Skip to main content
Log in

Embedded access points for trusted data and resources access in HPC systems

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Biometric authentication systems represent a valid alternative to the conventional username–password based approach for user authentication. However, authentication systems composed of a biometric reader, a smartcard reader, and a networked workstation which perform user authentication via software algorithms have been found to be vulnerable in two areas: firstly in their communication channels between readers and workstation (communication attacks) and secondly through their processing algorithms and/or matching results overriding (replay attacks, confidentiality and integrity threats related to the stored information of the networked workstation). In this paper, a full hardware access point for HPC environments is proposed. The access point is composed of a fingerprint scanner, a smartcard reader, and a hardware core for fingerprint processing and matching. The hardware processing core can be described as a Handel-C algorithmic-like hardware programming language and prototyped via a Field Programmable Gate Array (FPGA) based board. The known indexes False Acceptance Rate (FAR) and False Rejection Rate (FRR) have been used to test the prototype authentication accuracy. Experimental trials conducted on several fingerprint DBs show that the hardware prototype achieves a working point with FAR=1.07% and FRR=8.33% on a proprietary DB which was acquired via a capacitive scanner, a working point with FAR=0.66% and FRR=6.13% on a proprietary DB which was acquired via an optical scanner, and a working point with FAR=1.52% and FRR=9.64% on the official FVC2002_DB2B database. In the best case scenario (depending on fingerprint image size), the execution time of the proposed recognizer is 183.32 ms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Karger PA, Austel VR, Toll DC (2000) A new mandatory security policy combining secrecy and integrity. RC 21717 (97406), 15 March 2000, IBM Research Division, Thomas J Watson Research Center: Yorktown Heights, NY. URL: http://domino.watson.ibm.com/library/CyberDig.nsf/home

  2. UK Biometrics Working Group (BWG) (2003) Biometrics security concerns

  3. Ambalakat P (2005) Security of biometric authentication systems. In: 21st computer science seminar (SA1-T1-1), p 2. www.rh.edu/~rhb/cs_seminar_2005/SessionA1/ambalakat.pdf

  4. Matsumoto T, Matsumoto H, Yamada K, Hoshino S (2002) Impact of artificial “gummy” fingers on fingerprint systems. In: van Renesse RL (ed) Proc of SPIE, vol 4677, pp 275–289. Optical Security and Counterfeit Deterrence Techniques IV

  5. Celoxica. URL http://www.celoxica.com/

  6. Xilinx. URL http://www.xilinx.com/

  7. Precise Biometrics. URL: http://www.precisebiometrics.com/

  8. Biometrika Italia. URL: http://www.biometrika.it/

  9. Fingerprint Verification Competition 2002 (FVC2002). URL: http://bias.csr.unibo.it/fvc2002/

  10. Shi P, Tian J, Su Q, Yang X (2007) A novel fingerprint matching algorithm based on minutiae and global statistical features. In: 1st IEEE international conference on biometrics: theory, applications, and systems (BTAS 2007), 27–29 Sept 2007, pp 1–6

  11. Kovacs-Vajna ZM (2000) A fingerprint verification system based on triangular matching and dynamic time warping. IEEE Trans Pattern Anal Mach Intell 22(11):1266–1276

    Article  Google Scholar 

  12. Bonato V, Molz RF, Furtado JC, Ferrão MF, Moraes FG Proposal of a hardware implementation for fingerprint systems. UNISC—Departamento de Informatica Santa Cruz—Brazil, PUCRS—Faculdade de Informatica porto Alegre—Brazil

  13. Schaumont P, Verbauwhede I (2004) ThumbPod puts security under your thumb. Xilinx Xcell J, Oct 2003, EE Department, UCLA

  14. Jain AK, Uludag U (2003) Hiding biometric data. IEEE Trans Pattern Anal Mach Intell 25(11):1494–1498

    Article  Google Scholar 

  15. Kumar PY, Ganesh TS (2005) Integration of smart card and Gabor filter method based fingerprint matching for faster verification. INDICON, 2005 Annual IEEE, 11–13 Dec 2005, pp 526–529

  16. Watchdata Co Ltd. Timecos PK reference manual V. URL:http://www.watchdata.com/

  17. Scherzer H, Canetti R, Karger PA, Krawczyk H, Rabin T, Toll DC (2003) Authenticating mandatory access controls and preserving privacy for a high-assurance smart card. In: Snekkenes E, Gollmann D (eds) ESORICS 2003. Lecture Notes in Computer Science, vol 2808. Springer, Berlin, pp 181–200

    Chapter  Google Scholar 

  18. Vitabile S, Conti V, Lentini G, Sorbello F (2005) An intelligent sensor for fingerprint recognition. In: Proc of international conference on embedded and ubiquitous computing (EUC-05). Lecture Notes in Computer Science, vol 3824. Springer, Berlin, pp 27–36. ISBN3-540-30807-5

    Google Scholar 

  19. Vitabile S, Conti V, Militello C, Sorbello F (2007) A self-contained biometric sensor for ubiquitous authentication. In: Proc of IEEE international conference on intelligent pervasive computing (IPC 2007), Jeju Island, Korea, Oct 11–13, 2007. IEEE Computer Society, Washington, pp 289–294. ISBN/ISSN:0-7695-3006-0

    Chapter  Google Scholar 

  20. Chen L, Pearson S, Vamvakas A (2002) A trusted biometric system. Trusted E-Services Laboratory, HP Laboratories Bristol, HPL-2002-185, July 15, 2002. Copyright Hewlett-Packard Company

  21. Kummerling O, Kuhn M (1999) Design principles for tamper-resistant smartcard processors. Workshop on smartcard technology (USENIX 1999)

  22. Daemen J, Rijmen V AES proposal: Rijndael. From web: http://csrc.nist.gov/encryption/aes/round2/AESAlgs/Rijndael/Rijndael.pdf

  23. BioAPI Specification Version 1.1, March 16, 2001. http://www.bioapi.org

  24. PC/SC Workgroup Specifications 2.01.4, Part 1. Introduction and architecture overview. Available on web: http://www.pcscworkgroup.com/specifications/specdownload.php

  25. Kocher PC, Jaffe J, Jun B Differential power analysis. Cryptography Research, Inc, San Francisco, California, USA. http://cryptography.com

  26. Kocher PC Timing attacks on implementations of Diffie–Hellman, RSA, DSS, and other systems. Cryptography Research, Inc, San Francisco, California, USA. http://cryptography.com

  27. Agrawal D, Archambeault B, Rao J, Rohtagi P (2002) The em-side channel(s). Workshop on cryptographic hardware and embedded systems (CHES 2002)

  28. http://www.futronic-tech.com/product_fs88.html

  29. Ignatenko T, Willems F (2007) On privacy in secure biometric authentication systems. In: Proc of the IEEE international conference on acoustics, speech and signal processing (ICASSP 2007), vol 2, pp 121–124

  30. Draper SC, Khisti A, Martinian E, Vetro A, Yedidia JS (2007) Using distributed source coding to secure fingerprint biometrics. In: Proc of the IEEE international conference on acoustics, speech and signal processing (ICASSP 2007), vol 2, pp 129–132

  31. Sutcu Y, Rane S, Yedidia JS, Draper SC, Vetro A (2008) Feature transformation of biometric templates for secure biometric systems based on error correcting codes. In: Proc of the IEEE computer society conference on computer vision and pattern recognition workshops (CVPR workshops 2008), pp 1–6

  32. Qi J, Shi Z, Zhao X, Wang Y (2004) A novel fingerprint matching method based on the hough transform without quantization of the hough space. In: Proc of the 3rd international conference on image and graphics (ICIG’04). ISBN 0-7695-2244-0

  33. Nagar A, Nandakumar K, Jain AK (2008) Securing fingerprint template: Fuzzy Vault with minutiae descriptors. In: 19th international conference on pattern recognition (ICPR 2008), pp 1–4. ISBN 978-1-4244-2174-9

  34. Li J, Yang X, Tian J, Shi P, Li P (2008) Topological structure-based alignment for fingerprint Fuzzy Vault. In: 19th international conference on pattern recognition (ICPR 2008). ISBN 978-1-4244- 2174-9

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. Conti.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Militello, C., Conti, V., Vitabile, S. et al. Embedded access points for trusted data and resources access in HPC systems. J Supercomput 55, 4–27 (2011). https://doi.org/10.1007/s11227-009-0379-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-009-0379-1

Keywords

Navigation