Pradeep R.

Work place: Department of Computer Science and Engineering, Siddaganga Institute of Technology, Tumakuru, 572103, India

E-mail: pradeepr@sit.ac.in

Website: https://orcid.org/0000-0003-2865-720X

Research Interests: Security Services, Network Security, Information Security, Application Security

Biography

Pradeep R. is currently pursuing his Ph.D. in Computer Science and Engineering from Visvesvaraya Technological University, Belagavi, India. He earned his M.Tech. in Digital Communication and Networking and B.E. in Information Science and Engineering from Visvesvaraya Technological University (VTU), Belagavi, India in the years 2014 and 2012 respectively. He has published papers in various reputed International Journals and Conferences. His research interests include Formal Verification of Security Protocols, Biometric Security Systems, Block Chain and Face Recognition Technology.

Author Articles
A Modern Mechanism for Formal Analysis of Biometric Authentication Security Protocol

By Pradeep R. N. R. Sunitha G. S. Thejas

DOI: https://doi.org/10.5815/ijcnis.2023.03.02, Pub. Date: 8 Jun. 2023

A Biometric Authentication Security (BAS) protocol is a method by which a person's unique physiological or behavioral characteristics are used to verify their identity. These characteristics can include fingerprints, facial features, voice patterns, and more. Biometric authentication has become increasingly popular in recent years due to its convenience and perceived security benefits. However, ensuring that the BAS protocols are secure and cannot be easily compromised. . Developing a highly secure biometric authentication protocol is challenging, and proving its correctness is another challenge. In this work, we present a modern mechanism for formally analyzing biometric authentication security protocol by taking a Aadhaar Level-0 Iris-based Authentication Protocol as a use case. The mechanism uses formal methods to formally verify the security of the Aadhaar Level-0 Iris-based Authentication protocol, and is based on the widely-used BAN logic (Buruccu, Abadi, and Needham). Using Scyther model checker we analyze the existing biometric authentication protocol and have shown its effectiveness in identifying potential security vulnerabilities. The proposed mechanism is based on a set of security requirements that must be met for the protocol to be considered secure. These requirements include the need for the protocol to be resistant to replay attacks, man-in-the-middle attacks, and impersonation attacks. The mechanism also considers the possibility of an attacker obtaining the biometric data of a legitimate user.

[...] Read more.
Other Articles