Anda di halaman 1dari 6

BIOMETRIC IDENTIFICATION ARCHITECTURE: INTEGRATION WITH CELLULAR TECHONOLOGIES

BIOMETRIC IDENTIFICATION ARCHITECTURE :


INTEGRATION WITH CELLULAR
TECHONOLOGIES
BY
VADAN MEHTA
TATA CONSULTANCY SERVICES
VADAN.MEHTA@TCS.COM

ABSTRACT
This paper describes Biometric System’s architecture
and integration with cellular technologies. First I have Increasing security concerns and ease of management
explained the conceptual framework of biometric more state governments are turning towards
identification architecture., followed by mobile VPN Biometrics verification of it’s citizen. The Unique
introduction and possibly alternatives to utilize mobile Identification Authority of India (UIDAI), initiated
VPN to interconnect components of Biometric UID (Unique Identification) project, where it plans to
architecture. provide biometric identity to each of citizen as
optional to ID proof such as PAN card, voting Card,
Driving license etc, as used today. The vision of UID
is to make a national database, containing biometric
information such as finger prints cards of citizens,
INTRODUCTION which can be used by security agencies, Income tax
Biometrics (ancient Greek: bios ="life", metron department, Police and other related institutes.
="measure") is the study of automated methods for
uniquely recognizing humans based upon one or more This paper describes conceptual framework to use
intrinsic physical or behavioral traits. In contrast with cellular backhaul to interconnect biometric client to
probably every other method of authentication, central data repository.
biometric authentication aims to be completely non-
transferable. Examples of physical characteristics BIOMETRIC IDENTIFICATION
include fingerprints, eye retinas and irises, facial
patterns and hand measurements, while examples of ARCHITECTURE
mostly behavioral characteristics include signature,
gait and typing patterns. Voice is considered a mix of Biometric identification Architecture incorporate a
both physical and behavioral characteristics. reader, scanner and camera for the capture of a
biometric identifier (e.g. fingerprint or facial image),
which is converted by software into digital format
(template) for storage and comparison against other
records held in a Central database repository(UID in
our case)

Copyright:
Permission to make digital or hard copies of all or part of this work
for personal or classroom use is granted without fee provided that
copies are not made or distributed for profit or commercial
advantage and that copies bear this notice. To copy otherwise, or
republish, to post on servers or to redistribute to lists, requires prior
specific permission and/or a fee.
TACTiCS – TCS Technical Architects’ Conference’09 Figure 1: Architecture

TACTiCS 09’ -1
BIOMETRIC IDENTIFICATION ARCHITECTURE: INTEGRATION WITH CELLULAR TECHONOLOGIES

General biometric architecture is mainly divided into I propose to use Cellular technologies((GSM,
three parts. CDMA2000, Wimax)., because of their omni present
nature and easy provisional aspects.
 Data Collector: A device to collect the biometric
data (Figure prints, Iris, Voice etc), convert into The proposed architecture is to connect bio scannesr to
digital template and send it to Central database available cellular technology via encrypted mobile
for processing. VPN service.. (See figure 2)
 Transmission: To carry Biometric template to
central server using telecommunication
technologies. It involves, secured transmission,
compress-decompress and signal processing.
 Central Database: Central data repository
process the data in order to render an
authentication decision based on matching
process of stored to current process. (see
Figure 1)

Operation
All biometric systems run in two separate
processing phases:
1) Enrolment 2) Verification Figure 2: Biometric using cellular backhaul framework

 Enrolment
In this processing phase the individual subject VPN
provides samples of a biometric characteristic to
establish a new so called reference template. The public Internet was specifically designed to
quickly route traffic between any two connected
 Verification points. The Internet is composed of countless network
After the enrolment, the subject is known by the devices that are administered by different
biometric system. When the subject provides a query organizations. No one organization can control or be
template, it is processed and compared with the saved responsible for the privacy and integrity of data as it
reference templates of all enrolled templates, stored travels over the Internet. The Internet is sometimes
repository database. viewed as an insecure means of transmitting data
because there are opportunities for modification and
The output of the system may be a simple yes/no, or deletion of data. A variety of well publicized attacks
an identity credential with identity information about and viruses have made it painfully obvious that the
the subject or a list of identity data that correspond to Internet is insecure. VPN (Virtual Private Network )
the best matches for a client system. The measured addresses the lack of security on the Internet, by
accuracy of a template is an estimate of how reliable a providing authentication and encryption between two
comparison can be made between the stored template end points.
and the user’s template, that is scanned later for
authentication. The enrollment quality is expressed as (See figure 3)
a percent score between 0 and 100. For example, a
user may have an enrollment quality of 72 percent..

CELLULAR INTEGRATION

Biometric ID system requires to connect bio-scanners,


located at various geographical places to its central
database for enrolment and verification purpose.
Biometric scanners can be hand held devices or fixed
terminal, with bio metric data collection capability.
These devices required to integrate with existing Figure 3: VPN concept
telecommunication technologies, to transmit their data
to central data repository.

A VPN is a way to build a secure, private


communication infrastructure on top of a public

TACTiCS 09’ -2
BIOMETRIC IDENTIFICATION ARCHITECTURE: INTEGRATION WITH CELLULAR TECHONOLOGIES

network. VPNs are logical networks that connect authentication, and protection against replays, but does
physical networks or single hosts to each other by not provide secrecy. On the other hand, ESP supports
forming encrypted tunnels over public networks. VPN confidentiality, connectionless integrity, anti-replay
guarantee privacy and security, allowing companies to protection, and optional data origin authentication.
communicate information—no matter how sensitive it
is—over the Internet inexpensively.

Connectivity

VPN client uses special TCP/IP-based protocols,


called tunneling protocols, to make a virtual call to a
virtual port on a VPN server. In a typical VPN
deployment, a client initiates a virtual point-to-point
connection to a remote access server over the Internet.
The remote access server answers the call,
authenticates the caller, and transfers data between the
VPN client and the organization’s private network.

To emulate a point-to-point link, data is


encapsulated, or wrapped, with a header. The
header provides routing information that enables
the data to traverse the shared or public network Figure 4: IPSEC architecture
to reach its endpoint. To emulate a private link, the data
being sent is encrypted for confidentiality. Packets that are A key concept that appears in both security services is
intercepted on the shared or public network are the Security Association (SA). A SA is a one-way
indecipherable without the encryption keys. The link in
relationship between a sender and a receiver that
which the private data is encapsulated and encrypted is
known as a VPN connection.
affords security services. In order to establish a SA
between two hosts, they must first agree to apply
compatible policies and cryptographic algorithms.
VPNs can be built on tunneling protocols that are They must also share a material over an insecure
implemented at different layers of the OSI seven- channel secure mechanism for determining keying.
layer model. Tunnel characteristics are determined by The default IPsec method for secure key negotiation is
the protocol the tunnel is built upon. Tunnels can be the Internet Key Exchange (IKE) protocol.
established at the following layers of the OSI model: IKE consists of two sequential phases. Phase 1 creates
an Internet Security Association and Key Management
• Layer 2, the Data Link layer, uses L2TP and PPTP Protocol (ISAKMP) SA (or IKE SA) that establishes a
tunneling protocols. These protocols use bi-directional secure channel between the security
password authentication to prevent unauthorized endpoints. Phase 2 negotiates an IPsec SA using the
dial-up connections. pre-established channel. Multiple IPsec SAs can be
established from a single ISAKMP SA, which may be
• Layer 3, the Network layer, uses IPSec tunneling considered as a “control channel”, where IKE is the
protocol built over IP. This protocol authenticates control protocol.
and encrypts data transmission by adding Both AH and ESP support two modes of use: transport
network layer information to each packet. and tunnel mode [1]. The transport mode mainly
provides end-to-end protection, where the IP packet’s
IPSec (Internet Protocol Security) was developed as a payload is encrypted. On the other hand, the tunnel
standard by the IETF to address the authentication and mode encapsulates an entire IP packet (including the
encryption limitations of the Layer 2 tunneling IP header) within a new IP packet to ensure that no
protocols. IPSec provides message integrity, privacy, part of the original packet is visible, or may be
authentication, and replay protection. changed as it moves through a network. Even though
An IPSec tunnel can be created between two IPSec there is some criticism on IPsec, it is commonly
gateways or between and IPSec gateway and a remote admitted that it is the best IP security protocol
user who has an IPSec VPN client installed. available today [8]. It facilitates the authentication of
the communicating entities, and the transparent
IPSEC Architecture encryption and integrity protection of the transmitted
packets in both IPv4 and IPv6 networks. It is
As per figure 4, IPsec grants two choices of security especially useful for implementing VPNs, and remote
service: Authentication Header (AH), and access to private networks. Because of its flexibility,
Encapsulation Security Payload (ESP). AH provides the IPsec enables security service deployment across
support for connectionless integrity, data origin any existing IP network. On the other hand, the main

TACTiCS 09’ -3
BIOMETRIC IDENTIFICATION ARCHITECTURE: INTEGRATION WITH CELLULAR TECHONOLOGIES

drawback of IPsec is its complexity, as it incorporates network, and a VPN client in their mobile or fixed
a considerable number of independent protocols, devices. All that the private network IT department
which operate in multiple modes . needs to do is to provision a VPN gateway connected
to the Internet and capable of terminating a particular
. type of tunneling, and establish a proper set of policies
and security procedures. The service provider offering
Internet access service cannot access the end-to-end
MOBILE VPN IMPLEMENTION encrypted private data being transmitted between
remote user and private network, and hence it will not
A Mobile VPN extends the VPN concept to mobile have to be entrusted with it.
environment. Devices such as hand held biometric
scanners are used to generate data applications/template.
These devices establish an IPSec VPN tunnel from their
handheld device (smart phone or PDA) to IPSec gateway
over the Internet using wireless connection such as Global
System for Mobile Communications (GSM), General
Packet Radio Service (GPRS), 3G telecom technologies
(UMTS, CDMA Evdo) or wireless LAN (WLAN). This
wireless VPN tunnel allows hand held scanners to access
their centralized database with ensured authentication and
encrypted traffic
IP tunneling is central to implementing MVPN. IP
tunnels are paths that IP packets follow while
encapsulated within the payload portion of another
packet. These encapsulated packets are sent to Figure 5: Voluntary VPN (GPRS)
destination endpoints from originating endpoints via
public (non-secure) channels. There are two basic
tunneling methods for implementing IP VPNs — end- While voluntary tunneling provides a simple, secure
to-end or “voluntary;” and network- based or end-to-end solution for access to private networks, it
“compulsory”. MVPNs based on voluntary tunneling also leads to extra encapsulation overhead over last-
are implemented by providing users with public hop wireless links. Also, this is a less efficient, more
internet access and then enabling them to establish a costly use of radio resources. In volume-based
VPN on top of this access to get access to corporate charging scenarios for instance, such overhead could
VPN gateways. Network-based 'compulsory tunneling', significantly
in contrast, is based on the idea that the wireless increase corporate costs for remote connectivity.
operator's network infrastructure itself features the Voluntary tunneling carries a number of other
intelligence and functionality necessary for the drawbacks as well. For example, it requires that
deployment of MVPNs, and that these tunnels need mobile nodes be given public addresses allowing end-
not be established by the end-user via their mobile to-end transparent IP connectivity. In addition, it
device. requires complex encryption and decryption
algorithms, which can increase the complexity and
cost of mobile devices, which typically have low
Voluntary MVPN
processing power and are often battery power
consumption limited.
Voluntary IP VPN provides remote users with the Also, with voluntary tunneling, applications that need
ability to create a tunnel from their terminals(bio to inspect or modify encapsulated packets will be
scanners), to certain tunnel termination point, such as unable to get access to user traffic. This means that
a VPN gateway(Central database repository) that QoS solutions, traffic-shaping mechanisms,
resides within the private network, hosting central monitoring equipment and firewalls will fail to
database repository. For this to happen, remote access perform their functions, and encapsulated (secured)
device, such as biometric scanner must support packets cannot
tunneling protocol, IPSEC) This type of VPN service be modified by the Network Address Translation
is depicted in Figure 5, which uses mobile dial-up (NAT) protocol.
access over a GPRS network as an example. In this
scenario, the remote user establishes a VPN
connection to a private network after a wireless carrier Compulsory MVPN
grants him or her Internet access.
Voluntary VPN carries a number of significant A service provider may offer compulsory VPN service
advantages. For private network IT administrators and by concatenating or chaining multiple tunnels or
often for remote users, this is the simplest way to provisioning a single tunnel for a part of a data path
establish a remote access VPN. Remote users simply between two participating endpoints. For example, a
need access to the Internet or any other public IP compulsory VPN can be based on a tunnel created

TACTiCS 09’ -4
BIOMETRIC IDENTIFICATION ARCHITECTURE: INTEGRATION WITH CELLULAR TECHONOLOGIES

between a private network and a service provider and battery-life-consuming. Also, the user is not involved
not extended to reach all the way to a remote user that in VPN creation and only needs to request the service
is using the network access service. As a result, with when accessing the service provider's network.
compulsory VPN service the remote user does not
need to have any involvement into VPN establishment Compulsory VPN presents a number of other
process and is "forced" to use the available significant advantages to service providers. Offering
preprovisioned service whenever the access to the and marketing compulsory VPN as a feature can
private network is required, hence the name. This potentially enable new business models and carrier
VPN type assumes that the operator's network service offerings. With the voluntary approach, service
infrastructure features the intelligence and providers do not get involved in provisioning and
functionality necessary to support VPN services based often are not even aware of the existence of encrypted
on the tunnels or sets of tunnels provisioned between and encapsulated traffic unless they offer special
the private network and service provider's networks access points to the Internet associated to publicly
rather than all the way to the end-user device. In both routable IP addresses or NAT traversal-compliant
cases, the enterprise must preestablish a detailed SLA devices. In contrast, compulsory VPN access offerings
with the service provider responsible for VPN service can be marketed in different forms by carriers to a
and must trust it to handle its valuable data with the variety of private enterprises and ISPs interested in
necessary care and confidentiality. outsourcing their remote access function. This will
bring new revenue streams, along with greater
In this kind VPN, tunneling protocols (GTP for differentiation from the competition service offerings.
GPRS/GSM and GRE for CDMA EvDo) is used to
tunnel the data traffic between access network to Another benefit of compulsory VPN for service
gateway and from gateway to VPN server, IPSEC providers lies in greater control over the user. In a
tunnel is being established (Figure 6). compulsory model, the service provider is usually
involved in user authentication and IP address
assignment (though the latter might be a mixed
blessing in some situations), which allows it to control
user provisioning to a greater extent. IP addresses can
be assigned to remote users from the customers'
networks private address space, thus saving the usage
of publicly routable IP addresses from the provider
side.

Voluntary vS Compulsory MVPN

Table 1, describes the comparison between voluntary


and compulsory MVPN.
Voluntary MVPN Compulsory MVPN
Figure 6: Compulsory VPN Workes on with Public
Works on Private IP
IP( limited resource)
In mobile environment, security problems become Enterprise has full control Service provider has full
serious, since the user traffic is being sent over over policies control over policies
potentially insecure radio channels. During packet
data roaming, the unprotected traffic to and from the Air bandwidh overhead
Less overhead on Air
mobile station must also traverse the visited carrier upto 30%
network (which may or may not have established SLA QoS SLA not supported QoS SLA supported
with the corporation served by a home wireless Hand held devices
carrier) before being tunneled to original carrier's
network. If there are insecure links in this network,
requires to support IPSEC Network gateway requies to
especially unencrypted links in the backhaul section, (CPU and power support IPSEC
this could present serious security problems. limitation)

On the positive side, the compulsory approach better


Does support NAT with NAT
Do not support NAT
utilizes the air interface by avoiding over-the-air traversal functionality
encapsulation overhead, which is especially
advantageous for cellular wireless systems, and by Table 1: Comparison between Voluntary & Compulsory MVPN
simplifying the user equipment. When compulsory
VPN is used, the end-user equipment does not have to
support any VPN clients or tunneling or security
capability at times they could be CPU-hungry and

TACTiCS 09’ -5
BIOMETRIC IDENTIFICATION ARCHITECTURE: INTEGRATION WITH CELLULAR TECHONOLOGIES

CONCLUSION REFEERENCES
Biometric Identification architecture can utilize
existing cellular network to interconnect it’s major  Mobile VPNs for Next Generation GPRS and
components for enrolment and verification purpose. UMTS Networks by Lucent TechnologieS
2.5 G and 3G Cellular networks offers Mobile VPN
technology to connect handheld bio-scanners with the
 Mobile VPN for CDMA 3G Data Networking by
central database repository in secured tunnel,
Lucent Technologies
providing end to end security and integrity of data.
IPSEC architecture provides end to end secured,
 Mobile VPN for GPRS Data Networking by
authenticated and encrypted VPN tunnel framework,
Lucent Technologies
which can be used to carry highly sensitive biometric
information. Voluntary MVPN, provides end to end
IPSEC tunnel between client ( bio-scanners) and  MOBILE IP VPN CONNECTIVEY AND
server (central data repository), while Compulsory SECURITY By Trologix
MVPN provides IPSEC tunnel between gateway and
VPN server, while GTP/GRE tunnel between VPN  BioAPI Best Practices, Implementation Notes
client and server. and Security Appendix by The BioAPI
The decision to select MVPN implementation, Consortium
depends on how much authority data repository
owners network (UIDAI) wants to delegate with  BioAPI Specification Version 1.1 Developed by
service provider, capacity of the existing network of The BioAPI Consortium
wireless service provider and QoS/SLA requirement.
 Mobile Biometric Identification by Motorola

 The Universal Biometric System by H. M. N.


Dilum Bandara, S. M. Ravindra P. De Silva, and
P. W. H. Dasun Weerasinghe, Department of
Computer Science and Engineering, University of
Moratuwa, Sri Lanka.

 The Evolution of Mobile VPN and its


Implications for Security by NSN network

 IPsec-based end-to-end VPN deployment over


UMTS by Christos Xenakis and Lazaros
Merakos ,Department of Informatics &
Telecommunications .University of Athens,
15784 Athens, Greece

 Connect Devices in Patrol Vehicles by Digi


networks

 Oracle Advanced Security Administrator's Guide


Release 8.1.7

 Mobile VPN—Delivering Advanced Services in


Next Generation Wireless Systems by Alex
Shneyderman and Alessio Casati (etutorials.org)

TACTiCS 09’ -6

Anda mungkin juga menyukai