Abstract
User authentication is the first and probably the most challenging step in achieving secure person-to-person communications. Most of the existing authentication schemes require communicating parties either share a secret/password or know each other’s public key. In this paper we suggest a novel user authentication scheme that is easy to use and overcomes the requirements of sharing password or public keys. Our scheme allows two human users to perform mutual authentication and have secure communications over an open channel by exchanging biometrics signals (e. g., voice or video signals). In addition to user authentication, our scheme establishes a secret session key between two users by cryptographically binding biometrics signals with users’s Diffie-Hellman public values. Under the assumption that the two communicating persons are familiar with each other’s biometrics signals, we show that the scheme is secure against various attacks, including the man-in-the-middle attack. The proposed scheme is highly suitable for applications such as Voice-over-IP.
Chapter PDF
Similar content being viewed by others
Keywords
- User Authentication
- Authentication Protocol
- Mutual Authentication
- Remote User
- User Authentication Scheme
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Reference
D. Otway and O. Rees, “Efficient and timely authentication”, Operating Systems Review, Vol. 21, No. 1, pp. 8–10, 1987.
C. Kaufman, R. Perlman, and M. Speciner, Network Security-Private Communication in A Public World, PTR Prentice Hall, Englewoor Cliffs, NJ, 1995.
R. H. Deng, J. Zhou and F. Bao, “Defending against redirect attacks in mobile IP,” ACM Conference on Computer and Communications Security, pp. 59–67, 2002.
P. Zimmermann, PGPfone Owner’s Manual, Version 1.0 beta 5, 5 January 1996, http://web.mit.edu/network/pgpfone/manual.
Hunt and A. Black, “Unit selection in a concatenative speech synthesis system using large speech database,” IEEE International Conf. on Acoustics, Speech, and Signal Processing (ICASSP), pp.373–376, 1996.
Matthias Jilka, Ann K. Syrdal, Alistair D. Conkie and David A. Kapilow, “Effects on TTS Quality of Methods of Realizing Natural Prosodic Variations,” 15th International Congress of Phonics Science (ICPhS) 2003.
TTS, https://research.microsoft.com/speech/tts/TTS.dll?TTS
AT&T, TTS: Synthesis of Audible Speech from Text, http://www.research.att.com/projects/tts/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this paper
Cite this paper
Wu, Y., Bao, F., Deng, R.H. (2005). Secure Human Communications Based on Biometrics Signals. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds) Security and Privacy in the Age of Ubiquitous Computing. SEC 2005. IFIP Advances in Information and Communication Technology, vol 181. Springer, Boston, MA. https://doi.org/10.1007/0-387-25660-1_14
Download citation
DOI: https://doi.org/10.1007/0-387-25660-1_14
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-25658-0
Online ISBN: 978-0-387-25660-3
eBook Packages: Computer ScienceComputer Science (R0)