Taxonomy and Modeling of Impersonation in e-Border Authentication

Impersonation is a phenomenon of biometric-enabled authentication machines. The focus of this paper is authentication machines for border crossing applications (e-borders). A novel taxonomy of impersonation and seven impersonation strategies for border crossing control applications are proposed. We...

Full description

Saved in:
Bibliographic Details
Published in2015 Sixth International Conference on Emerging Security Technologies (EST) pp. 38 - 43
Main Authors Yanushkevich, S., Eastwood, S., Samoil, S., Shmerko, V. P., Manderson, T. L., Drahansky, M.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.09.2015
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Impersonation is a phenomenon of biometric-enabled authentication machines. The focus of this paper is authentication machines for border crossing applications (e-borders). A novel taxonomy of impersonation and seven impersonation strategies for border crossing control applications are proposed. We identify conditions for impersonation and reinforced factors for various scenarios of e-border crossing automation. A demonstrative experiment using a Dempster-Shafer approach to the detection of impersonation phenomena is introduced. This lays a foundation for the study of the vulnerabilities of e-borders to the specified impersonation strategies.
DOI:10.1109/EST.2015.18