Abstract
Biometric technology allows a computer system to identify and authenticate a person directly based on physical or behavioral traits [1]. However passwords and tokens that are currently widely used for authentication purposes do not directly authenticate a person; whenever a person offers a password or token the system only authenticates the presented password or token as authentic, but not the actual person presenting it [2], [8]. For this reason a lot of research went into developing a protocol that will allow a person to securely use a biometric token for personal authentication. Biometric technology is an attractive option for authenticating a person as there is a direct link between the person and a person’s biometric token. This paper discusses a protocol, named BioVault. BioVault ensures safe transport of biometric tokens over un-secure networked environment without using any encryption technologies. The BioVault protocol also lays the foundation for biometrically based encryption, and biometrically based digital signatures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ashbourn, J.: Biometrics: Advanced Identity Verification: The CompleteGuide, ISBN: 978-1852332433
Von Solms, S.H., Tait, B.L.: Solving the problem of replay in Biometrics- An electronic commerce Example. In: Proceedings of 5th IFIP Conference on Challenges of expanding internet: E-commerce, E-business, and E-government (I3E 2005), Poznan, Poland, October 28-30, pp. 468–479. Springer, Heidelberg (2005)
Thalheim, Krissler, Ziegler: Body Check. C’t Magazine 11, 114 (2002)
Woodward Jr., J.D., Orleans, N.M.: Identity assurance in the information Age – Biometrics, ISBN 0-07-222227-1
Higgins, P.T.: Principal investigator for MITRE experimentation in Biometrics (1990)
Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of artificial gummy fingers on fingerprint systems. In: Proceedings of SPIE, Optical security and counterfeit deterrence techniques IV, vol. 4677 (2002)
Tait, B.L., von Solms, S.H.: BioVault: a Secure Networked Biometric Protocol, D.Com Dissertation, University of Johannesburg (2008)
Digital Persona – U are U technologies: http://www.digitalpersona.com
Willis, David, Lee, M.: Biometrics under your thumb. Network computing (June 1, 1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tait, B., von Solms, B. (2008). Secure Biometrically Based Authentication Protocol for a Public Network Environment. In: Jahankhani, H., Revett, K., Palmer-Brown, D. (eds) Global E-Security. ICGeS 2008. Communications in Computer and Information Science, vol 12. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69403-8_28
Download citation
DOI: https://doi.org/10.1007/978-3-540-69403-8_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69402-1
Online ISBN: 978-3-540-69403-8
eBook Packages: Computer ScienceComputer Science (R0)