Taxonomy and Modeling of Impersonation in e-Border Authentication
Impersonation is a phenomenon of biometric-enabled authentication machines. The focus of this paper is authentication machines for border crossing applications (e-borders). A novel taxonomy of impersonation and seven impersonation strategies for border crossing control applications are proposed. We...
Saved in:
Published in | 2015 Sixth International Conference on Emerging Security Technologies (EST) pp. 38 - 43 |
---|---|
Main Authors | , , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.09.2015
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Impersonation is a phenomenon of biometric-enabled authentication machines. The focus of this paper is authentication machines for border crossing applications (e-borders). A novel taxonomy of impersonation and seven impersonation strategies for border crossing control applications are proposed. We identify conditions for impersonation and reinforced factors for various scenarios of e-border crossing automation. A demonstrative experiment using a Dempster-Shafer approach to the detection of impersonation phenomena is introduced. This lays a foundation for the study of the vulnerabilities of e-borders to the specified impersonation strategies. |
---|---|
DOI: | 10.1109/EST.2015.18 |