Human operators in control rooms are often responsible of issuing critical commands, and in charge of managing sensitive data. Insiders must be prevented to operate on the system: they may benefit of their position in the control room to fool colleagues, and gain access to machines or accounts. This paper proposes an authentication system for deterring and detecting malicious access to the workstations of control rooms. Specifically tailored for the operators in the control room of the crisis management system Secure!, the solution aims to guarantee authentication and non-repudiation of operators, reducing the risk that unauthorized personnel (including intruders) misuses a workstation. A continuous multi-biometric authentication mechanism is developed and applied in which biometric data is acquired transparently from the operator and verified continuously through time. This paper presents the authentication system design and prototype, its execution and experimental results.
Continuous User Identity Verification for Trusted Operators in Control Rooms / Schiavone, Enrico; Ceccarelli, Andrea; Bondavalli, Andrea. - ELETTRONICO. - 9532:(2015), pp. 187-200. (Intervento presentato al convegno ICA3PP International Conference on Algorithms and Architectures for Parallel Computing tenutosi a Zhangjiajie, China nel November 18-20, 2015) [10.1007/978-3-319-27161-3_17].
Continuous User Identity Verification for Trusted Operators in Control Rooms
SCHIAVONE, ENRICO;CECCARELLI, ANDREA;BONDAVALLI, ANDREA
2015
Abstract
Human operators in control rooms are often responsible of issuing critical commands, and in charge of managing sensitive data. Insiders must be prevented to operate on the system: they may benefit of their position in the control room to fool colleagues, and gain access to machines or accounts. This paper proposes an authentication system for deterring and detecting malicious access to the workstations of control rooms. Specifically tailored for the operators in the control room of the crisis management system Secure!, the solution aims to guarantee authentication and non-repudiation of operators, reducing the risk that unauthorized personnel (including intruders) misuses a workstation. A continuous multi-biometric authentication mechanism is developed and applied in which biometric data is acquired transparently from the operator and verified continuously through time. This paper presents the authentication system design and prototype, its execution and experimental results.File | Dimensione | Formato | |
---|---|---|---|
PRDC15 Enrico Schiavone.pdf
accesso aperto
Descrizione: Articolo principale
Tipologia:
Pdf editoriale (Version of record)
Licenza:
Open Access
Dimensione
519.13 kB
Formato
Adobe PDF
|
519.13 kB | Adobe PDF |
I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.