A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment

Kai Xi, Tohari Ahmad, Fengling Han, Jiankun Hu*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

79 Citations (Scopus)

Abstract

With fast evolution of mobile devices and mobile network, the need of protecting user sensitive information locally and performing secure user authentication remotely become evermore increasing. Bio-cryptography is emerging as a powerful solution which can combine the advantages of conventional cryptography and biometric security. In this paper, we present an efficient bio-cryptographic security protocol designed for client/server authentication in current mobile computing environment, with a reasonable assumption that server is secure. In this protocol, fingerprint biometric is used in user verification, protected by a computationally efficient Public Key Infrastructure (PKI) scheme, Elliptic Curve Cryptography (ECC). The genuine fingerprint information is hidden in the feature vault which is the mixture of genuine and chaff features. Fingerprint features are not only used for biometric verification but also for cryptographic key generation. Our security analysis shows that the proposed protocol can provide a secure and trustworthy authentication of remote mobile users over insecure network. Experimental results on public domain database show an acceptable verification performance. We also tested the computational costs and efficiency of our protocol on the CLDC emulator using Java ME (previous J2ME) programming technology. The simulation results prove that the proposed protocol suits current mobile environment.

Original languageEnglish
Pages (from-to)487-499
Number of pages13
JournalSecurity and Communication Networks
Volume4
Issue number5
DOIs
Publication statusPublished - May 2011
Externally publishedYes

Keywords

  • Bio-cryptography, mobile computing, biometric, fingerprint authentication

Fingerprint

Dive into the research topics of 'A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment'. Together they form a unique fingerprint.

Cite this