TY - GEN
T1 - Increasing security of webids through biometrics
AU - Gwyn, Tony
AU - Martin, Taylor
AU - Esterline, Albert
N1 - Publisher Copyright:
© 2020 IEEE
PY - 2020/3/28
Y1 - 2020/3/28
N2 - We are creating a streamlined way to adapt WebIDs [1], and biometrics [2] to the cyber world. This involves building a user authentication system that enables quick, fast and secure access. It is understood that compared to traditional username and password user authentication, WebIDs are designed to provide such services. Nevertheless, if an intruder either has direct access to the user's computer or somehow gets the unique certificate of the user, important information can be stolen with solely the use of WebIDs. Since biometric data (e.g. fingerprints, iris scanning, etc.) is unique and not easily duplicated, this possibility can be avoided by including biometrics in the authentication process. We also include an enrollment protocol that checks whether a user has a WebID while trying to access a server. If they do, we allow the user access to the server, and if they do not, by accessing their own server, we register the user for a WebID with their permission. Implementing these features in the WebID protocol will greatly enhance user authentication safety.
AB - We are creating a streamlined way to adapt WebIDs [1], and biometrics [2] to the cyber world. This involves building a user authentication system that enables quick, fast and secure access. It is understood that compared to traditional username and password user authentication, WebIDs are designed to provide such services. Nevertheless, if an intruder either has direct access to the user's computer or somehow gets the unique certificate of the user, important information can be stolen with solely the use of WebIDs. Since biometric data (e.g. fingerprints, iris scanning, etc.) is unique and not easily duplicated, this possibility can be avoided by including biometrics in the authentication process. We also include an enrollment protocol that checks whether a user has a WebID while trying to access a server. If they do, we allow the user access to the server, and if they do not, by accessing their own server, we register the user for a WebID with their permission. Implementing these features in the WebID protocol will greatly enhance user authentication safety.
KW - Authentication
KW - Biometrics
KW - WebID
UR - https://www.scopus.com/pages/publications/85104018985
U2 - 10.1109/SoutheastCon44009.2020.9368274
DO - 10.1109/SoutheastCon44009.2020.9368274
M3 - Conference contribution
T3 - Conference Proceedings - IEEE SOUTHEASTCON
BT - IEEE SoutheastCon 2020, SoutheastCon 2020
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2020 IEEE SoutheastCon, SoutheastCon 2020
Y2 - 28 March 2020 through 29 March 2020
ER -