Human operators in control rooms are often responsible of issuing critical commands, and in charge of managing sensitive data. Insiders must be prevented to operate on the system: they may benefit of their position in the control room to fool colleagues, and gain access to machines or accounts. This paper proposes an authentication system for deterring and detecting malicious access to the workstations of control rooms. Specifically tailored for the operators in the control room of the crisis management system Secure!, the solution aims to guarantee authentication and non-repudiation of operators, reducing the risk that unauthorized personnel (including intruders) misuses a workstation. A continuous multi-biometric authentication mechanism is developed and applied in which biometric data is acquired transparently from the operator and verified continuously through time. This paper presents the authentication system design and prototype, its execution and experimental results.

Continuous User Identity Verification for Trusted Operators in Control Rooms / Schiavone, Enrico; Ceccarelli, Andrea; Bondavalli, Andrea. - ELETTRONICO. - 9532:(2015), pp. 187-200. (Intervento presentato al convegno ICA3PP International Conference on Algorithms and Architectures for Parallel Computing tenutosi a Zhangjiajie, China nel November 18-20, 2015) [10.1007/978-3-319-27161-3_17].

Continuous User Identity Verification for Trusted Operators in Control Rooms

SCHIAVONE, ENRICO;CECCARELLI, ANDREA;BONDAVALLI, ANDREA
2015

Abstract

Human operators in control rooms are often responsible of issuing critical commands, and in charge of managing sensitive data. Insiders must be prevented to operate on the system: they may benefit of their position in the control room to fool colleagues, and gain access to machines or accounts. This paper proposes an authentication system for deterring and detecting malicious access to the workstations of control rooms. Specifically tailored for the operators in the control room of the crisis management system Secure!, the solution aims to guarantee authentication and non-repudiation of operators, reducing the risk that unauthorized personnel (including intruders) misuses a workstation. A continuous multi-biometric authentication mechanism is developed and applied in which biometric data is acquired transparently from the operator and verified continuously through time. This paper presents the authentication system design and prototype, its execution and experimental results.
2015
Algorithms and architectures for parallel processing
ICA3PP International Conference on Algorithms and Architectures for Parallel Computing
Zhangjiajie, China
November 18-20, 2015
Schiavone, Enrico; Ceccarelli, Andrea; Bondavalli, Andrea
File in questo prodotto:
File Dimensione Formato  
PRDC15 Enrico Schiavone.pdf

accesso aperto

Descrizione: Articolo principale
Tipologia: Pdf editoriale (Version of record)
Licenza: Open Access
Dimensione 519.13 kB
Formato Adobe PDF
519.13 kB Adobe PDF

I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificatore per citare o creare un link a questa risorsa: https://hdl.handle.net/2158/1017525
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 4
  • ???jsp.display-item.citation.isi??? 3
social impact