7 Conclusions
Due to the increased sensitivity of biometric data, the introduction of biometrics in
3G security is a very demanding process as far as security and privacy is concerned.
BIO3G was created by following a design approach that identified the necessary
requirements and defined the corresponding specifications, through the detailed study
of biometric technologies within the framework of their incorporation in a 3G envi-
ronment. BIO3G is a lightweight and user-friendly protocol that implements real end-
to-end strong authentication of the user to the mobile operator, though a mechanism
that is integrated to the existing components of 3G security, requiring no storing or
transferring of biometric data and eliminating at the same time any biometric enrol-
ment and administration procedure, which are time-consuming for the user and ex-
pensive for the mobile operator. BIO3G went through a security and privacy evalua-
tion process, including a risk assessment procedure, taking into account the security
objectives of the Biometric Evaluation Methodology and the relevant Common Crite-
ria protection profiles, making its implementation capable of CC certification.
Part of this work is the author’s contribution to the European Commission (EC)
project IST-2002-001766 Biometrics and Security – BIOSEC
2
. The authors would
like to thank the EC for funding BIOSEC.
References
1. Neimi, V., Nyberg, K.: UMTS Security. John Wiley & Sons (2003)
2. 3rd Generation Partnership Project: TS 33.102 - 3G Security; Security architecture (2004)
3. 3rd Generation Partnership Project: TS 33.210 - 3G Security; IP network layer security
(2004)
4. Wisely, D., Eardley, P., Burness, L.: IP for 3G—Networking Technologies for Mobile
Communications. John Wiley & Sons (2002)
5. Mitchell, C., J.: Security for Mobility. IEE Telecommunication Series 51 (2004)
6. 3rd Generation Partnership Project: TS 31.101 - UICC terminal interface; physical and
logical characteristics (2005)
7. Benoit, O., Dabbous, N., Gauteron, L., Girard, P., Handschuh, H., Naccache, D., Socile, S.,
Whelan, C.:Mobile Terminal Security. Cryptology ePrint Archive: Report 2004/158 (2004)
8. ISO/IEC JTC1, SC37/SG1: Biometric vocabulary corpus (2004)
9. Dimitriadis, C., Polemi, D.: Biometrics –Risks and Controls. Information Systems Control
Journal (ISACA), vol.4 (2004) 41-43
10. IST-1999-20078 Business environment of biometrics involved in e-commerce – BEE:
Deliverable D7.1 Conclusions and Recommendations. http://expertnet.net.gr/bee (2002)
11. Prabhakar, S., Pankanti, S., Jain, A.,K.: Biometric Recognition Security and Privacy Con-
cerns. IEEE Security and Privacy, vol. 1, no. 2 (2003) 33-42
12. IST – 2002 –001766 Biometrics and Security (BIOSEC): Deliverable D3.3 – Security
recommendations: biometric systems integration, basic research on security, network pro-
tocols and PKI. Biosec consortium (2005)
13. Atricle 29 – EC data protection working party: Working document on biometrics (2003)
2
http://www.biosec.org
134