• DocumentCode
    144822
  • Title

    The scheme of 3-level authentication mechanism for preventing internal information leakage

  • Author

    Sang-Pil Cheon ; Jung-Min Kang ; Min-Woo Park ; Jung-Ho Eom

  • Author_Institution
    Dept. of Mil. Studies, Daejeon Univ., Daejeon, South Korea
  • fYear
    2014
  • fDate
    6-8 May 2014
  • Firstpage
    154
  • Lastpage
    157
  • Abstract
    In this paper, we proposed 3-level authentication technique to prevent internal information leakage in network system. When system authenticates users, it requires user´s ID&P/W firstly. Then, it requires a secondary authentication component to check whether he/she is legitimate user. By doing so, it can implement a more robust authentication system. The secondary authentication components are usually a security card, an encryption key and bio-information such as iris, face, fingerprint etc. But there is a problem related to ID&P/W exposure and bio-information copy. Especially, nobody knows can check whether ID&P/W are exposed, whether bioinformation is copied. So, we propose another authentication way using biometric signals. A biometric signal is essentially a pattern recognition factor that operates by acquiring biometric signals from an individual, extracting a feature set from the acquired signal pattern, and comparing this feature set against the template set in the database. We decided to use skin conductivity in the biometric signals as 3rd authentication element. The skin conductivity is used as an indication of psychological or physiological arousal. So, there is no risk because it never exposes or copies.
  • Keywords
    biometrics (access control); feature extraction; message authentication; 3-level authentication mechanism; ID&P/W exposure; bio-information copy; biometric signals; encryption key; feature set; internal information leakage; legitimate user; network system; pattern recognition factor; physiological arousal; psychological arousal; robust authentication system; secondary authentication components; security card; signal pattern; skin conductivity; template set; Authentication; Biomedical monitoring; Conductivity; Databases; Feature extraction; Skin; authentication; biometrics; information leakage;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Digital Information and Communication Technology and it's Applications (DICTAP), 2014 Fourth International Conference on
  • Conference_Location
    Bangkok
  • Print_ISBN
    978-1-4799-3723-3
  • Type

    conf

  • DOI
    10.1109/DICTAP.2014.6821674
  • Filename
    6821674