Online citations, reference lists, and bibliographies.

A Fingerprint Based Bio-cryptographic Security Protocol Designed For Client/server Authentication In Mobile Computing Environment

K. Xi, T. Ahmad, F. Han, J. Hu
Published 2011 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
With fast evolution of mobile devices and mobile network, the need of protecting user sensitive information locally and performing secure user authentication remotely become evermore increasing. Bio-cryptography is emerging as a powerful solution which can combine the advantages of conventional cryptography and biometric security. In this paper, we present an efficient bio-cryptographic security protocol designed for client/server authentication in current mobile computing environment, with a reasonable assumption that server is secure. In this protocol, fingerprint biometric is used in user verification, protected by a computationally efficient Public Key Infrastructure (PKI) scheme, Elliptic Curve Cryptography (ECC). The genuine fingerprint information is hidden in the feature vault which is the mixture of genuine and chaff features. Fingerprint features are not only used for biometric verification but also for cryptographic key generation. Our security analysis shows that the proposed protocol can provide a secure and trustworthy authentication of remote mobile users over insecure network. Experimental results on public domain database show an acceptable verification performance. We also tested the computational costs and efficiency of our protocol on the CLDC emulator using Java ME (previous J2ME) programming technology. The simulation results prove that the proposed protocol suits current mobile environment. Copyright © 2010 John Wiley & Sons, Ltd.
This paper references
10.1117/12.304770
Biometric Encryption: enrollment and verification procedures
C. Soutar (1998)
10.1016/j.jnca.2009.02.009
A pixel-based scrambling scheme for digital medical images protection
J. Hu (2009)
10.1109/NSS.2009.57
An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography
T. Ahmad (2009)
10.1016/j.jnca.2010.01.003
Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic
A. Mahmood (2010)
Biometric encryption. In ICSA Guide to Cryptography Nichols RK (ed.)
C Soutar (1999)
10.1007/978-1-4419-5906-5_880
Biometric Encryption
A. Cavoukian (2011)
Sun Website
Second Fingerprint Verification Competition
D Maio (2002)
A simple and efficient data processing scheme for HMM based anomaly intrusion detection. Special Issue of Advances on Network Intrusion Detection
J Hu (2009)
10.1007/s10623-005-6343-z
A Fuzzy Vault Scheme
A. Juels (2006)
Data on PDAs mostly unprotected
K. Shaw (2004)
10.1109/TPAMI.2007.1004
Generating Cancelable Fingerprint Templates
N. Ratha (2007)
10.1002/SEC.5
Security issues in massive online games
J. Hu (2008)
10.1109/TPAMI.2010.73
Global Ridge Orientation Modeling for Partial Fingerprint Identification
Yi Wang (2011)
10.1016/j.csi.2009.04.005
A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations
J. Hu (2010)
NIST special database 24, live-scan digital video fingerprint database
Watson (1998)
10.1090/S0025-5718-1987-0866109-5
Elliptic curve cryptosystems
N. Koblitz (1987)
10.1007/11527923_32
Fuzzy Vault for Fingerprints
U. Uludag (2005)
SEC 2: Recommended Elliptic Curve Domain Parameters
P. Hess (2000)
On multi-scroll chaotic attractors in hysteresis-based piecewise linear systems
F Han (2007)
10.1117/12.304705
Biometric Encryption using image processing
C. Soutar (1998)
10.1109/ICPR.2002.1048144
FVC2002: Second Fingerprint Verification Competition
D. Maio (2002)
10.1016/j.jnca.2009.05.004
A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
X. Hoang (2009)
10.1109/TPAMI.2007.1003
A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing
Yi Wang (2007)
Elliptic curve cryptosystems, Mathematics of Computation 48
N Koblitz (1987)
com/solutions/physical/chipsets sensors.asp 18. www.authentec.com/products-accesscontrol- aes2510.cfm 19. avnetexpress.avnet.com/store/em/EMController/Sensors- and-Transducers-Misc
Www Upek
FIPS. 180-2: Secure Hash Standard (SHS) 25 February
(2004)
10.1109/ICC.2009.5198785
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault
K. Xi (2009)
10.1007/b97303
Handbook of Fingerprint Recognition
D. Maltoni (2003)
10.1016/j.amc.2006.06.082
Enhanced gradient-based algorithm for the estimation of fingerprint orientation fields
Yi Wang (2007)
Cancellable Biometric Filters forFace Recognition
M Savvides (2004)
10.1016/j.amc.2006.07.030
Fingerprint images encryption via multi-scroll chaotic attractors
F. Han (2007)
10.1007/11608288_90
A Novel Hybrid Crypto-Biometric Authentication Scheme for ATM Based Banking Applications
F. Han (2006)
10.1109/MNET.2009.4804323
A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection
J. Hu (2009)
tern Analysis and Machine Intelligence
(2006)
10.1109/TCSII.2007.903207
On Multiscroll Chaotic Attractors in Hysteresis-Based Piecewise-Linear Systems
F. Han (2007)
The use of elliptic curves in cryptography
Tibor Juhas (2007)
10.1007/BFb0015972
Audio- and Video-based Biometric Person Authentication
S. Mckenna (1997)
10.1109/TIFS.2007.908165
Fingerprint-Based Fuzzy Vault: Implementation and Performance
K. Nandakumar (2007)
Lightweight API, The Legion of the Bouncy Castle
Bouncy Castle (2008)
Data on PDAs mostly unprotected. Network World Fusion. Available from www.nwfusion.com
K Shaw (2004)
10.1137/060651380
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis (2003)
10.1109/TPAMI.2006.250
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs
A. Teoh (2006)
10.1145/359340.359342
A method for obtaining digital signatures and public-key cryptosystems
R. Rivest (1978)
A simple and efficient data processing scheme for HMM based anomaly intrusion detection
J Hu (2009)
10.1007/978-3-540-74549-5_46
2Ns Discretisation of BioPhasor in Cancellable Biometrics
A. Teoh (2007)



This paper is referenced by
The Barriers Encountered in Telemedicine Implementation by Health Care Practitioners
Olantunji Obikunle (2015)
Key management for wireless sensor network security
B. Tian (2011)
Cryptanalysis, provable security and implementation of fuzzy identity-based cryptography
Syh Yuan Tan (2014)
10.1109/CIS.2013.162
A Key Management Scheme between Body Sensor Networks and the Base Station
Huawei Zhao (2013)
10.4018/978-1-5225-0808-3.CH016
How Private Is Your Financial Data?: Survey of Authentication Methods in Web and Mobile Banking
Vidya Mulukutla (2017)
Result Request Data producer Edge Edge-Things Interface 1 a 2 Users accessing IoT devices 1 b 2
M. Ferrag (2019)
10.1007/978-981-32-9515-5_9
Strengthening Elliptic Curve Cryptography—Key Generation via Biometric Fusion Approach
Yogita S. Pagar (2020)
10.1109/TII.2012.2230639
Novel Anonymous Authentication Scheme Using Smart Cards
Jia-Lun Tsai (2013)
10.1109/CISP.2013.6743947
A Hadamard transform-based method for the design of cancellable fingerprint templates
Song Wang (2013)
10.1063/1.4756449
Double layer secure sketch
C. Li (2012)
10.1007/978-3-319-09710-7_3
History, Development and Trend of Fractal Based Biometric Cryptography
Md. Ahadullah (2015)
10.1007/s11235-019-00612-5
Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues
M. Ferrag (2020)
Protocol for Secure Iris Authentication Framework using Cryptography
Swati A. Jadhav (2014)
PRIVACY-PRESERVING AUTHENTICATION USING FINGERPRINT
Q. Feng (2012)
10.1109/ICRAECT.2017.19
Multibiometric Cryptosystem Based on Decision Level Fusion for File Uploading in Cloud
V. Sankaran Nair (2017)
Performance Evaluation of a large 3 D Fingerprint database
W. Zhou (2014)
10.1002/sec.1020
Evaluating and selecting the biometrics in network security
Che-Hung Liu (2015)
10.1109/ICIP.2014.7026017
Fingerprint-PKI authentication using Zernike moments
H. Jang (2014)
10.1587/TRANSFUN.E100.A.158
A Practical Biometric Random Number Generator for Mobile Security Applications
Alper Kanak (2017)
10.1049/iet-bmt.2016.0146
Key binding biometrics-based remote user authentication scheme using smart cards
Alawi A. Al-saggaf (2018)
10.1109/TSSA.2015.7440428
Improving bio-cryptography authentication protocol
Irfan Fadil (2015)
Analyzing Trusted Elements in Mobile Devices Master Thesis
S. Kulkarni (2015)
A Study of Cancellable Fingerprint Template Generation Techniques using cryptography
Dr. N. Radha (2016)
10.1007/978-3-030-24308-1_16
Context Data Preprocessing for Context-Aware Smartphone Authentication
Sangjin Nam (2019)
10.1049/EL.2014.1927
Performance evaluation of large 3D fingerprint databases
Wei Zhou (2014)
10.1109/ICIEA.2011.5975736
Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system
Kai Xi (2011)
10.1109/INFCOMW.2018.8406912
Understanding secure and usable gestures for realtime motion based authentication
Yanyan Li (2018)
10.1109/ACOMP.2015.23
Combining Fuzzy Extractor in Biometric-Kerberos Based Authentication Protocol
Ai Thao Nguyen Thi (2015)
10.1109/ICOAC.2017.7951750
GeoMoB — A geo location based browser for secured mobile banking
B. Akoramurthy (2017)
10.1049/iet-bmt.2018.5101
Privacy preserving biometric-based remote authentication with secure processing unit on untrusted server
Ai Thao Nguyen Thi (2019)
10.4018/jgim.2020010110
Identity Authentication Security Management in Mobile Payment Systems
F. Wang (2020)
10.1016/j.jnca.2010.09.002
A mutual-healing key distribution scheme in wireless sensor networks
B. Tian (2011)
See more
Semantic Scholar Logo Some data provided by SemanticScholar