Skip to main content

An Agent Based Multifactor Biometric Security System

  • Conference paper
Book cover Knowledge-Based Intelligent Information and Engineering Systems (KES 2008)

Abstract

A novel agent based protocol for computer and network security based on multifactor fusion of passwords and facial biometrics for user authentication is proposed in this paper. The protocol uses multiple factors for authentication involving a combination of passwords and face biometric template on the smart card and the user workstation. The biometric match is performed by a module running on the user’s workstation, authenticated by a mobile agent coming from a reliable server. The proposed protocol uses the current cryptographic tokens without requiring any hardware or software changes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bechelli, L., Bistarelli, S., Martinelli, F., Petrocchi, M., Vaccarelli, A.: Integrating biometric techniques with electronic signature for remote authentication. ERCIM News (49) (2002)

    Google Scholar 

  2. Bechelli, L., Bistarelli, S., Vaccarelli, A.: Biometrics authentication with smart- card. Technical Report 08-2002, CNR, IIT, Pisa (2002)

    Google Scholar 

  3. Bella, G., Bistarelli, S., Martinelli, F.: Biometrics to Enhance Smartcard Security (Simulating MOC using TOC). In: Proc. 11th International Workshop on Security Protocols, Cambridge, England, April 2-4, 2003 (2003)

    Google Scholar 

  4. BioAPI Consortium. BioAPI Specification Version 1.1, http://www.bioapi.org

  5. Authenticode, http://msdn.microsoft.com/workshop/security/authcode/signing.asp

  6. Roth, V., Jalali, M.: Concepts and Architecture of a Security-centric Mobile Agent Server. In: IEEE Proceedings of 5th International Symposium on Autonomous Decentralized Systems (ISADS 2001), Dallas, Texas, March 2001, pp. 435–442 (2001)

    Google Scholar 

  7. RSA Laboratories. PKCS#11-cryptographic token interface standard

    Google Scholar 

  8. Bierman, E., Cloete, E.: Classification of Malicious Host Threats in Mobile Agent Computing. In: Proceedings of SAICSIT 2002, pp. 141–148 (2002)

    Google Scholar 

  9. Java Native Interface, http://java.sun.com/docs/books/jni/index.html

  10. How To Share Data Between Different Mappings of a DLL. Microsoft KB 125677

    Google Scholar 

  11. Waldmann, U., Scheuermann, D., Eckert, C.: Protected transmission of biometric user authentication data for oncard-matching. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 425–430. Springer, Heidelberg (2004)

    Google Scholar 

  12. Cyberflex E-gate, http://www.axalto.com

Download references

Authors

Editor information

Ignac Lovrek Robert J. Howlett Lakhmi C. Jain

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chetty, G., Sharma, D., Balachandran, B.M. (2008). An Agent Based Multifactor Biometric Security System. In: Lovrek, I., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2008. Lecture Notes in Computer Science(), vol 5179. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85567-5_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85567-5_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85566-8

  • Online ISBN: 978-3-540-85567-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics