Biometric Authentication in a Wireless Environment Alex Kotlarchyk Florida Atlantic University
Download ReportTranscript Biometric Authentication in a Wireless Environment Alex Kotlarchyk Florida Atlantic University
Biometric Authentication in a Wireless Environment Alex Kotlarchyk Florida Atlantic University 5/20/2016 1 Goals Biometric protocols suitable for a wireless networked environment Secure system/network access via biometric authentication Secure wireless transmission of biometric data 5/20/2016 2 Why Wireless Biometrics? Combination of two rapidly growing technologies 1. Biometric systems for verification and identification • Homeland Security 2. Wireless systems for mobility • Over 1 trillion wireless phone min. in US, 2004 Common advantage is convenience 5/20/2016 3 Current Examples of Biometric Deployments Eastern Financial’s Boca Mission Bay branch – Handprint scan to unlock the door to safe deposit boxes Statue of Liberty – Fingerprint scan to access lockers Nine Zero hotel in Boston – Iris scan for entrance to $3,000-a-night suite Piggly-Wiggly grocery stores – Testing pay-by-fingerprint system Bank of Tokyo-Mitsubishi – Credit cards w/ embedded vein-pattern information 5/20/2016 4 Human authentication Types of human authentication – What you know (secret) • Password, PIN, mother’s maiden name – What you have (token) • ATM card, smart card – What you are (biometric) • Stable: fingerprint, face, iris • Alterable: voice, keystroke – Where you are (authorization?) • Wireless 5/20/2016 5 Suitability of Biometrics Paradox of secure biometrics – A biometric is stable and distinctive. This is good for identification. – However, something unique can never be changed. This is not so good for verification if the biometric is compromised. – Furthermore, a biometric is not a secret, so it can be found and copied. This is bad. – So, are stability and uniqueness not good after all? 5/20/2016 6 Keyspace Number of possible codewords (CW) – Token • 12-digit: CW = 10^12 CWs – Password • Full 62 ASCII alphanumeric chars used randomly in an 8char password = over 10^14 CWs • Most actual users selection ≈ 10^6 CWs, so in practice, the 12-digit token is more secure – Biometrics (2001 technology, may change) • ≈ inverse of FAR – – – – 5/20/2016 Iris ≈ 10^6 CWs Fingerprint ≈ 10^4 CWs Voice ≈ 10^3 CWs Face ≈ 10 → 100 CWs 7 Increasing Keyspace Combined authentication to increase keyspace – Multibiometric authentication • More than one biometric – Combine standard biometrics (e.g. face and fingerprint (multimodal), or multiple fingerprints) – Combine standard biometric with “soft” biometric • Soft biometric = gender, height, race, eye color, etc. – Multifactor authentication • More than one authentication type – Combine biometric w/ password or token 5/20/2016 8 5/20/2016 9 Source: Technology Review, June 2004 Biometric Advantages Convenience – Can’t be lost (in general) – Can’t be forgotten Can’t be loaned Mostly unique (matching may not be) Perceived strong non-repudiation Does not change significantly (in general) (Ident.) Both verification and identification applications 5/20/2016 10 Biometric Disadvantages Ability to authenticate dependent on technology (FAR, FRR) Personal data, but not secret/secured data Easy to copy raw data Cost of technology Non-revocable Cannot change if compromised (Ver.) Inexact matching (variable presentation) Social acceptance 5/20/2016 11 Biometric Authentication System 5/20/2016 12 Source: Podio, NIST Template Size 5/20/2016 13 Wireless Biometric System Security Security issues – Biometric authentication to ensure secure access to the system/network • In other words, wireless system access security – Wireless message authentication to ensure secure transmission of biometric data • In other words, personal information security and privacy across the wireless network – Physical security • Devices, computers, transmitters/receivers, etc. 5/20/2016 14 Biometric Authentication Threats 5/20/2016 15 Defense of Biometric System Capture device presented with ‘false’ biometric – e.g. fake finger, short video, high-res color iris image, latent image – Use biometric ‘in addition’ not ‘instead of’ (multi-verification) – Vitality sensor, 3-D confirmation 5/20/2016 16 Defense of Biometric System (continued) Modification of capture device – Only a problem if capture and template generation (and maybe matching) are done on the device (trusted biometric device) – Tightly integrate capture mechanism with processing hardware – Ruggedize device – Display physical sign of tampering – Inactivate if tampered (TILT!) – Encryption of template 5/20/2016 17 Defense of Biometric System (continued) Remainder are network security or template database security issues – Wireless network security will be discussed – Database security is beyond the scope of this presentation – Don’t forget OS security 5/20/2016 18 Biometric Cryptography Use of biometric data for encryption & decryption “fuzzy” commitment, vault – Ari Juels, RSA Labs 5/20/2016 19 Biometric Cryptography (example) 01010 10101 00000 11111 Enroll Template (Encrypt) (key) Password (hashed) Within Threshold? E(h(Pwd)) “stored” compare 10000 10111 Hamming Distance = 2 5/20/2016 01010 01010 Template “live” (key) 11010 11101 Verify (Decrypt) 20 Biometrics Standards Common Biometric Exchange File Format (CBEFF) ANSI-NIST-ITL-2000 – – American Association for Motor Vehicle Administration (AAMVA) DL/ID 2000 FBI – – Originally developed for financial industry; uses CBEFF APIs – – Wavelet Scalar Quantization (WSQ) – fingerprint image (de)compression Electronic Fingerprint Transmission Standard (EFTS) Intel Common Data Security Architecture (CDSA) ANSI X9.84 – Biometric data security (life cycle) – Data exchange & quality Criminal identification Open: BioAPI, Java Card Biometric API; uses CBEFF Proprietary: BAPI …what is Microsoft planning? XCBF – – 5/20/2016 XML Common Biometric Format from OASIS; uses CBEFF Mechanisms for secure transmission, storage, integrity, & privacy of biometrics 21 Biometric Standards Recently from NIST… – Biometric Data Specification for Personal Identity Verification (PIV) • January 24, 2005 (Draft) • New standards governing interoperable use of identity credentials to allow physical and logical access to federal government locations and systems – Technical and formatting requirements for biometric credentials – Restricts values and practices for fingerprints and facial images – Geared toward FBI background checks and formatting data for a PIV card – CBEFF and BioAPI compliant 5/20/2016 22 CBEFF - Overview Framework for sharing raw or template data Supports encryption & digital signature for security File = SBH (header) + BSMB (data) + SB (signature) Patrons identify the data format Approved interchange formats – Finger Minutiae, Finger Pattern, Finger Image, Face Recognition, Iris, Signature/Sign, Hand Geometry 5/20/2016 23 CBEFF Patron Formats Format A – The CBEFF Data Structure – Patron: CBEFF – Small embedded or legacy systems, limited storage – No data exchange between systems Format B – The BioAPI Specification Biometric Identification Record (BIR) Format – Patron: BioAPI Consortium – BioAPI compliant systems – Client / server data exchange Format C – ANSI X9.84 Biometric Object – Patron: ANSI Subcommittee X9, Working Group F4 – Large systems – Data exchange in a secure manner with authentication Format D – Biometric Information Data Objects for Use Within Smart Cards or Other Tokens (recent)… e.g. Java Card 5/20/2016 24 Wireless Advantages Mobility Flexibility – Easier to relocate and configure – More scalable Cost – No cost due to physical barriers, private property. Productivity – More opportunity to connect Aesthetics – No clutter from wires Robustness – Less physical infrastructure to damage and repair 5/20/2016 25 Wireless Disadvantages Lower channel capacity – Limited spectrum available – Power restrictions – Noise levels Noise and interference Frequency allocation – U.S. – FCC Greater security concern – Information traveling in free space 5/20/2016 26 Wireless Protocols Network domains – Broadband • IEEE 802.16, Worldwide Interoperability for Microwave Access (WiMAX) – framework, not single system or class of service – Cellular networks • Global System for Mobile communication (GSM) • Universal Mobile Telecommunications System (UMTS =WCDMA) – Cordless systems • Time Division Multiple Access (TDMA) • Time Division Duplex (TDD) – Mobile Internet Protocol (Mobile IP) – Wireless Local Area Network (WLAN) • IEEE 802.11 (Wi-Fi) a,b,g (n … not yet ratified) – Wireless Personal Area Network (WPAN) • IrDA, Bluetooth, ultra wideband, wireless USB – Home Automation (narrow band) • Infineon, ZigBee, Z-Wave 5/20/2016 27 Wireless Protocol Comparison 5/20/2016 28 Source: PC Magazine, March 22, 2004 Security and Protocols Security domains – Application security • Wireless Application Protocol (WAP) – Uses Wireless Transport Layer Security (WTLS) • Current Class 2 devices based on IETF SSL/TLS • Future Class 3 devices will use a WAP Identity Module (WIM) • Web services – Simple Object Access Protocol (SOAP) – toolkits available for Java & .NET • Operating system security (Java run-time, Palm OS, Microsoft Windows CE) – Device security (PINs, pass-phrases, biometrics) – Security of wireless protocols • IEEE 802.11 (Wi-Fi) – Wireless Encryption Protocol (WEP)… weak and flawed – Wi-Fi Protected Access (WPA). Uses Temporal Key Integrity Protocol (TKIP) • IEEE 802.11i – Wireless Security spec. (WPA, AES, FIPS 140-2 compliant) – Authentication security • Remote Authentication Dial In User Service (RADIUS) • Kerberos • SSL 5/20/2016 29 Network Encryption Secure Shell (SSH) – Application Layer – Secure remote connection replacement for telnet, rlogin, rsh Secure Socket Layer (SSL) – Transport Layer Security (TLS) – Uses TCP & has specific port numbers – Main use is HTTPS (port 443) Internet Protocol Security (IPSec) – Network Layer – Includes a key management protocol – Included in IPv6 5/20/2016 30 Network System Architecture Where does authentication happen? – Device • Data not externally transmitted – Local Computer • Data transmitted between device(s) and PC (WPAN) – LAN-Connected Computer • Data transmitted locally (WLAN) – Remote Computer • Data transmitted remotely (WWAN) – Application dependent • Data transmitted between capture device and database • Database template storage requirement = template size * number of templates 5/20/2016 31 Avenues of Attack = wireless LAN- connected Computer Local Computer LAN Remote Computer Capture Device 5/20/2016 WAN 32 Wireless Security Issues Denial of Service (DoS) – Jamming…Use Spread Spectrum (DSSS, FHSS) technology – As a device battery attack, i.e., more processing = more battery usage Eavesdropping – Signal is in the open air (war dialing) Theft or loss of device – Due to size, portability, and utility Dependency on public-shared infrastructure – What security is in place? Masquerading – Rogue clients pretend to be legitimate endpoint – Rogue access points trick clients to logging in Malware – Worms (Cabir) and Viruses (Timfonica, Phage) on wireless devices – Use Antivirus software 5/20/2016 33 Wireless Security Paradox We use wireless devices for convenience Security measures often decrease convenience and performance Result: Security features are often disabled or given lower priority 5/20/2016 34 System Design Considerations Verification – – – – – Identification – – – – – Are you who you claim to be (or are supposed to be)? 1:1 matching Usually consensual Typically smaller template databases Authorization (computer, network, building) Who are you? 1:n matching Often no explicit consent or awareness Typically larger template databases Surveillance (homeland and border security), forensics, criminal investigation (AFIS) Why not both? – i.e. You are not who you say you are, so who are you? 5/20/2016 35 Scenario: Biometrics at the Airport Workforce security – Biometric authentication • Identify all employees who require restricted area access • ID card encoded to protect data • Biometric scanning devices networked at access control points to permit/deny access Facility integrity – Employees w/ vehicle access must be authenticated via biometrics – Access control within aircraft • Biometric devices for authorized personnel to access sensitive areas within aircraft Communications infrastructure – Networked biometric scanning stations Passenger security – Authenticate passengers with passports or ID cards containing encoded biometrics – Identify suspicious or unknown people with biometric surveillance 5/20/2016 36 Putting it Together How do we maximize advantages and minimize disadvantages when a biometric system is combined with a wireless system for an optimal wireless biometric system? 5/20/2016 37 Future Research Pattern for “fuzzy” matching? – Biometrics, digital watermarks, IDS, search engines Biometric cryptography – Biometric key generation • Fuzzy matching methodologies • Embedding biometric keys within wireless protocols – X.509 certificates – Protocol payload area – Protocol header (authentication) area • Use coefficients? (polynomial, elliptic curve) 5/20/2016 38