Skip to main content

2016 | OriginalPaper | Buchkapitel

Risk Assessment in Authentication Machines

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This work introduces an approach to building a risk profiler for use in authentication machines. Authentication machine application scenarios include the security of large public events, pandemic prevention, and border crossing automation. The proposed risk profiler provides a risk assessment at all phases of the authentication machine life-cycle. The key idea of our approach is to utilize the advantages of belief networks to solve large-scale multi-source fusion problems. We extend the abilities of belief networks by incorporating Dempster-Shafer Theory measures, and report the design techniques by using the results of the prototyping of possible attack scenarios. The software package is available for researchers.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The e-passport and e-ID are defined by the ICAO standard, and are the key components of advanced border control technologies [54]. The face was recommended as the primary biometric, mandatory for global interoperability in the passport inspection systems. Fingerprint and iris were recommended as secondary biometrics.
 
Literatur
3.
Zurück zum Zitat Daniels, D., Hudson, L.D., Laskey, K.B., et al.: Terrorism risk management. In: Pourret, O., Naim, P., Markot, B. (eds.) Bayesian Networks; A Practical Guide to Applications, pp. 239–262. Willey (2008) Daniels, D., Hudson, L.D., Laskey, K.B., et al.: Terrorism risk management. In: Pourret, O., Naim, P., Markot, B. (eds.) Bayesian Networks; A Practical Guide to Applications, pp. 239–262. Willey (2008)
4.
Zurück zum Zitat ISO/IEC FDIS 30108-1:2015(E), Information technology—Biometric Identity Assurance Services—Part 1: BIAS services, International Organization for Standardization (2015) ISO/IEC FDIS 30108-1:2015(E), Information technology—Biometric Identity Assurance Services—Part 1: BIAS services, International Organization for Standardization (2015)
5.
Zurück zum Zitat Bolle, R., Connell, J., Pankanti, S., Ratha, N., Senior, A.: Guide to Biometrics. Springer, New York (2004)CrossRef Bolle, R., Connell, J., Pankanti, S., Ratha, N., Senior, A.: Guide to Biometrics. Springer, New York (2004)CrossRef
6.
Zurück zum Zitat Jain, A., Bolle, R., Pankanti, S. (eds.): Biometrics: Personal Identification in a Networked Society. Kluwer (1999) Jain, A., Bolle, R., Pankanti, S. (eds.): Biometrics: Personal Identification in a Networked Society. Kluwer (1999)
7.
Zurück zum Zitat Miller, B.: Vital signs of identity. IEEE Spect. 31(2), 22–30 (1994)CrossRef Miller, B.: Vital signs of identity. IEEE Spect. 31(2), 22–30 (1994)CrossRef
8.
Zurück zum Zitat Back, J.: Posture monitoring system for context awareness in mobile computing. IEEE Trans. Instrum. Meas. 59(6), 1589–1599 (2010)CrossRef Back, J.: Posture monitoring system for context awareness in mobile computing. IEEE Trans. Instrum. Meas. 59(6), 1589–1599 (2010)CrossRef
9.
Zurück zum Zitat Creese, S., Gibson-Robinson, T., Goldsmith, M., et al.: Tools for understanding identity. In: Proceedings IEEE Conference Technologies for Homeland (2013) Creese, S., Gibson-Robinson, T., Goldsmith, M., et al.: Tools for understanding identity. In: Proceedings IEEE Conference Technologies for Homeland (2013)
11.
Zurück zum Zitat NIST: Mobile ID Device Best Practice Recommendation Version 1.0, NISTSP 500-280 (2009) NIST: Mobile ID Device Best Practice Recommendation Version 1.0, NISTSP 500-280 (2009)
12.
Zurück zum Zitat Pavlidis, I., Levine, J.: Thermal image analysis for polygraph testing. IEEE Trans. Eng. Med. Biol. Mag. 6, 56–64 (2002)CrossRef Pavlidis, I., Levine, J.: Thermal image analysis for polygraph testing. IEEE Trans. Eng. Med. Biol. Mag. 6, 56–64 (2002)CrossRef
13.
Zurück zum Zitat Poursaberi, A., Vana, J., Mracek, S., Dvora, R., Yanushkevich, S., Drahansky, M., Shmerko, V., Gavrilova, M.: Facial biometrics for situational awareness systems. IET Biom. 2(2), 35–47 (2013)CrossRef Poursaberi, A., Vana, J., Mracek, S., Dvora, R., Yanushkevich, S., Drahansky, M., Shmerko, V., Gavrilova, M.: Facial biometrics for situational awareness systems. IET Biom. 2(2), 35–47 (2013)CrossRef
14.
Zurück zum Zitat Yanushkevich, S., Shmerko, V., Boulanov, O., Stoica, A.: Decision-making support in biometric-based physical access control systems: Design concept, architecture, and applications. In: Boulgouris, N.V., Plataniotis, K.N., Micheli-Tzanakou, E. (eds.) Biometrics: Theory, Methods, and Applications, pp. 599–631. IEEE Press, Wiley (2010) Yanushkevich, S., Shmerko, V., Boulanov, O., Stoica, A.: Decision-making support in biometric-based physical access control systems: Design concept, architecture, and applications. In: Boulgouris, N.V., Plataniotis, K.N., Micheli-Tzanakou, E. (eds.) Biometrics: Theory, Methods, and Applications, pp. 599–631. IEEE Press, Wiley (2010)
17.
Zurück zum Zitat McBreen, H.M., Jack, M.A.: Evaluating humanoid synthetic agents in e-retail applications. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 31(5), 394–405 (2001)CrossRef McBreen, H.M., Jack, M.A.: Evaluating humanoid synthetic agents in e-retail applications. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 31(5), 394–405 (2001)CrossRef
18.
Zurück zum Zitat Eastwood, S.C., Yanushkevich, S.N., Drahansky, M.: Biometric intelligence in authentication machines: from talking faces to talking robots. In: Proceedings IIAI 3rd International Conference Advanced Applied Informatics, Japan, pp. 763–768 (2014) Eastwood, S.C., Yanushkevich, S.N., Drahansky, M.: Biometric intelligence in authentication machines: from talking faces to talking robots. In: Proceedings IIAI 3rd International Conference Advanced Applied Informatics, Japan, pp. 763–768 (2014)
19.
Zurück zum Zitat Nunamaker Jr, J.F., Derrick, D.C., Elkins, A.C., Burgoon, J.K., Patton, M.W.: Embodied conversational agent-based kiosk for automated interviewing. J Manag. Inf. Syst. 28(1), 17–48 (2011)CrossRef Nunamaker Jr, J.F., Derrick, D.C., Elkins, A.C., Burgoon, J.K., Patton, M.W.: Embodied conversational agent-based kiosk for automated interviewing. J Manag. Inf. Syst. 28(1), 17–48 (2011)CrossRef
20.
Zurück zum Zitat McLay, L.A., Lee, A.J., Jacobson, S.H.: Risk-based policies for airport security checkpoint screening. J. Transp. Sci. 44(3), 333–349 (2010)CrossRef McLay, L.A., Lee, A.J., Jacobson, S.H.: Risk-based policies for airport security checkpoint screening. J. Transp. Sci. 44(3), 333–349 (2010)CrossRef
21.
Zurück zum Zitat Nie, X., Batta, R., Drury, C.G., Lin, L.: Passenger grouping with risk levels in an airport security system. Eur. J. Oper. Res. 194(2), 574–584 (2009)MathSciNetCrossRefMATH Nie, X., Batta, R., Drury, C.G., Lin, L.: Passenger grouping with risk levels in an airport security system. Eur. J. Oper. Res. 194(2), 574–584 (2009)MathSciNetCrossRefMATH
22.
23.
Zurück zum Zitat SITA: END-to-end border management: An integrated approach to passenger data collection, identity verification and risk management. SITA positioning paper (2012) SITA: END-to-end border management: An integrated approach to passenger data collection, identity verification and risk management. SITA positioning paper (2012)
24.
Zurück zum Zitat Fiondella, L., Gokhale, S.S., Lownes, N., Accorsi, M.: Security and performance analysis of a passenger screening checkpoint for mass-transit systems. In: Proceedings IEEE Conference Technologies for Homeland Security (HST), pp. 312–318 (2012) Fiondella, L., Gokhale, S.S., Lownes, N., Accorsi, M.: Security and performance analysis of a passenger screening checkpoint for mass-transit systems. In: Proceedings IEEE Conference Technologies for Homeland Security (HST), pp. 312–318 (2012)
27.
Zurück zum Zitat Frontex: BIOPASS II Automated biometric border crossing systems based on electronic passports and facial recognition: RAPID and SmartGate. Research and Development Unit, Frontex, Warsaw (2010). http://www.frontex.europa.eu Frontex: BIOPASS II Automated biometric border crossing systems based on electronic passports and facial recognition: RAPID and SmartGate. Research and Development Unit, Frontex, Warsaw (2010). http://​www.​frontex.​europa.​eu
28.
Zurück zum Zitat Bigo, D.S. et al.: Justice and Home Affairs Databases and a Smart Borders System at EU External Borders An Evaluation of Current and Forthcoming Proposals for European Policy Studies (CEPS), No. 52/Dec. (2012) Bigo, D.S. et al.: Justice and Home Affairs Databases and a Smart Borders System at EU External Borders An Evaluation of Current and Forthcoming Proposals for European Policy Studies (CEPS), No. 52/Dec. (2012)
31.
Zurück zum Zitat Eastwood, S.C., Shmerko, V.P., Yanushkevich, S.N., Drahansky, M., Gorodnichy, D.O.: Biometric-enabled authentication machines: A survey of open-set real-world applications. IEEE Trans. Hum. Mach. Syst. early access, May 2015 Eastwood, S.C., Shmerko, V.P., Yanushkevich, S.N., Drahansky, M., Gorodnichy, D.O.: Biometric-enabled authentication machines: A survey of open-set real-world applications. IEEE Trans. Hum. Mach. Syst. early access, May 2015
32.
Zurück zum Zitat Yanushkevich, S.N., Eastwood, S.C., Drahansky, M., Shmerko, V.P.: Taxonomy of Impersonation Phenomenon in Authentication Machines for e-Borders. Proc. Int. Conf. Emerg. Secur. Technol. (2015) Yanushkevich, S.N., Eastwood, S.C., Drahansky, M., Shmerko, V.P.: Taxonomy of Impersonation Phenomenon in Authentication Machines for e-Borders. Proc. Int. Conf. Emerg. Secur. Technol. (2015)
33.
Zurück zum Zitat Waltz, E., Llinas, J.: Multisensor Data Fusion. Artech House, MA (1990) Waltz, E., Llinas, J.: Multisensor Data Fusion. Artech House, MA (1990)
34.
Zurück zum Zitat Eastwood, S.C., Yanushkevich, S.N.: Risk profiler in automated human authentication. In: Proceedings IEEE Workshop on Computational Intelligence in Biometrics and Identity Management—CIBIM, Orlando, Florida (2014) Eastwood, S.C., Yanushkevich, S.N.: Risk profiler in automated human authentication. In: Proceedings IEEE Workshop on Computational Intelligence in Biometrics and Identity Management—CIBIM, Orlando, Florida (2014)
35.
Zurück zum Zitat Yanushkevich, S.N., Stoica, A., Shmerko, V.P.: Experience of design and prototyping of a multi-biometric early warning physical access control security system (PASS) and a training system (T-PASS). In: Proceedings of the 32nd Annual IEEE Industrial Electronics Society Conference, pp. 2347–2352. Paris, France (2006) Yanushkevich, S.N., Stoica, A., Shmerko, V.P.: Experience of design and prototyping of a multi-biometric early warning physical access control security system (PASS) and a training system (T-PASS). In: Proceedings of the 32nd Annual IEEE Industrial Electronics Society Conference, pp. 2347–2352. Paris, France (2006)
36.
Zurück zum Zitat Sacanamboy, M., Cukic, B.: Combined performance and risk analysis for border management applications. In: Proceedings IEEE/IFIP Conference Dependable Systems and Networks (DSN), pp. 403–412 (2010) Sacanamboy, M., Cukic, B.: Combined performance and risk analysis for border management applications. In: Proceedings IEEE/IFIP Conference Dependable Systems and Networks (DSN), pp. 403–412 (2010)
39.
Zurück zum Zitat Aven, T.: Foundations of Risk Analysis, 2nd edn. Wiley (2012) Aven, T.: Foundations of Risk Analysis, 2nd edn. Wiley (2012)
40.
Zurück zum Zitat Koller, D., Friedman, N.: Probabilistic Graphical Models: Principles and Techniques, MIT Press (2009) Koller, D., Friedman, N.: Probabilistic Graphical Models: Principles and Techniques, MIT Press (2009)
41.
Zurück zum Zitat Frey, B.J., Jojic, N.: A comparison of algorithms for inference and learning in probabilistic graphical models. IEEE Trans. Pattern Anal. Mach. Intell. 27(9), 1392–1416 (2005)CrossRef Frey, B.J., Jojic, N.: A comparison of algorithms for inference and learning in probabilistic graphical models. IEEE Trans. Pattern Anal. Mach. Intell. 27(9), 1392–1416 (2005)CrossRef
42.
Zurück zum Zitat Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)MATH Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)MATH
44.
Zurück zum Zitat Bishop, C.M.: Pattern Recognition and Machine Learning. Springer, New York (2006)MATH Bishop, C.M.: Pattern Recognition and Machine Learning. Springer, New York (2006)MATH
45.
Zurück zum Zitat Delmotte, F., Smets, P.: Target identification based on the transferable belief model interpretation of Dempster-Shafer model. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 34(4), 457–471 (2004)CrossRef Delmotte, F., Smets, P.: Target identification based on the transferable belief model interpretation of Dempster-Shafer model. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 34(4), 457–471 (2004)CrossRef
46.
Zurück zum Zitat Papakostas, G.A., et al.: Fuzzy cognitive maps for pattern recognition applications. Int. J. Pattern Recognit. Artif. Intell. 22, 1461–1486 (2008)CrossRef Papakostas, G.A., et al.: Fuzzy cognitive maps for pattern recognition applications. Int. J. Pattern Recognit. Artif. Intell. 22, 1461–1486 (2008)CrossRef
47.
Zurück zum Zitat Jang, J.-S.R.: ANFIS: adaptive-network-based fuzzy inference systems. IEEE Trans. Syst. Man Cybern. 23, 665–685 (1993)CrossRef Jang, J.-S.R.: ANFIS: adaptive-network-based fuzzy inference systems. IEEE Trans. Syst. Man Cybern. 23, 665–685 (1993)CrossRef
48.
Zurück zum Zitat Yager, R.R., Filev, D.P.: Including probabilistic uncertainty in fuzzy logic controller modeling using Dempster-Shafer theory. IEEE Trans. Syst. Man Cybern. 25(8), 1221–1230 (1995)CrossRef Yager, R.R., Filev, D.P.: Including probabilistic uncertainty in fuzzy logic controller modeling using Dempster-Shafer theory. IEEE Trans. Syst. Man Cybern. 25(8), 1221–1230 (1995)CrossRef
49.
Zurück zum Zitat Yager, R.R.: Human behavioral modeling using fuzzy and Dempster Shafer theory, Social Computing, Behavioral Modeling, and Prediction, pp. 89–99. Springer, US (2008)CrossRef Yager, R.R.: Human behavioral modeling using fuzzy and Dempster Shafer theory, Social Computing, Behavioral Modeling, and Prediction, pp. 89–99. Springer, US (2008)CrossRef
50.
Zurück zum Zitat Denoeux, T.: A neural network classifier based on Dempster-Shafer theory. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 30(2), 131–150 (2000)MathSciNetCrossRef Denoeux, T.: A neural network classifier based on Dempster-Shafer theory. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 30(2), 131–150 (2000)MathSciNetCrossRef
51.
Zurück zum Zitat Klein, L.A.: Sensor and Data Fusion: A Tool for Information Assessment and decision Making. SPIE, Bellingham (2007) Klein, L.A.: Sensor and Data Fusion: A Tool for Information Assessment and decision Making. SPIE, Bellingham (2007)
52.
Zurück zum Zitat Bier, V.M., Azaiez, M.N. (eds.): Game Theoretic Risk Analysis of Security Threats. Springer, US (2009)MATH Bier, V.M., Azaiez, M.N. (eds.): Game Theoretic Risk Analysis of Security Threats. Springer, US (2009)MATH
53.
Zurück zum Zitat Barber, D.: Bayesian Reasoning and Machine Learning. Cambridge University Press, Cambridge (2012)MATH Barber, D.: Bayesian Reasoning and Machine Learning. Cambridge University Press, Cambridge (2012)MATH
55.
Zurück zum Zitat Hwang, K., Cho, S.: Landmark detection from mobile life log using a modular Bayesian network model. Expert Syst. Appl. 36(10), 12065–12076 (2009)CrossRef Hwang, K., Cho, S.: Landmark detection from mobile life log using a modular Bayesian network model. Expert Syst. Appl. 36(10), 12065–12076 (2009)CrossRef
56.
Zurück zum Zitat Eastwood, S.C., Yanushkevich, S.N., Shmerko, V.P.: Belief network support via decision diagrams. In: Proceedings of the 45th IEEE International Symposium on Multiple-Valued Logic (2015) Eastwood, S.C., Yanushkevich, S.N., Shmerko, V.P.: Belief network support via decision diagrams. In: Proceedings of the 45th IEEE International Symposium on Multiple-Valued Logic (2015)
58.
Metadaten
Titel
Risk Assessment in Authentication Machines
verfasst von
S. Eastwood
S. Yanushkevich
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-26450-9_15

Premium Partner