A Protocol for Incorporating Biometrics in 3G with Respect to Privacy
نویسندگان
چکیده
This paper proposes a protocol, called BIO3G, for embedding biometrics in 3G security. BIO3G is an enhanced alternative to the common practice of utilizing biometrics locally, for gaining access to the device. BIO3G provides real end-to-end strong user authentication to the mobile operator, requiring no storing or transferring of biometric data and eliminating the need for biometric enrolment and administration procedures, which are time-consuming for the user and expensive for the mobile operator.
منابع مشابه
Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملAn efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
متن کاملA Biometric Authentication Protocol for 3G Mobile Systems: Modelled and Validated Using CSP and Rank Functions
This paper describes a protocol, called BIO3G, for establishing secure and privacy friendly biometric authentication in 3G mobile environments. BIO3G provides real end-to-end strong user authentication to the mobile operator, requiring no storing or transferring of biometric data and eliminating the need for biometric enrolment and administration procedures, which are time-consuming for the use...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملThe Relationship between Moral Intelligence of Emergency Personnel with the Level of Respect for Patients' Privacy in the Emergency Departments, Zanjan, Iran, 2018
Background and Aim: Respect for patientschr('39') privacy is especially important in the emergency department. The present study was conducted to determine the relationship between the moral intelligence of emergency personnel with the level of respect for patient privacy in the emergency departments of hospitals affiliated to Zanjan University of Medical Sciences, Iran. Methods: In this cross-...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005