Category Ranking

98%

Total Visits

921

Avg Visit Duration

2 minutes

Citations

20

Article Abstract

As the number of European Union (EU) visitors grows, implementing novel border control solutions, such as mobile devices for passenger identification for land and sea border control, becomes paramount to ensure the convenience and safety of passengers and officers. However, these devices, handling sensitive personal data, become attractive targets for malicious actors seeking to misuse or steal such data. Therefore, to increase the level of security of such devices without interrupting border control activities, robust user authentication mechanisms are essential. Toward this direction, we propose a risk-based adaptive user authentication mechanism for mobile passenger identification devices for land and sea border control, aiming to enhance device security without hindering usability. In this work, we present a comprehensive assessment of novelty and outlier detection algorithms and discern OneClassSVM, Local Outlier Factor (LOF), and Bayesian_GaussianMixtureModel (B_GMM) novelty detection algorithms as the most effective ones for risk estimation in the proposed mechanism. Furthermore, in this work, we develop the proposed risk-based adaptive user authentication mechanism as an application on a Raspberry Pi 4 Model B device (i.e., playing the role of the mobile device for passenger identification), where we evaluate the detection performance of the three best performing novelty detection algorithms (i.e., OneClassSVM, LOF, and B_GMM), with B_GMM surpassing the others in performance when deployed on the Raspberry Pi 4 device. Finally, we evaluate the risk estimation overhead of the proposed mechanism when the best performing B_GMM novelty detection algorithm is used for risk estimation, indicating efficient operation with minimal additional latency.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11359662PMC
http://dx.doi.org/10.3390/s24165193DOI Listing

Publication Analysis

Top Keywords

border control
20
user authentication
16
authentication mechanism
12
passenger identification
12
detection algorithms
12
novelty detection
12
risk estimation
12
mechanism mobile
8
mobile passenger
8
land sea
8

Similar Publications

The well-known technique of microtomy, which is an essential cutting tool, was first developed for light and transmission electron microscope uses, but it is currently also utilized to prepare specimens for atomic force microscopy (AFM), ion microscopy using a focused ion beam (FIB), and scanning electron microscopy (SEM). Ultramicrotomy can only be used on soft substances and metals that are sufficiently ductile to be cut with a diamond knife. Before being sliced by a microtome, many soft materials must first go through numerous preparatory processes.

View Article and Find Full Text PDF

The European Health Data Space aims to transform health data management across the EU, supporting both primary and secondary uses of health data while ensuring trust through General Data Protection Regulation compliance. As part of the HealthData@EU Pilot, this study investigates coronavirus disease 2019 (COVID-19) testing, vaccination, and hospitalization metrics across six European countries, with a focus on socioeconomic disparities and challenges in cross-border data access and standardization. This observational, retrospective cohort study used a federated analysis framework across Belgium, Croatia, Denmark, Finland, and France.

View Article and Find Full Text PDF

The future European Health Data Space (EHDS), a network for secure cross-border data use, could be beneficial for public health initiatives. The HealthData@EU pilot project evaluated possibilities of secondary data use based on five use cases and established a pilot IT infrastructure. This article reports overarching experiences from two public health use cases and the IT development.

View Article and Find Full Text PDF

Evaluation of subsp. antigens capable of stimulating host IRG-47 release identifies Mmm604, Mmm605, and Mmm606 as potential subunit vaccine antigens.

Infect Immun

September 2025

National Contagious Bovine Pleuropneumonia Reference Laboratory, State Key Laboratory for Animal Disease Control and Prevention, Harbin Veterinary Research Institute, Chinese Academy of Agricultural Sciences, Harbin, China.

Contagious bovine pleuropneumonia (CBPP), caused by subsp. (Mmm), is a devastating cattle disease with high morbidity and mortality, threatening cattle productivity in Sub-Saharan Africa and potentially in parts of Asia. Cross-border livestock trade increases the risk of CBPP introduction or reintroduction.

View Article and Find Full Text PDF

Topologically associating domains (TADs) and chromatin architectural loops impact promoter-enhancer interactions, with CCCTC-binding factor (CTCF) defining TAD borders and loop anchors. TAD boundaries and loops progressively strengthen upon embryonic stem (ES) cell differentiation, underscoring the importance of chromatin topology in ontogeny. However, the mechanisms driving this process remain unclear.

View Article and Find Full Text PDF