Abstract
This work introduces an approach to building a risk profiler for use in authentication machines. Authentication machine application scenarios include the security of large public events, pandemic prevention, and border crossing automation. The proposed risk profiler provides a risk assessment at all phases of the authentication machine life-cycle. The key idea of our approach is to utilize the advantages of belief networks to solve large-scale multi-source fusion problems. We extend the abilities of belief networks by incorporating Dempster-Shafer Theory measures, and report the design techniques by using the results of the prototyping of possible attack scenarios. The software package is available for researchers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The e-passport and e-ID are defined by the ICAO standard, and are the key components of advanced border control technologies [54]. The face was recommended as the primary biometric, mandatory for global interoperability in the passport inspection systems. Fingerprint and iris were recommended as secondary biometrics.
References
International Air Transport Association (IATA): Checkpoint of the future: Executive summary. 4th Proof. (2014). http://www.bing.com/search?q=iata
Department of Homeland Security (DHS): Future Attribute Screening Technology (FAST) Project, Science and Technology Directorate (2008). http://www.dhs.gov/xlibrary/assets/privacy/privacy_pia_st_fast
Daniels, D., Hudson, L.D., Laskey, K.B., et al.: Terrorism risk management. In: Pourret, O., Naim, P., Markot, B. (eds.) Bayesian Networks; A Practical Guide to Applications, pp. 239–262. Willey (2008)
ISO/IEC FDIS 30108-1:2015(E), Information technology—Biometric Identity Assurance Services—Part 1: BIAS services, International Organization for Standardization (2015)
Bolle, R., Connell, J., Pankanti, S., Ratha, N., Senior, A.: Guide to Biometrics. Springer, New York (2004)
Jain, A., Bolle, R., Pankanti, S. (eds.): Biometrics: Personal Identification in a Networked Society. Kluwer (1999)
Miller, B.: Vital signs of identity. IEEE Spect. 31(2), 22–30 (1994)
Back, J.: Posture monitoring system for context awareness in mobile computing. IEEE Trans. Instrum. Meas. 59(6), 1589–1599 (2010)
Creese, S., Gibson-Robinson, T., Goldsmith, M., et al.: Tools for understanding identity. In: Proceedings IEEE Conference Technologies for Homeland (2013)
Mobile Biometric Identification: white paper, Motorola, (2008). http://www.motorolasolutions.com/web/Business/Products/
NIST: Mobile ID Device Best Practice Recommendation Version 1.0, NISTSP 500-280 (2009)
Pavlidis, I., Levine, J.: Thermal image analysis for polygraph testing. IEEE Trans. Eng. Med. Biol. Mag. 6, 56–64 (2002)
Poursaberi, A., Vana, J., Mracek, S., Dvora, R., Yanushkevich, S., Drahansky, M., Shmerko, V., Gavrilova, M.: Facial biometrics for situational awareness systems. IET Biom. 2(2), 35–47 (2013)
Yanushkevich, S., Shmerko, V., Boulanov, O., Stoica, A.: Decision-making support in biometric-based physical access control systems: Design concept, architecture, and applications. In: Boulgouris, N.V., Plataniotis, K.N., Micheli-Tzanakou, E. (eds.) Biometrics: Theory, Methods, and Applications, pp. 599–631. IEEE Press, Wiley (2010)
AVATAR: Border patrol kiosk detects liars trying to enter U.S. Homeland Security News Wire (2012). http://www.homelandsecuritynewswire.com/
DHS (Department of Homeland Security): Future Attribute Screening Technology (FAST) Project, Science and Technology Directorate, Department of Homeland Security (2008). www.dhs.gov/xlibrary/assets/privacy/privacy_pia_st_fast
McBreen, H.M., Jack, M.A.: Evaluating humanoid synthetic agents in e-retail applications. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 31(5), 394–405 (2001)
Eastwood, S.C., Yanushkevich, S.N., Drahansky, M.: Biometric intelligence in authentication machines: from talking faces to talking robots. In: Proceedings IIAI 3rd International Conference Advanced Applied Informatics, Japan, pp. 763–768 (2014)
Nunamaker Jr, J.F., Derrick, D.C., Elkins, A.C., Burgoon, J.K., Patton, M.W.: Embodied conversational agent-based kiosk for automated interviewing. J Manag. Inf. Syst. 28(1), 17–48 (2011)
McLay, L.A., Lee, A.J., Jacobson, S.H.: Risk-based policies for airport security checkpoint screening. J. Transp. Sci. 44(3), 333–349 (2010)
Nie, X., Batta, R., Drury, C.G., Lin, L.: Passenger grouping with risk levels in an airport security system. Eur. J. Oper. Res. 194(2), 574–584 (2009)
Nuppeney, M.: Automated border control based on (ICAO compliant) eMRTDs, Federal Office for Information Security (2012). http://www.bsi.de
SITA: END-to-end border management: An integrated approach to passenger data collection, identity verification and risk management. SITA positioning paper (2012)
Fiondella, L., Gokhale, S.S., Lownes, N., Accorsi, M.: Security and performance analysis of a passenger screening checkpoint for mass-transit systems. In: Proceedings IEEE Conference Technologies for Homeland Security (HST), pp. 312–318 (2012)
Campbell, J.W.M.: New Zealand SmartGate: Using quantitative performance information to improve convenience and security. In: Proceedings International Biometric Performance Testing Conference, NIST (2014). http://www.nist.gov/itl/iad/ig/ibpc2014
Frontex: Best practice technical guidelines for automated border control (ABC) systems, Research and Development Unit, Frontex, Warsaw (2012). http://www.frontex.europa.eu
Frontex: BIOPASS II Automated biometric border crossing systems based on electronic passports and facial recognition: RAPID and SmartGate. Research and Development Unit, Frontex, Warsaw (2010). http://www.frontex.europa.eu
Bigo, D.S. et al.: Justice and Home Affairs Databases and a Smart Borders System at EU External Borders An Evaluation of Current and Forthcoming Proposals for European Policy Studies (CEPS), No. 52/Dec. (2012)
Florence, J., Friedman, R.: Profiles in terror: A legal framework for the behavioral profiling paradigm. George Mason Law Rev. 17(2), 423–481 (2010). http://www.georgemasonlawreview.org/doc/172Florenceand
IATA (International Air Transport Association): Checkpoint of thefuture: Executive summary. 4th Proof (2014). http://www.bing.com/search?q=iata%3A+Checkpoint+of+the+future.+Executive+summary
Eastwood, S.C., Shmerko, V.P., Yanushkevich, S.N., Drahansky, M., Gorodnichy, D.O.: Biometric-enabled authentication machines: A survey of open-set real-world applications. IEEE Trans. Hum. Mach. Syst. early access, May 2015
Yanushkevich, S.N., Eastwood, S.C., Drahansky, M., Shmerko, V.P.: Taxonomy of Impersonation Phenomenon in Authentication Machines for e-Borders. Proc. Int. Conf. Emerg. Secur. Technol. (2015)
Waltz, E., Llinas, J.: Multisensor Data Fusion. Artech House, MA (1990)
Eastwood, S.C., Yanushkevich, S.N.: Risk profiler in automated human authentication. In: Proceedings IEEE Workshop on Computational Intelligence in Biometrics and Identity Management—CIBIM, Orlando, Florida (2014)
Yanushkevich, S.N., Stoica, A., Shmerko, V.P.: Experience of design and prototyping of a multi-biometric early warning physical access control security system (PASS) and a training system (T-PASS). In: Proceedings of the 32nd Annual IEEE Industrial Electronics Society Conference, pp. 2347–2352. Paris, France (2006)
Sacanamboy, M., Cukic, B.: Combined performance and risk analysis for border management applications. In: Proceedings IEEE/IFIP Conference Dependable Systems and Networks (DSN), pp. 403–412 (2010)
DHS (Department of Homeland Security): DHS S&T and CBP Announce the Opening of the Maryland Test Facility (2014). http://www.dhs.gov/blog/2014/07/03/, http://www.dhs.gov/st-snapshot-new-dhs-facility-tests-biometric-technology-improves-air-entryexit-operations
Software package Dempster-Shafer Bayesian Network (DSBN-01). Biometric Laboratory, University of Calgary, Canada (2015). http://www.ucalgary.ca/btlab/Software
Aven, T.: Foundations of Risk Analysis, 2nd edn. Wiley (2012)
Koller, D., Friedman, N.: Probabilistic Graphical Models: Principles and Techniques, MIT Press (2009)
Frey, B.J., Jojic, N.: A comparison of algorithms for inference and learning in probabilistic graphical models. IEEE Trans. Pattern Anal. Mach. Intell. 27(9), 1392–1416 (2005)
Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)
Smarandache, F., Dezert, J., Tacnet, J.-M.: Fusion of sources of evidence with different importances and reliabilities In: Proceedings Workshop on the Theory of Belief Functions (BELIEF 2010), Edinburgh, UK (2010). https://hal.archives-ouvertes.fr/file/index/docid/559233/filename/GR2010-PUB00030651.pdf
Bishop, C.M.: Pattern Recognition and Machine Learning. Springer, New York (2006)
Delmotte, F., Smets, P.: Target identification based on the transferable belief model interpretation of Dempster-Shafer model. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 34(4), 457–471 (2004)
Papakostas, G.A., et al.: Fuzzy cognitive maps for pattern recognition applications. Int. J. Pattern Recognit. Artif. Intell. 22, 1461–1486 (2008)
Jang, J.-S.R.: ANFIS: adaptive-network-based fuzzy inference systems. IEEE Trans. Syst. Man Cybern. 23, 665–685 (1993)
Yager, R.R., Filev, D.P.: Including probabilistic uncertainty in fuzzy logic controller modeling using Dempster-Shafer theory. IEEE Trans. Syst. Man Cybern. 25(8), 1221–1230 (1995)
Yager, R.R.: Human behavioral modeling using fuzzy and Dempster Shafer theory, Social Computing, Behavioral Modeling, and Prediction, pp. 89–99. Springer, US (2008)
Denoeux, T.: A neural network classifier based on Dempster-Shafer theory. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 30(2), 131–150 (2000)
Klein, L.A.: Sensor and Data Fusion: A Tool for Information Assessment and decision Making. SPIE, Bellingham (2007)
Bier, V.M., Azaiez, M.N. (eds.): Game Theoretic Risk Analysis of Security Threats. Springer, US (2009)
Barber, D.: Bayesian Reasoning and Machine Learning. Cambridge University Press, Cambridge (2012)
ICAO: Document 9303, part 1, vol. 2, e-passports. Retrieved 8 Sept. (2010). http://hasbrouck.org/documents/ICAO9303-pt1-vol2.pdf
Hwang, K., Cho, S.: Landmark detection from mobile life log using a modular Bayesian network model. Expert Syst. Appl. 36(10), 12065–12076 (2009)
Eastwood, S.C., Yanushkevich, S.N., Shmerko, V.P.: Belief network support via decision diagrams. In: Proceedings of the 45th IEEE International Symposium on Multiple-Valued Logic (2015)
Voorbraak, F.: On the justification of Dempster’s rule of combination. Artif. Intell. 48(2), 171–197 (1991)
Jirousek, R.: Local computations in Dempster-Shafer theory of evidence. Int. J. Approx. Reason. 53(8), 1155–1167 (2012)
Acknowledgments
We acknowledge collaboration with Dr. V. Shmerko (University of Calgary, Canada). This work was partially supported by the Natural Sciences and Engineering Research Council of Canada (NSERC) through the Discovery grant “Biometric intelligent interfaces”, and the Government of the Province of Alberta (Queen Elizabeth II Scholarship).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Eastwood, S., Yanushkevich, S. (2016). Risk Assessment in Authentication Machines. In: Abielmona, R., Falcon, R., Zincir-Heywood, N., Abbass, H. (eds) Recent Advances in Computational Intelligence in Defense and Security. Studies in Computational Intelligence, vol 621. Springer, Cham. https://doi.org/10.1007/978-3-319-26450-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-26450-9_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-26448-6
Online ISBN: 978-3-319-26450-9
eBook Packages: EngineeringEngineering (R0)