Publication detail

Taxonomy and Modeling of Impersonation in e-Border Authentication

YANUSHKEVICH, S. EASTWOOD, S. MANDERSON, T. SAMOIL, S. DRAHANSKÝ, M. SHMERKO, V.

Original Title

Taxonomy and Modeling of Impersonation in e-Border Authentication

English Title

Taxonomy and Modeling of Impersonation in e-Border Authentication

Type

conference paper

Language

en

Original Abstract

Impersonation is a phenomenon of biometric enabled authentication machines. The focus of this paper is authentication machines for border crossing applications (eborders). A novel taxonomy of impersonation and seven impersonation strategies for border crossing control applications are proposed. We identify conditions for impersonation and reinforced factors for various scenarios of e-border crossing automation. Also, conditions of immunity to impersonation are specified. A demonstrative experiment using a Dempster-Shafer approach to the detection of impersonation phenomena is introduced. This lays a foundation for the study of the vulnerabilities of authentication machines for e-borders to the specified impersonation strategies.

English abstract

Impersonation is a phenomenon of biometric enabled authentication machines. The focus of this paper is authentication machines for border crossing applications (eborders). A novel taxonomy of impersonation and seven impersonation strategies for border crossing control applications are proposed. We identify conditions for impersonation and reinforced factors for various scenarios of e-border crossing automation. Also, conditions of immunity to impersonation are specified. A demonstrative experiment using a Dempster-Shafer approach to the detection of impersonation phenomena is introduced. This lays a foundation for the study of the vulnerabilities of authentication machines for e-borders to the specified impersonation strategies.

Keywords

impersonation, authentication, biometrics, attacks, e-borders, e-passport, human-machine interactions

RIV year

2015

Released

03.09.2015

Publisher

Technische Universität Braunschweig

Location

Braunschweig

ISBN

978-1-61208-427-5

Book

Proceedings of EST 2015

Edition

NEUVEDEN

Edition number

NEUVEDEN

Pages from

1

Pages to

6

Pages count

6

BibTex


@inproceedings{BUT119868,
  author="Svetlana {Yanushkevich} and Shawn {Eastwood} and Travis {Manderson} and Steven {Samoil} and Martin {Drahanský} and Vlad. {Shmerko}",
  title="Taxonomy and Modeling of Impersonation in e-Border Authentication",
  annote="Impersonation is a phenomenon of biometric enabled authentication machines. The
focus of this paper is authentication machines for border crossing applications
(eborders). A novel taxonomy of impersonation and seven impersonation strategies
for border crossing control applications are proposed. We identify conditions for
impersonation and reinforced factors for various scenarios of e-border crossing
automation. Also, conditions of immunity to impersonation are specified.
A demonstrative experiment using a Dempster-Shafer approach to the detection of
impersonation phenomena is introduced. This lays a foundation for the study of
the vulnerabilities of authentication machines for e-borders to the
specified impersonation strategies.",
  address="Technische Universität Braunschweig",
  booktitle="Proceedings of EST 2015",
  chapter="119868",
  doi="10.1109/EST.2015.18",
  edition="NEUVEDEN",
  howpublished="print",
  institution="Technische Universität Braunschweig",
  year="2015",
  month="september",
  pages="1--6",
  publisher="Technische Universität Braunschweig",
  type="conference paper"
}