You are on page 1of 6

Fuzzy Biometric Authentication in Home

Networks for Personalized Users’ Access


Mohamed Abid, Hossam Afifi Hassnaa Moustafa, Gilles Bourdon
Wireless Networks and Multimedia Services France Telecom R&D
Dept of Institut Telecom SudParis (Orange Labs),
Evry, France Issy Les Moulineaux, France
{mohamed.Abid, hossam.Afifi}@it-sudparis.eu {hassnaa.moustafa, gilles.bourdon}@orange-ftgroup.com

Abstract- Thanks to the advances in communication Single-Person homes, ii) Couple with Small
and wireless technologies, many personal devices are Children, iii) Families with Teenagers, and iv)
able to interact within a new type of network called Adult Guests and Roommates. In our study we
Home Networks (HNs). However, we need to protect consider the last two types, since they need more
the privacy of the users and secure their data during
constraints in the security policy especially
transfer. A number of works has been carried out
recently to allow users’ authentication within these concerning the access to the Internet and to the
networks using a biometric approach. eventual services in one hand, and they present an
In this paper, we propose a new biometric important market to telecom operators and service
authentication method in HNs having broadband providers on the other hand.
access to the Internet. The proposed solution employs In fact, Biometric authentication is promising
the Fuzzy Vault biometric scheme and enables each in the HN scenario. Biometric authentication
user to access to his applications’ profiles in a systems consist of two steps, which are enrollment
personalized and secure manner. Our proposed and authentication. In the enrollment phase, the
solution brings additional privacy and does not
biometric data are captured from a user, where the
disclose the biometric data of the users. This solution
is consistent with the operator constraints regarding biometric features are extracted and eventually
the performance and technical aspects. stored in a database. As for the authentication
phase, we need to distinguish two alternative
Keywords-component; Biometric Authentication; Home methods:
Networ; Personalized access; Fuzzy vault • Verification: the user who claims an identity
presents some form of identifier (like used ID,
I. INTRODUCTION
ATM card) and a biometric characteristic. The
As more homes are outfitted with computers new features will be compared with the stored
and personal devices (ex, PDA, cellular phones, ones, associated with the provided ID (1-to-1
MP3 players, games consoles), it is natural to think matching);
of interconnecting devices for data and access • Identification: The new features extracted will
sharing peripherals (such as printers). As a be compared to the entire database for matches
consequence, users wish to explore the possibility (1-to-N matching).
of connecting the Home Network (HN) to the The difference between a password and a
Internet. In this paper, we focus on the biometric template is relative to the replay attack, a
authentication of each user within the HN, using a password is supposed to be secret, while biometric
novel biometric modalities, to access to the local templates are not. Some systems incorrectly assume
services and hence to the Internet that biometric measurements are secret and grant
As defined in [1], a HN is composed of access when matching biometric features are
personal devices, within the home, connected to a presented. To resolve such a problem, we need to
local gateway, also known as the Home Gateway combine biometry with cryptography and we try in
(HG) or the Home Server. In fact, the HG plays the this paper to clarify and highlight this issue.
role of a communication-gateway between the The rest of this paper is organized as follows:
indoor and outdoor world (i.e. the Home and the Section II and III discuss some related works on
Internet). In the context of our work, the HG also Biometric cryptography and Home Network
plays the role of an authentication server, while Access. Section IV presents the new proposed
users’ devices (such as, PDA, lap-tops, PC...) are solution. Section V presents an analysis for the
considered as authentication clients. proposed solution. Finally, we conclude the paper
In [2], Ellison defines many kinds of HNs in Section VI highlighting some future work.
based on the home users, these are as follows: i)

978-1-4244-2036-0/08/$25.00 ©2008 IEEE.

Authorized licensed use limited to: College of Engineering. Downloaded on February 28,2010 at 07:12:23 EST from IEEE Xplore. Restrictions apply.
used to interpolate P (their number must be equal to
II. BIOMETRIC CRYPTOGRAPHY or higher than N + 1).
Using Biometrics involves resolving the The algorithm decodes many candidate secret
privacy protection problem, where users would not keys. Then, it finds which one of these candidates is
probably like to leave their Biometric Templates the actual secret using Cyclic Redundancy Check
(BTs) in databases. As a consequence, number of (CRC).
studies specifically targeting to secure biometric
systems has grown significantly. Encrypting BTs is III. RELATED WORKS
an employed approach, however it seams to provide In this section, we present some existing
an insufficient solution, since BTs circulate in solutions for users’ authentication in HNs. We
network and thus it is easy to be recovered. consider that most devices in HNs can use wireless
One should notice that BTs are fuzzy due to the connection (IEEE 802.11) with a Home Gateway
noises in the real images, and thus the BT of each HG.
user will be different for each acquisition. The early One of the first solutions is the use of WEP[5]
contributions like that of Juels and Sudan [3] work keys to authenticate each user (eventually
on “fuzzy vault construct”. In [3], the sender can authenticating the device that is being used by the
place a secret S in a vault and lock (secure) it using user and not the user himself). WEP keys proved to
an unordered set A (this can be the fingerprint be vulnerable to attacks due to the weakness of the
minutiae). On the other hand, the receiver, using an employed RC4 encryption mechanism as well as
unordered set B, can unlock the vault (access S) the insufficient key size. Others type of solutions
only if B substantially overlaps with A. A and B are are based on Passwords or tokens. Since HNs users
fuzzy templates. In [4], Uludag and Jain’s solution do not always have very strong knowledge on
aimed to construct a fuzzy vault in form of a 2D network security, they will probably choose weak
point cloud containing a secret such as a symmetric secrets or they will forget to change it in a periodic
encryption key. This solution is based on the idea manner, ignoring the necessity to do this. Another
suggested by Juels and Sudan [3]. In Uludag et al. solution approach is based on using certificate
scheme, Alice can place a secret S (e.g., secret authentication methods, which is more secure but
encryption key) in a vault and lock (secure) it using has the problem of certificate distribution and
an unordered set A of minutiae point. On the other revocation.
hand, Bob, using an unordered set B, can unlock the A novel solution is proposed by Lee et al. in
vault (access S) only if B substantially overlaps [1] employing the biometry in an EAP (Extensible
with A. Authentication Protocol) [6] authentication model.
Figure 1 [1] illustrates this approach. A new
A. Vault Construction
message is added to EAP authentication, in a way
The procedure to build the fuzzy vault is that is some how similar to EAP-TTLS (Tunneled
described as follows: TLS “Transport Layer Security”) authentication [7].
• Initially, Alice chooses a polynomial P of
degree N which encodes S (S is generated as a
128-bit random bit stream, like an AES
symmetric encryption key. S will be then used
in the construction of P).
• Then, Alice calculates the polynomial
projection, P (A), where A is the minutiae
points. (If (x, y) is an element of A then u =x|y
is used to calculate the value P (u)).
• Alice adds some points generated randomly
(chaff points) whose image does not belong to
P.
B. Vault Decoding
When Bob tries to recover S (through trying to
find the coefficients of P), he uses his own set of
unordered points B.
To decode the fuzzy vault, we need to retrieve
the same polynomial to extract the secret. Figure 1. EAP with Biometry (reference [1])
If B equalizes or differs a little from A, B will The required steps of this proposed solution are
be able to locate some abscissa u, which will be as follows:

Authorized licensed use limited to: College of Engineering. Downloaded on February 28,2010 at 07:12:23 EST from IEEE Xplore. Restrictions apply.
(1) Users BTs are enrolled at the HG. while keeping in mind the constraint of the non
(2) Client device (i.e. user authentication client storage of the users’ Biometric Template BT in the
module) authenticates the HG by verifying its HG. To satisfy this constraint, we propose using the
certificate. Fuzzy vault method [4] to hide a secret that should
(3) The user and the HG will then share the same be used for authentication. The HG has the role of
key and cipher suites through using TLS protocol. generating a secret for each user session, which will
(4) The user BT encrypted by the shared key is be hidden by the BT. The user needs to recover the
transferred to the HG. secret in order to authenticate.
(5) The user authentication result is transferred to
A. Solution Description
the user device in an encrypted form, where
legitimate users get authenticated. We consider a Home Network HN scenario in
which users connect to a Home Gateway HG for
Biometric authentication is applied in the solution broadband Internet access, using any equipment in
proposed by Lee et al., however some limitations the HN. Each user should be recognized through
exist. We noticed in this solution that the BT is just presenting his BT in order to get authenticated and
encrypted and then sent in the network which to obtain a personalized access. The objective is
makes the personal data exposed to attacks. This allowing each user in the HN to have a personalized
solution aims at creating a new EAP method called access and to access his proper personal context.
EEAP (Encrypted Extensible Authentication From an operator view, the proposed solution
Protocol). Thus, the solution is less compatible with respects the operational constraints as well as the
the existing standards EAP protocols and hence is constraints posed by the CNIL (French Data
difficult to be deployed at a commercial level. protection Authority) [8] concerning the use of the
Moreover, it is not clear how the same key is biometry. The former concerns the compatibility of
exchanged between the client and the server to the proposed solution with the AAA
encrypt the BT, another field concerning this key (Authentication, Authorization and Accounting)
need to be specified. architecture at the operator’s network, where there
We notice that the above discussed solutions, is no need to use new authentication protocols or
except Lee et al. one, mainly aim at authenticating modify the existing ones. While, the latter concerns
the Home Network itself without regarding which the illegal storage of BT as well as its non reveal.
user is being connected (i.e. the network
operator/service provider only identifies the HN
owner “subscriber”). But in a finer granularity
level, each user is a separate entity having his
profile’s, and thus should be authenticated
separately using personalized security parameters.
At the same time, the privacy of each user should
be guaranteed. In this context, biometric
authentication is a promising solution allowing
identification of each user according to his BT and
thus authenticating him in a distinguished manner
and personalizing his access.
In our work, we employ the biometric
authentication concept; however our solution
avoids sending BT in the air. The proposed solution
is detailed in the next section and analyzed in
Section V.
IV. PERSONALIZED USERS’ ACCESS IN HOME
Figure 2. Access Personalization in Home Networks HN
NETWORKS: A PROPOSED SOLUTION
In this section, we present a new solution, in We consider that a biometric identifier is
which we add another level of security through fine created using user’s BTs, and stored in a local
granulity authentication. We aim at personalizing manner (as explained below). This identifier is not
the access of each user in the HN and preventing transferred in the network. One should also notice
illegitimate users (passing by the HG) to have any that the size of storage is minimum (limited to the
access. Our approach of personalized access also number of family members at home). Figure 2
permits each user to use any device in the HN, illustrates the context of the proposed solution.
while being able to access his appropriate profile.
We propose a new biometric authentication method,

Authorized licensed use limited to: College of Engineering. Downloaded on February 28,2010 at 07:12:23 EST from IEEE Xplore. Restrictions apply.
need to type a login or a password. In this case, the
B. Required Conceptual Steps
finger-print acquisition is done through the HN
The proposed solution requires a number of equipment that is being used, and they are treated
steps, which mainly concerns the equipments’ (as explained in the previous step) to generate the
configuration and the BT treatment and storage. user identifier BioID. The generated identifier is
The required conceptual steps are as follows; then compared with the one stored in the equipment
1) Configuration Phase: for the same user, if the same identifier exists, the
In this phase, each user should present his BT corresponding login is sent to the HG and the
(finger-prints template) to be manipulated and process of user’s authentication starts.
stored in the database of the HG. 3) Users’ Biometric Authentication:
• The finger-print acquisition of each user is In step2 and step3, the HG having received the
carried out using the HN equipments, which user login, searches in its database the
are supposed to have integrated biometric corresponding BioID to this user, and then it starts
sensors. authenticating the user based on this identifier in
• The finger-print of each user is not used as is, order to allow him to have personalized access. The
but it is treated following the mechanism authentication process is mainly based on a
illustrated below for generating an identifier challenge-request/challenge-response approach.
corresponding to the user. The generated BioID Figure 4 illustrates the corresponding
is then stored in the database of the HG and messages’ exchange:
HN equipments. The record in the HG should • A secret message is created by the HG and
be manual in the configuration phase to be sure used as a challenge for the user that wishes to
that it is the illegitimate HG (i.e we don’t have connect.
till now a secure wireless session). • The Fuzzy Vault [4] method is applied in order
Once the digital finger-print is enrolled using a to construct a vault that hide the secret key. The
biometric sensor at the HN equipment, a software, BioID is used to create the vault following the
which generates minutiae, is applied for extracting method described in section II.
the minutiae. A predefined number of theses • The resulting vault and the challenge are
minutiae is then selected to create a biometric transmitted to the user.
identifier (BioID). We can choose to use 24 genuine • The user should deblock the vault using his
minutiae points to create BioID with 384 bits size. BioID (resulting from the current finger-print
This gives a good opportunity to use a 128 key capture) in order to get back the secret
seize. message.
The BioIDs of users are then stored in a table • Once the secret message is found, the user
form (this could be a special file) together with the transmits to the HG the challenge that he
logins that correspond to their owners. Figure 3 received encrypted with the recovered secret
shows the storage form of users’ BioIDs in the HN message.
equipment and in the HG. • The HG then decrypts the challenge using the
secret message and compares it with the one
initially sent. If the comparison result is the
same, the user is authenticated and he gets a
personalized access.
We consider that the messages exchange
during the challenge-request/challenge-response
takes place using the EAP. Thus, we need only to
piggyback the vault and the challenge in the EAP-
request. We highlight that this solution is open for
any EAP method. However during the future
implementation, we will choose the suitable EAP
method according to the application scenario.
Figure 3. BioID Storage in the Home Network HN Analysis of the Proposed Solution
We can choose to use 24 genuine minutiae The proposed solution is advantageous in the
points to create BioID with 384 bits size. sense of allowing an ease of access (each user
2) Users’ Connection to the Home Gateway: simply presents his finger-print), and assuring
Each time the user wishes to connect to the personalized users’ access in spite of the
HG, he does a new acquisition for his finger-print equipment/terminal that is being used. Conforming
in order to identify himself (step1), with out any to the CNIL recommendation on the storage of BT

Authorized licensed use limited to: College of Engineering. Downloaded on February 28,2010 at 07:12:23 EST from IEEE Xplore. Restrictions apply.
by non governmental authorities, the proposed Only some random minutiae should be stored,
solution assures a local storage of the acquired which identifies the finger-print owner (the
finger-prints (limited to the HG and the HN corresponding user) but is insufficient to recover
equipments). In addition, the finger-prints are the whole finger-print. We choose to change secret
treated before being used or stored. This allows key each time the user connects, so the attacker
decreasing the risk of their theft in case that the HG could not retrieve the BioID.
is compromised by an intruder for instance. 1) Attacks on the Home Gateway
During the communication with the HG, we
assume that the HG uses its certificate (previously
obtained by a Certificate Authority (CA)). So an
attacker (illegitimate used) could not decrypt the
communication between the HN users and the HG,
since he needs the server’s private key to decrypt
the message ciphered with server’s public key. On
the other hand, if an attacker wants to impersonate
the HG, he couldn’t create a validate vault, because
he will choose a secret but he don’t have the BioID
which is created on the configuration phase.
2) Impersonating users
Thanks to applying the fuzzy vault mechanism
[4], the Genuine Accept Rate (GAR) is expected to
be 72.6% at FAR (False Acceptance rate) = 0%.
When a malicious user wishes to impersonate the
illegitimate user, he is neither able to decode the
vault nor able to cipher the challenge with secret
key since he does not have the same BioID.
V. CONCLUSION
Home Networks (HNs) security is an emerging
Figure 4. Messages Exchange for Authorizing the Personalized
Access
subject, attracting both the research community and
the industry. An important trend is to separate
C. Technical Analysis user’s authentication from the used device,
From a network operator/service provider allowing for fine granularity authentication and
view, the proposed solution is compatible with the users’ personalized access in spite of the used
existing Authentication Authorization Accounting device in the HN.
AAA infrastructure. We need only to piggyback the Applying biometric authentication is promising
vault and the challenge in one EAP-request. In in allowing users’ authentication in a distinguished
addition, this solution is promising in opening new manner as well as personalized users’ access.
business opportunities, thanks to the biometric However, this technology should be carefully used
authentication method that allows for a in order to protect users’ privacy and prevent the
personalized users’ access and hence a better access disclosure of their biometric template BT. Our
control in HNs (for instance, it makes it easy to proposed solution allows the protection of private
monitor and control the children’s access to the BT thanks to applying the fuzzy vault mechanism.
Internet, even during the absence of their parents). A next step for this work is an implementation
The personalized users’ access in the proposed in order to have a proof of concept of the proposed
solution, allows controlling the access for each approach as well as a performance estimate
broadband access line depending on the user that is compared to other non biometric approaches. An
being connected. However, in classical broadband important point that will be also studied concerns
access control, the connection itself is authenticated the fuzziness of BTs and how to diminish it.
which is considered as a part of the configuration REFERENCES
phase. The authentication takes place each time the
Home Gateway HG is granted an IP connectivity [1] Y. Lee, H. Ju, J. Park, J. Han, “User authentication
mechanism using authentication server in home network,”
(and hence Internet connection for a user). Advanced Communication Technology, 2006. ICACT
2006. The 8th International Conference, Volume 1, Feb.
D. Security Consideration 2006 Page(s) 503- 506.
Applying the proposed solution is promising in [2] C. M. Ellison, “Home Network Security,” Intel
avoiding the storage of users’ BTs in databases. Technology, Spring 2002.

Authorized licensed use limited to: College of Engineering. Downloaded on February 28,2010 at 07:12:23 EST from IEEE Xplore. Restrictions apply.
[3] A. Juels and M. Sudan. “A fuzzy vault scheme,” in A.
Lapidoth and E. Teletar, editors, Proc. IEEE Int. Symp.
Information Theory, page 408, 2002.
[4] U. Uludag and A. Jain, “Securing Fingerprint Template:
Fuzzy Vault with Helper Data,” Proc. IEEE Workshop on
Privacy Research In Vision (PRIV), New York City, NY,
June 2006.
[5] N. Borisov, I. Goldberg, D. Wagner, “Intercepting mobile
communications: the insecurity of 802.11,” Proc.
MobiCom '01: Proceedings of the 7th annual international
conference on Mobile computing and networking, Rome,
July 2001, page 180--189
[6] B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, H.
Levkowetz, “Extensible Authentication Protocol (EAP),”
RFC 3748.
[7] P. Funk, “EAP Tunneled TLS Authentication Protocol
Version 1 (EAP-TTLSv1),” IETF draft-funk-eap-ttls-v1-
01, March 2006
[8] Commission Nationale de l'Informatique et des Libertés
(CNIL), “Dossier biométrie,” http://www.cnil.fr,
12/03/2007.

© TELECOM & Management SudParis (ex INT), 2007,


9, rue Charles Fourrier – 91011 Evry Cedex, Mohamed Abid and
Hossam Afifi
And
© FT SA, 2007, Head office at 6 place d' Alleray 75505
Paris Cedex 15, Hassnaa Moustafa and Gilles Bourdon

Authorized licensed use limited to: College of Engineering. Downloaded on February 28,2010 at 07:12:23 EST from IEEE Xplore. Restrictions apply.

You might also like