. Yager, R.R.: Human behavioral modeling using fuzzy and Dempster Shafer theory, Social Computing, Behavioral Modeling, and Prediction, pp. 89–99. Springer, US (2008)

    Book  Google Scholar 

  50. Denoeux, T.: A neural network classifier based on Dempster-Shafer theory. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 30(2), 131–150 (2000)

    Article  MathSciNet  Google Scholar 

  51. Klein, L.A.: Sensor and Data Fusion: A Tool for Information Assessment and decision Making. SPIE, Bellingham (2007)

    Google Scholar 

  52. Bier, V.M., Azaiez, M.N. (eds.): Game Theoretic Risk Analysis of Security Threats. Springer, US (2009)

    MATH  Google Scholar 

  53. Barber, D.: Bayesian Reasoning and Machine Learning. Cambridge University Press, Cambridge (2012)

    MATH  Google Scholar 

  54. ICAO: Document 9303, part 1, vol. 2, e-passports. Retrieved 8 Sept. (2010). http://hasbrouck.org/documents/ICAO9303-pt1-vol2.pdf

  55. Hwang, K., Cho, S.: Landmark detection from mobile life log using a modular Bayesian network model. Expert Syst. Appl. 36(10), 12065–12076 (2009)

    Article  Google Scholar 

  56. Eastwood, S.C., Yanushkevich, S.N., Shmerko, V.P.: Belief network support via decision diagrams. In: Proceedings of the 45th IEEE International Symposium on Multiple-Valued Logic (2015)

    Google Scholar 

  57. Voorbraak, F.: On the justification of Dempster’s rule of combination. Artif. Intell. 48(2), 171–197 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  58. Jirousek, R.: Local computations in Dempster-Shafer theory of evidence. Int. J. Approx. Reason. 53(8), 1155–1167 (2012)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

We acknowledge collaboration with Dr. V. Shmerko (University of Calgary, Canada). This work was partially supported by the Natural Sciences and Engineering Research Council of Canada (NSERC) through the Discovery grant “Biometric intelligent interfaces”, and the Government of the Province of Alberta (Queen Elizabeth II Scholarship).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Eastwood .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Eastwood, S., Yanushkevich, S. (2016). Risk Assessment in Authentication Machines. In: Abielmona, R., Falcon, R., Zincir-Heywood, N., Abbass, H. (eds) Recent Advances in Computational Intelligence in Defense and Security. Studies in Computational Intelligence, vol 621. Springer, Cham. https://doi.org/10.1007/978-3-319-26450-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26450-9_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26448-6

  • Online ISBN: 978-3-319-26450-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics