Infrastructure Security

This paper will identify and recommend biometric technologies that provide strong authentication, convenient usability, and versatility, in order to meet the demand of enterprise infrastructure security systems. We aim at validating suitability for one or more mainstream applications. Finger scan technology is mature and widely available. The combination of a finger scan and smart card gives true dual-factor authentication that provides a greater degree of security and simplifies authentication for end users while preserving privacy. Speaker Verification is the most natural biometric technology to use with voice-based systems. It takes advantage of the ubiquitous voice-grade telephone channel. The combination of speaker verification and token technology can provide convenient and secure access to voice portal applications. We also discuss cultural, legal, and privacy issues based on religious objections, health concerns, legal restrictions, and regulations on the use of biometric technology.

[1]  Simone Fischer Hübner IT-Security and Privacy : Design and Use of Privacy-Enhancing Security Mechanisms , 2001 .

[2]  Erland Jonsson,et al.  Anomaly-based intrusion detection: privacy concerns and other problems , 2000, Comput. Networks.

[3]  Jacques Traoré Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash Systems , 1999, ACISP.

[4]  Yiannis Tsiounis,et al.  Anonymity Control in E-Cash Systems , 1997, Financial Cryptography.

[5]  L. Hong,et al.  Can multibiometrics improve performance , 1999 .

[6]  Eric Ericsson Vod,et al.  Intermediate Report: Results of Review, Requirements and Reference Architecture , 2001 .

[7]  Claudia Eckert,et al.  Internet Anonymity: Problems and Solutions , 2001, SEC.

[8]  Dogan Kesdogan,et al.  Privacy Enhanced Intrusion Detection , 1999 .

[9]  Sharath Pankanti,et al.  Evaluation techniques for biometrics-based authentication systems (FRR) , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[10]  Hannes Federrath,et al.  Project “anonymity and unobservability in the Internet” , 2000, CFP '00.

[11]  Ross J. Anderson,et al.  Optical Fault Induction Attacks , 2002, CHES.

[12]  Anil K. Jain,et al.  Decision-Level Fusion in Fingerprint Verification , 2001, Multiple Classifier Systems.

[13]  Mitsuru Matsui,et al.  New Block Encryption Algorithm MISTY , 1997, FSE.

[14]  Norman Poh,et al.  Hybrid Biometric Person Authentication Using Face and Voice Features , 2001, AVBPA.

[15]  Alex Biryukov,et al.  Real Time Cryptanalysis of the Alleged A5/1 on a PC , 1999 .

[16]  Kai Rannenberg,et al.  Pseudonymous audit for privacy enhanced intrusion detection , 1997, SEC.

[17]  Alex Biryukov,et al.  Real Time Cryptanalysis of A5/1 on a PC , 2000, FSE.

[18]  Adi Shamir,et al.  How to share a secret , 1979, CACM.