8th International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS)

Research Article

Validating Biometric Authentication Protocol

  • @INPROCEEDINGS{10.4108/icst.bict.2014.258080,
        author={Elia El Lazkani and Hong Liu},
        title={Validating Biometric Authentication Protocol},
        proceedings={8th International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS)},
        publisher={ICST},
        proceedings_a={BICT},
        year={2015},
        month={2},
        keywords={bio-inspired wireless network security (bwns) biometric authentication wireless body area networks (wban) wireless sensor networks practical realization of physiological biometrics validation of protocol implementation},
        doi={10.4108/icst.bict.2014.258080}
    }
    
  • Elia El Lazkani
    Hong Liu
    Year: 2015
    Validating Biometric Authentication Protocol
    BICT
    ACM
    DOI: 10.4108/icst.bict.2014.258080
Elia El Lazkani1, Hong Liu1,*
  • 1: University of Massachusetts Dartmouth
*Contact email: HLiu@UMassD.edu

Abstract

Biometric sensors/actuators communicating via wireless body area networks has surged wide applications. From seamless healthcare to driverless transportation, biologically inspired systems benefit with productivity growth, energy efficiency, user convenience, and cost reduction. However, their invasive nature raises concerns. Security becomes the urgent task to realize biologically-enabled systems. Biological phenomena, nevertheless, can also play a vital role to secure software. Recently, several biometric authentication protocols have emerged to verify endpoints, promising one-time key for premium security. In spite of bio-enabled security advances, lack of security analysis theories and tools causes uncertainty of their safety. This paper pioneers an experimentation on assessing security of a well-established biometric authentication protocol. Using the gold standard in software reliability, the work exploits the attack surface leveraging path analysis. The test not only identifies security vulnerabilities in a system but also pinpoints those vulnerabilities at real risk to optimize resource allocation. The automated holistic examination of the authentication process reveals a weakness in the biometric authentication protocol at study. The attack map directs its improvement validated with reexamination. The work also studies the computational complexity of the protocol, thereby, recommends the key length suitable to biometric authentication for wireless body area networks.