Skip to main content
Top

2016 | OriginalPaper | Chapter

Risk Assessment in Authentication Machines

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This work introduces an approach to building a risk profiler for use in authentication machines. Authentication machine application scenarios include the security of large public events, pandemic prevention, and border crossing automation. The proposed risk profiler provides a risk assessment at all phases of the authentication machine life-cycle. The key idea of our approach is to utilize the advantages of belief networks to solve large-scale multi-source fusion problems. We extend the abilities of belief networks by incorporating Dempster-Shafer Theory measures, and report the design techniques by using the results of the prototyping of possible attack scenarios. The software package is available for researchers.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
The e-passport and e-ID are defined by the ICAO standard, and are the key components of advanced border control technologies [54]. The face was recommended as the primary biometric, mandatory for global interoperability in the passport inspection systems. Fingerprint and iris were recommended as secondary biometrics.
 
Literature
3.
go back to reference Daniels, D., Hudson, L.D., Laskey, K.B., et al.: Terrorism risk management. In: Pourret, O., Naim, P., Markot, B. (eds.) Bayesian Networks; A Practical Guide to Applications, pp. 239–262. Willey (2008) Daniels, D., Hudson, L.D., Laskey, K.B., et al.: Terrorism risk management. In: Pourret, O., Naim, P., Markot, B. (eds.) Bayesian Networks; A Practical Guide to Applications, pp. 239–262. Willey (2008)
4.
go back to reference ISO/IEC FDIS 30108-1:2015(E), Information technology—Biometric Identity Assurance Services—Part 1: BIAS services, International Organization for Standardization (2015) ISO/IEC FDIS 30108-1:2015(E), Information technology—Biometric Identity Assurance Services—Part 1: BIAS services, International Organization for Standardization (2015)
5.
go back to reference Bolle, R., Connell, J., Pankanti, S., Ratha, N., Senior, A.: Guide to Biometrics. Springer, New York (2004)CrossRef Bolle, R., Connell, J., Pankanti, S., Ratha, N., Senior, A.: Guide to Biometrics. Springer, New York (2004)CrossRef
6.
go back to reference Jain, A., Bolle, R., Pankanti, S. (eds.): Biometrics: Personal Identification in a Networked Society. Kluwer (1999) Jain, A., Bolle, R., Pankanti, S. (eds.): Biometrics: Personal Identification in a Networked Society. Kluwer (1999)
7.
8.
go back to reference Back, J.: Posture monitoring system for context awareness in mobile computing. IEEE Trans. Instrum. Meas. 59(6), 1589–1599 (2010)CrossRef Back, J.: Posture monitoring system for context awareness in mobile computing. IEEE Trans. Instrum. Meas. 59(6), 1589–1599 (2010)CrossRef
9.
go back to reference Creese, S., Gibson-Robinson, T., Goldsmith, M., et al.: Tools for understanding identity. In: Proceedings IEEE Conference Technologies for Homeland (2013) Creese, S., Gibson-Robinson, T., Goldsmith, M., et al.: Tools for understanding identity. In: Proceedings IEEE Conference Technologies for Homeland (2013)
11.
go back to reference NIST: Mobile ID Device Best Practice Recommendation Version 1.0, NISTSP 500-280 (2009) NIST: Mobile ID Device Best Practice Recommendation Version 1.0, NISTSP 500-280 (2009)
12.
go back to reference Pavlidis, I., Levine, J.: Thermal image analysis for polygraph testing. IEEE Trans. Eng. Med. Biol. Mag. 6, 56–64 (2002)CrossRef Pavlidis, I., Levine, J.: Thermal image analysis for polygraph testing. IEEE Trans. Eng. Med. Biol. Mag. 6, 56–64 (2002)CrossRef
13.
go back to reference Poursaberi, A., Vana, J., Mracek, S., Dvora, R., Yanushkevich, S., Drahansky, M., Shmerko, V., Gavrilova, M.: Facial biometrics for situational awareness systems. IET Biom. 2(2), 35–47 (2013)CrossRef Poursaberi, A., Vana, J., Mracek, S., Dvora, R., Yanushkevich, S., Drahansky, M., Shmerko, V., Gavrilova, M.: Facial biometrics for situational awareness systems. IET Biom. 2(2), 35–47 (2013)CrossRef
14.
go back to reference Yanushkevich, S., Shmerko, V., Boulanov, O., Stoica, A.: Decision-making support in biometric-based physical access control systems: Design concept, architecture, and applications. In: Boulgouris, N.V., Plataniotis, K.N., Micheli-Tzanakou, E. (eds.) Biometrics: Theory, Methods, and Applications, pp. 599–631. IEEE Press, Wiley (2010) Yanushkevich, S., Shmerko, V., Boulanov, O., Stoica, A.: Decision-making support in biometric-based physical access control systems: Design concept, architecture, and applications. In: Boulgouris, N.V., Plataniotis, K.N., Micheli-Tzanakou, E. (eds.) Biometrics: Theory, Methods, and Applications, pp. 599–631. IEEE Press, Wiley (2010)
17.
go back to reference McBreen, H.M., Jack, M.A.: Evaluating humanoid synthetic agents in e-retail applications. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 31(5), 394–405 (2001)CrossRef McBreen, H.M., Jack, M.A.: Evaluating humanoid synthetic agents in e-retail applications. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 31(5), 394–405 (2001)CrossRef
18.
go back to reference Eastwood, S.C., Yanushkevich, S.N., Drahansky, M.: Biometric intelligence in authentication machines: from talking faces to talking robots. In: Proceedings IIAI 3rd International Conference Advanced Applied Informatics, Japan, pp. 763–768 (2014) Eastwood, S.C., Yanushkevich, S.N., Drahansky, M.: Biometric intelligence in authentication machines: from talking faces to talking robots. In: Proceedings IIAI 3rd International Conference Advanced Applied Informatics, Japan, pp. 763–768 (2014)
19.
go back to reference Nunamaker Jr, J.F., Derrick, D.C., Elkins, A.C., Burgoon, J.K., Patton, M.W.: Embodied conversational agent-based kiosk for automated interviewing. J Manag. Inf. Syst. 28(1), 17–48 (2011)CrossRef Nunamaker Jr, J.F., Derrick, D.C., Elkins, A.C., Burgoon, J.K., Patton, M.W.: Embodied conversational agent-based kiosk for automated interviewing. J Manag. Inf. Syst. 28(1), 17–48 (2011)CrossRef
20.
go back to reference McLay, L.A., Lee, A.J., Jacobson, S.H.: Risk-based policies for airport security checkpoint screening. J. Transp. Sci. 44(3), 333–349 (2010)CrossRef McLay, L.A., Lee, A.J., Jacobson, S.H.: Risk-based policies for airport security checkpoint screening. J. Transp. Sci. 44(3), 333–349 (2010)CrossRef
21.
go back to reference Nie, X., Batta, R., Drury, C.G., Lin, L.: Passenger grouping with risk levels in an airport security system. Eur. J. Oper. Res. 194(2), 574–584 (2009)MathSciNetCrossRefMATH Nie, X., Batta, R., Drury, C.G., Lin, L.: Passenger grouping with risk levels in an airport security system. Eur. J. Oper. Res. 194(2), 574–584 (2009)MathSciNetCrossRefMATH
22.
23.
go back to reference SITA: END-to-end border management: An integrated approach to passenger data collection, identity verification and risk management. SITA positioning paper (2012) SITA: END-to-end border management: An integrated approach to passenger data collection, identity verification and risk management. SITA positioning paper (2012)
24.
go back to reference Fiondella, L., Gokhale, S.S., Lownes, N., Accorsi, M.: Security and performance analysis of a passenger screening checkpoint for mass-transit systems. In: Proceedings IEEE Conference Technologies for Homeland Security (HST), pp. 312–318 (2012) Fiondella, L., Gokhale, S.S., Lownes, N., Accorsi, M.: Security and performance analysis of a passenger screening checkpoint for mass-transit systems. In: Proceedings IEEE Conference Technologies for Homeland Security (HST), pp. 312–318 (2012)
27.
go back to reference Frontex: BIOPASS II Automated biometric border crossing systems based on electronic passports and facial recognition: RAPID and SmartGate. Research and Development Unit, Frontex, Warsaw (2010). http://www.frontex.europa.eu Frontex: BIOPASS II Automated biometric border crossing systems based on electronic passports and facial recognition: RAPID and SmartGate. Research and Development Unit, Frontex, Warsaw (2010). http://​www.​frontex.​europa.​eu
28.
go back to reference Bigo, D.S. et al.: Justice and Home Affairs Databases and a Smart Borders System at EU External Borders An Evaluation of Current and Forthcoming Proposals for European Policy Studies (CEPS), No. 52/Dec. (2012) Bigo, D.S. et al.: Justice and Home Affairs Databases and a Smart Borders System at EU External Borders An Evaluation of Current and Forthcoming Proposals for European Policy Studies (CEPS), No. 52/Dec. (2012)
31.
go back to reference Eastwood, S.C., Shmerko, V.P., Yanushkevich, S.N., Drahansky, M., Gorodnichy, D.O.: Biometric-enabled authentication machines: A survey of open-set real-world applications. IEEE Trans. Hum. Mach. Syst. early access, May 2015 Eastwood, S.C., Shmerko, V.P., Yanushkevich, S.N., Drahansky, M., Gorodnichy, D.O.: Biometric-enabled authentication machines: A survey of open-set real-world applications. IEEE Trans. Hum. Mach. Syst. early access, May 2015
32.
go back to reference Yanushkevich, S.N., Eastwood, S.C., Drahansky, M., Shmerko, V.P.: Taxonomy of Impersonation Phenomenon in Authentication Machines for e-Borders. Proc. Int. Conf. Emerg. Secur. Technol. (2015) Yanushkevich, S.N., Eastwood, S.C., Drahansky, M., Shmerko, V.P.: Taxonomy of Impersonation Phenomenon in Authentication Machines for e-Borders. Proc. Int. Conf. Emerg. Secur. Technol. (2015)
33.
go back to reference Waltz, E., Llinas, J.: Multisensor Data Fusion. Artech House, MA (1990) Waltz, E., Llinas, J.: Multisensor Data Fusion. Artech House, MA (1990)
34.
go back to reference Eastwood, S.C., Yanushkevich, S.N.: Risk profiler in automated human authentication. In: Proceedings IEEE Workshop on Computational Intelligence in Biometrics and Identity Management—CIBIM, Orlando, Florida (2014) Eastwood, S.C., Yanushkevich, S.N.: Risk profiler in automated human authentication. In: Proceedings IEEE Workshop on Computational Intelligence in Biometrics and Identity Management—CIBIM, Orlando, Florida (2014)
35.
go back to reference Yanushkevich, S.N., Stoica, A., Shmerko, V.P.: Experience of design and prototyping of a multi-biometric early warning physical access control security system (PASS) and a training system (T-PASS). In: Proceedings of the 32nd Annual IEEE Industrial Electronics Society Conference, pp. 2347–2352. Paris, France (2006) Yanushkevich, S.N., Stoica, A., Shmerko, V.P.: Experience of design and prototyping of a multi-biometric early warning physical access control security system (PASS) and a training system (T-PASS). In: Proceedings of the 32nd Annual IEEE Industrial Electronics Society Conference, pp. 2347–2352. Paris, France (2006)
36.
go back to reference Sacanamboy, M., Cukic, B.: Combined performance and risk analysis for border management applications. In: Proceedings IEEE/IFIP Conference Dependable Systems and Networks (DSN), pp. 403–412 (2010) Sacanamboy, M., Cukic, B.: Combined performance and risk analysis for border management applications. In: Proceedings IEEE/IFIP Conference Dependable Systems and Networks (DSN), pp. 403–412 (2010)
39.
go back to reference Aven, T.: Foundations of Risk Analysis, 2nd edn. Wiley (2012) Aven, T.: Foundations of Risk Analysis, 2nd edn. Wiley (2012)
40.
go back to reference Koller, D., Friedman, N.: Probabilistic Graphical Models: Principles and Techniques, MIT Press (2009) Koller, D., Friedman, N.: Probabilistic Graphical Models: Principles and Techniques, MIT Press (2009)
41.
go back to reference Frey, B.J., Jojic, N.: A comparison of algorithms for inference and learning in probabilistic graphical models. IEEE Trans. Pattern Anal. Mach. Intell. 27(9), 1392–1416 (2005)CrossRef Frey, B.J., Jojic, N.: A comparison of algorithms for inference and learning in probabilistic graphical models. IEEE Trans. Pattern Anal. Mach. Intell. 27(9), 1392–1416 (2005)CrossRef
42.
go back to reference Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)MATH Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)MATH
44.
go back to reference Bishop, C.M.: Pattern Recognition and Machine Learning. Springer, New York (2006)MATH Bishop, C.M.: Pattern Recognition and Machine Learning. Springer, New York (2006)MATH
45.
go back to reference Delmotte, F., Smets, P.: Target identification based on the transferable belief model interpretation of Dempster-Shafer model. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 34(4), 457–471 (2004)CrossRef Delmotte, F., Smets, P.: Target identification based on the transferable belief model interpretation of Dempster-Shafer model. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 34(4), 457–471 (2004)CrossRef
46.
go back to reference Papakostas, G.A., et al.: Fuzzy cognitive maps for pattern recognition applications. Int. J. Pattern Recognit. Artif. Intell. 22, 1461–1486 (2008)CrossRef Papakostas, G.A., et al.: Fuzzy cognitive maps for pattern recognition applications. Int. J. Pattern Recognit. Artif. Intell. 22, 1461–1486 (2008)CrossRef
47.
go back to reference Jang, J.-S.R.: ANFIS: adaptive-network-based fuzzy inference systems. IEEE Trans. Syst. Man Cybern. 23, 665–685 (1993)CrossRef Jang, J.-S.R.: ANFIS: adaptive-network-based fuzzy inference systems. IEEE Trans. Syst. Man Cybern. 23, 665–685 (1993)CrossRef
48.
go back to reference Yager, R.R., Filev, D.P.: Including probabilistic uncertainty in fuzzy logic controller modeling using Dempster-Shafer theory. IEEE Trans. Syst. Man Cybern. 25(8), 1221–1230 (1995)CrossRef Yager, R.R., Filev, D.P.: Including probabilistic uncertainty in fuzzy logic controller modeling using Dempster-Shafer theory. IEEE Trans. Syst. Man Cybern. 25(8), 1221–1230 (1995)CrossRef
49.
go back to reference Yager, R.R.: Human behavioral modeling using fuzzy and Dempster Shafer theory, Social Computing, Behavioral Modeling, and Prediction, pp. 89–99. Springer, US (2008)CrossRef Yager, R.R.: Human behavioral modeling using fuzzy and Dempster Shafer theory, Social Computing, Behavioral Modeling, and Prediction, pp. 89–99. Springer, US (2008)CrossRef
50.
go back to reference Denoeux, T.: A neural network classifier based on Dempster-Shafer theory. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 30(2), 131–150 (2000)MathSciNetCrossRef Denoeux, T.: A neural network classifier based on Dempster-Shafer theory. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 30(2), 131–150 (2000)MathSciNetCrossRef
51.
go back to reference Klein, L.A.: Sensor and Data Fusion: A Tool for Information Assessment and decision Making. SPIE, Bellingham (2007) Klein, L.A.: Sensor and Data Fusion: A Tool for Information Assessment and decision Making. SPIE, Bellingham (2007)
52.
go back to reference Bier, V.M., Azaiez, M.N. (eds.): Game Theoretic Risk Analysis of Security Threats. Springer, US (2009)MATH Bier, V.M., Azaiez, M.N. (eds.): Game Theoretic Risk Analysis of Security Threats. Springer, US (2009)MATH
53.
go back to reference Barber, D.: Bayesian Reasoning and Machine Learning. Cambridge University Press, Cambridge (2012)MATH Barber, D.: Bayesian Reasoning and Machine Learning. Cambridge University Press, Cambridge (2012)MATH
55.
go back to reference Hwang, K., Cho, S.: Landmark detection from mobile life log using a modular Bayesian network model. Expert Syst. Appl. 36(10), 12065–12076 (2009)CrossRef Hwang, K., Cho, S.: Landmark detection from mobile life log using a modular Bayesian network model. Expert Syst. Appl. 36(10), 12065–12076 (2009)CrossRef
56.
go back to reference Eastwood, S.C., Yanushkevich, S.N., Shmerko, V.P.: Belief network support via decision diagrams. In: Proceedings of the 45th IEEE International Symposium on Multiple-Valued Logic (2015) Eastwood, S.C., Yanushkevich, S.N., Shmerko, V.P.: Belief network support via decision diagrams. In: Proceedings of the 45th IEEE International Symposium on Multiple-Valued Logic (2015)
58.
Metadata
Title
Risk Assessment in Authentication Machines
Authors
S. Eastwood
S. Yanushkevich
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-26450-9_15

Premium Partner