Basic biometric architecture

The idea of using biometric techniques to authenticate users in telecommunications has been around for many years as a theoretical, yet cumbersome to implement, possibility (Lapere and Johnson, 1997). Recent increases in computing power, data transmission speeds and the availability of affordable storage, now make viable the use of biometrics in enterprise and consumer-based telecommunications (Gafurov, 2010).

The definition of a telecommunications network derives from the concepts of computer networks and distributed systems. According to Tanenbaum and Wetherall (2011a), a computer network is a collection of autonomous computers (nodes) interconnected by a single technology and a distributed system is a collection of independent computers that appear to their users as a single coherent system. Consequently, a telecommunications network can be defined as a distributed system in which nodes are either computing entities or computer networks and offers services related to information sharing.

The above definition determines that the main objective of telecommunications is to share or allow access to information through or from any kind of voice or data network. Information can take any form, including documents, audio, voice and video. Some information is intended to be openly available, such as websites on the Internet. Other information is restricted to a single party like a personal bank account web site or phone line or to a specific group of people as with a corporate intranet. Different mechanisms have been developed to control access to shared resources, which use passive or active authentication by the user sharing the resources (Mallery, 2013).

When telephonic communications were controlled by public providers, security was maintained by their exclusive access to all hardware. As networks evolved to packet and mobilebased technologies access was controlled by a personal identification number (PIN) and, in the case of mobile telecommunications, a smart card in the form of a Subscriber Identification Module (SIM). These solutions are convenient but lack security (Lapere and Johnson, 1997). Any telecommunications access control measure must meet the following requirements:
a. be simple to use yet effective enough to provide a noticeable level of security;
b. be measurable, recorded and quantifiable (Eur, 1997).

These are also characteristics of a biometric security system.

Biometric characteristics for authentication in telecommunications environments have been explored since the 1990s when the European Telecommunications Standards Institute (ETSI), made it a priority to provide secure communications standards for UMTS. They stated, « without a reliable authentication service through the Telecommunications Management Networks (TMN), every other effort to secure the system is in vain » (Eur, 1997). In the 1990s, there were obstacles to use biometric authentication methods: sensors were costly, processing power was low, service provider charges for data transmission were very high, acceptance and use of the technology were challenging. In the particular case of voice biometrics, telephones already had audio capturing sensors and they were a familiar device, making them a viable and non-intrusive option.

Basic biometric architecture

Communication network biometric systems are known as remote biometric authentication systems (Syta et al., 2015).

• A subject from whom the biometric information is read.

• The biometric data capturing process. This is accomplished by one or more mechanical or electrical objects that capture raw data to be analysed. The usual objects are microphones, webcams, mobile phones (which have several capturing methods), fingerprint readers, keyboards, mouse devices. A capturing element does not have to be a device specifically designed for biometric operations. A finger print reader has been specially designed for biometric data capture whilst a telephone has not. In general, any device able to retrieve biometric data and retransmit it in a digital format can be considered a capturing element.

• Database: Once a template is created, it is stored in a database. During a verification process, the matcher retrieves the claimed user template from the database and compares it with the one obtained from the feature extractor.

• The extraction process of finding the digital representation biometric data. It is as a twostep process:

• Pre-processing: Before being digitized, the raw data set is pre-processed to assess its quality. It is then segmented and enhanced. A quality assurance process for the raw data set is necessary to determine if more sets of biometric data are to be collected. Segmentation is mainly the process of separating actual biometric information from the background model. Finally, the raw data set is enhanced to improve its quality and reduce signal noise.

• Feature extractor: Pre-processed biometric information is digitized to create a biometric template. This template is expected to have unique individual information. This step is functionally merged with the template creation and matcher processes. For a new biometric speaker, the product of the feature extractor is used to build their biometric template. In the case of an existing speaker, the product is used to create a temporary digital representation of the captured biometric payload to be compared against their existing stored template.

Table des matières

INTRODUCTION
CHAPTER 1 BIOMETRIC AUTHENTICATION IN TELECOMMUNICATION NETWORKS
1.1 Basic biometric architecture
1.2 Interpretation of biometric results
1.3 Literature review
1.3.1 Interoperable framework for biometric communications
1.3.2 IDM3G, identity management protocol
1.3.3 Voice Interactive Personalized Security
1.3.4 BIO3G protocol
1.3.5 Securing biometric templates transmission
1.3.6 Related projects
CHAPTER 2 SIP REVIEW
2.1 SIP Requests
2.2 SIP Responses
2.3 SIP extensions
2.3.1 SIP extensions guidelines
2.3.2 Representative SIP extensions
2.3.2.1 SIPREC
2.3.2.2 SIP Extension for payments support
2.3.2.3 Other SIP extensions
CHAPTER 3 REQUIREMENTS AND USE CASES
3.1 Canonical biometric process
3.2 Use case scenarios
3.2.1 Scenario 1: One-time Active Voice Biometrics authentication (OTAVB)
3.2.2 Scenario 2: One-time Passive Voice Biometrics authentication (OTPVB)
3.2.3 Scenario 3: Discrete Intervals Passive Voice Biometrics authentication (DIPVB)
3.3 Simplified biometric distribution
3.4 Extended distribution
3.5 Requirements
3.6 Extending SIP
3.7 Protocol compliance
CHAPTER 4 SIPBIO, EXTENDING SIP AND SDP TO SUPPORT BIOMETRIC AUTHENTICATION
4.1 SIP option-tags
4.2 SIPBIO application content
4.3 Extending SDP
4.4 SIPBIO process
4.4.1 Pre-session establishment
4.4.2 Session initiation
4.4.3 Three way handshake completion
4.4.4 Media session and termination
4.4.5 Multiple alternative payloads
4.4.6 Multiple concurrent payloads
4.4.7 Status updates
4.5 Mandatory methods header fields
4.6 SIPBIO limitations
4.7 Closing summary
CHAPTER 5 SIMULATION AND TESTS
5.1 Preparation
5.1.1 Selection criteria
5.1.2 Environment
5.1.3 Test environment layout
5.1.4 SIPp theory and usage
5.2 Test scenarios
5.2.1 Base test scenario
5.2.2 Test scenario with partial results notifications
CONCLUSION

Cours gratuitTélécharger le document complet

 

Télécharger aussi :

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *