This paper deals with the definition of a strong authentication model, coupling usual password/PIN based meth- ods with a biometric matching, over a Multi Agent distributed infrastructure. When the user authentication procedure involves personal devices, the Multi Agent System model helps in the dis- tribution of data and algorithms thanks to a better partitioning of roles and responsibilities, enhancing robustness to eavesdropping and tampering by properly moving agents around the system itself. The system architecture is based on specialized agents tied to the different devices, which safely communicate using both symmetric encryption for messages and asymmetric encryption to check principals’ roles. Moreover, agents can carry on biometric parameters matching algorithms, bringing computation on those nodes with enough computing power. A complete authentication protocol has been developed and two different demos have been devised and tested. They differ for the tasks assigned to the mobile devices in use. Experiments show that agent capabilities, together with their power of migration, help in maintaining a higher level of security when mobile devices are involved.

Using Mobile Agents for Secure Biometric Authentication

FERRARI, CARLO;MORO, MICHELE
2010

Abstract

This paper deals with the definition of a strong authentication model, coupling usual password/PIN based meth- ods with a biometric matching, over a Multi Agent distributed infrastructure. When the user authentication procedure involves personal devices, the Multi Agent System model helps in the dis- tribution of data and algorithms thanks to a better partitioning of roles and responsibilities, enhancing robustness to eavesdropping and tampering by properly moving agents around the system itself. The system architecture is based on specialized agents tied to the different devices, which safely communicate using both symmetric encryption for messages and asymmetric encryption to check principals’ roles. Moreover, agents can carry on biometric parameters matching algorithms, bringing computation on those nodes with enough computing power. A complete authentication protocol has been developed and two different demos have been devised and tested. They differ for the tasks assigned to the mobile devices in use. Experiments show that agent capabilities, together with their power of migration, help in maintaining a higher level of security when mobile devices are involved.
2010
Proceedings of the 11th Workshop nazionale "Dagli Oggetti agli Agenti" (WOA 2010)
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11577/2436680
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact