Detail publikace

Taxonomy and Modeling of Impersonation in e-Border Authentication

Originální název

Taxonomy and Modeling of Impersonation in e-Border Authentication

Anglický název

Taxonomy and Modeling of Impersonation in e-Border Authentication

Jazyk

en

Originální abstrakt

Impersonation is a phenomenon of biometric enabled authentication machines. The focus of this paper is authentication machines for border crossing applications (eborders). A novel taxonomy of impersonation and seven impersonation strategies for border crossing control applications are proposed. We identify conditions for impersonation and reinforced factors for various scenarios of e-border crossing automation. Also, conditions of immunity to impersonation are specified. A demonstrative experiment using a Dempster-Shafer approach to the detection of impersonation phenomena is introduced. This lays a foundation for the study of the vulnerabilities of authentication machines for e-borders to the specified impersonation strategies.

Anglický abstrakt

Impersonation is a phenomenon of biometric enabled authentication machines. The focus of this paper is authentication machines for border crossing applications (eborders). A novel taxonomy of impersonation and seven impersonation strategies for border crossing control applications are proposed. We identify conditions for impersonation and reinforced factors for various scenarios of e-border crossing automation. Also, conditions of immunity to impersonation are specified. A demonstrative experiment using a Dempster-Shafer approach to the detection of impersonation phenomena is introduced. This lays a foundation for the study of the vulnerabilities of authentication machines for e-borders to the specified impersonation strategies.

BibTex


@inproceedings{BUT119868,
  author="Svetlana {Yanushkevich} and Shawn {Eastwood} and Travis {Manderson} and Steven {Samoil} and Martin {Drahanský} and Vlad. {Shmerko}",
  title="Taxonomy and Modeling of Impersonation in e-Border Authentication",
  annote="Impersonation is a phenomenon of biometric enabled authentication machines. The
focus of this paper is authentication machines for border crossing applications
(eborders). A novel taxonomy of impersonation and seven impersonation strategies
for border crossing control applications are proposed. We identify conditions for
impersonation and reinforced factors for various scenarios of e-border crossing
automation. Also, conditions of immunity to impersonation are specified.
A demonstrative experiment using a Dempster-Shafer approach to the detection of
impersonation phenomena is introduced. This lays a foundation for the study of
the vulnerabilities of authentication machines for e-borders to the
specified impersonation strategies.",
  address="Technische Universität Braunschweig",
  booktitle="Proceedings of EST 2015",
  chapter="119868",
  doi="10.1109/EST.2015.18",
  edition="NEUVEDEN",
  howpublished="print",
  institution="Technische Universität Braunschweig",
  year="2015",
  month="september",
  pages="1--6",
  publisher="Technische Universität Braunschweig",
  type="conference paper"
}