The biometric access control system is the recognition system for humans with the help of their physical uniqueness and characteristics. The access control system is based on the substantiation (Galbally, Marcel & Fierrez, 2014). The unique biometric data is stored in the database of the organization or the secured zone, and this stored data is used to match the input to the biometric system.
The fingerprint sensor is the most widely used as access control system. The fingerprints are unique, and even the fingerprints of identical twins do not have the same fingerprints.
The surface of the finger is made of furrows and ridges and the patterns such as arches and swirls ensure uniqueness of each pattern. The illuminated image of the fingerprint is translated into the digital codes for the authentication process, and it is stored in database. A CMOS sensor is used for the extraction and mapping of characteristics of fingerprint. There are various fingerprint scanner which can be used such as capacitive, ultrasonic and optical. Whenever a fingerprint is provided as input in the sensor, a new template of digital data is created (Sousedik & Busch, 2014). The matching algorithm is used to match the new template from the template of the database and when the input template matches the database template the user is authenticated.
The advantage of fingerprint recognition is that they are unique and provides accuracy. The disadvantages are that if the database of a system is hacked or fingerprint is stolen from surface of objects, then it can be a threat to the security.
The application of fingerprint is in security check, access and attendance in organizations and institutes. It is used to access the mobile phones and various devices.
The hand geometry identifies the user by measuring the dimensions of hand. The hand geometry recognition concept was developed in 1980.
The technology involved in hand geometry is using a camera for capturing an image of the hand. The input data is captured by a charged couple device camera, and both the top surface and side image of the hand is captured with the help of angle mirror. The silhouette image is used to analyze 90 measurements including the distance between knuckles, thickness and length of fingers (Ren et al., 2013). The three sequential image of the hand is stored as a template in the database. This template is used for recalling the data when a user inputs their hand geometry.
The advantage of hand geometry is public acceptance of this system, ease of using and the integration capabilities. The disadvantages of using hand geometry is that it is not as unique as fingerprints.
It is used in international banks for security and also used for recording attendance of the employees and students in organizations and institutions.
It is the automated biometric method for access control system. It uses the technique of recognition of mathematical pattern.
The image of the iris is captured from a distance of about 10 inches. The pattern is processed in software which extracts the pattern from the outer and inner boundary of the iris. The iris pattern is encrypted into 512 bit code using Daugman’s algorithm (Kaur & Juneja, 2014, March). This encrypted iris code is then matched with the codes contained in the database for the verification. The speed of data matching is very high about 10,000 codes can be analyzed per second.
The advantage of Iris recognition is that are that it provides accuracy. It provides more speed and scalability. The disadvantage is that it requires high quality photographic technologies.
The application of Iris recognition technique is in the aviation industry, airports and for records of criminals.
The Privacy enhancing technologies (PET) is the standardization used for enhancing the privacy of users of information technologies. It functions in accordance with the data protection laws. The aim of the PET is the protection of confidential data of the user, and they take the responsibility of personally identifiable information. It provides the possibility to audit the terms and condition of the merchants and online service provider (Hafiz, 2013). The different types of privacy enhancing technologies can be explained as follows.
This privacy enhancing technology is used to hide the real identity with an identity which is non traceable. This would help in enhancing the privacy of the online identity. For instance, the online identity like IP address and email address can be replaced with a no traceable identity like random IP address and one time email id for security (Hoepman, 2014, June). This helps in empowering the cryptographic property. It can be applied to any category where data identity is required to keep private.
The enhanced privacy id is abbreviated as EPID, and it is the digital algorithm that ensures the anonymity. The EPID provides a public verification key which is associate with a distinguishable and unique signature key. These signature keys are private in nature for ensuring the privacy. The EPID was introduced in 2008 (Gürses & Diaz, 2013). It helps the device to prove their identity to the external party. It also gives the information about the category of software running on the device. The retrieval of these information does not require revealing of data identity.
This technology provides the framework for describing the semantics or defining the various types of data. It can be helpful in achieving the standardization of data protection legislation. It will differentiate between the sensitive data and personal data over the internet. The controllability, transparency and auditability of the data can be set according to the different data type (Liao & Shu, 2015). The metadata and digital right management are effective in supporting the privacy of the users of information technology.
Wireless sensor network (WSN) is the networks of nodes which are dedicated sensors used for recording and monitoring the conditions of the network environment. It is used to organize the collected data at a central node or location. The WSN provides the measurement of various environmental conditions such as sound, temperature, pollution level, wind and humidity with the help of autonomous sensors (Yang, 2014).
The areas of Wireless sensor networking are healthcare monitoring, earth sensing and Industrial monitoring. The examples of area of WSN can be given as bellows.
Environmental Sensing: The examples are air pollution monitoring, detection of forest fire, water quality monitoring and prevention of natural disaster.
Industrial Monitoring: The examples are data center monitoring, machine health monitoring, structural health monitoring and data logging (Rawat et al., 2014).
The architecture of Wireless sensor network is based on the Open system Interconnection (OSI) architecture model. It is a five layered architecture with 3 cross layers. The five layers of WSN are physical, network, data link, application layer and transport layer. The cross layers are management layers which include the task management, power management and mobility management (Pantazis, Nikolidakis & Vergados, 2013). The function of these three layers is to make the sensor work together for obtaining the efficiency of the network.
The threats and vulnerabilities of WSN are mainly of two types namely active attack and passive attack. The passive attacks to WSN are limited to analyzing the exchanged traffic whereas the active attacks aim at removing or modification of the data transmitted over a network. The three threats and vulnerabilities that can be used to attack WSN can be described as follows
Blackmail attack: It is a malicious node that provides the fake information that another authentic node is malicious. It can affect the normal operation of the network.
Sybil attack: In this type of attack the user uses the identity of another node in order to participate in the distributed algorithm.
Wormhole Attack: In this type of attack the attackers receive the messages and use them to replay indifferent parts of the tunnels (Alrajeh, Khan & Shams, 2013).
The recommendation for the mitigation of threats and vulnerabilities of WSN attacks can be as follows.
Blackmail attack: the blackmail attack can be mitigated by encryption and authentication of data. The segmentation of networking system is also useful for the mitigation of blackmail attack.
Sybil Attack: The mitigation for Sybil attack are authentication flow, pushback and payment for network resources. The authentication flow is the re-programming process for avoiding the Sybil attack.
Wormhole attack: It can be mitigated with the implementation of distributed detection algorithm and centralized algorithm (Alrajeh, Khan & Shams, 2013). This is the detection phase which provides the information about the attack and provides relevant mitigation.
Alrajeh, N. A., Khan, S., & Shams, B. (2013). Intrusion detection systems in wireless sensor networks: a review. International Journal of Distributed Sensor Networks, 9(5), 167575.
Galbally, J., Marcel, S., & Fierrez, J. (2014). Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition. IEEE transactions on image processing, 23(2), 710-724.
Gürses, S., & Diaz, C. (2013). Two tales of privacy in online social networks. IEEE Security & Privacy, 11(3), 29-37.
Hafiz, M. (2013). A pattern language for developing privacy enhancing technologies. Software: Practice and Experience, 43(7), 769-787.
Hoepman, J. H. (2014, June). Privacy design strategies. In IFIP International Information Security Conference (pp. 446-459). Springer, Berlin, Heidelberg.
Kaur, N., & Juneja, M. (2014, March). A review on iris recognition. In Engineering and Computational Sciences (RAECS), 2014 Recent Advances in (pp. 1-5). IEEE.
Liao, X., & Shu, C. (2015). Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. Journal of Visual Communication and Image Representation, 28, 21-27.
Pantazis, N. A., Nikolidakis, S. A., & Vergados, D. D. (2013). Energy-efficient routing protocols in wireless sensor networks: A survey. IEEE Communications surveys & tutorials, 15(2), 551-591.
Rawat, P., Singh, K. D., Chaouchi, H., & Bonnin, J. M. (2014). Wireless sensor networks: a survey on recent developments and potential synergies. The Journal of supercomputing, 68(1), 1-48.
Ren, Z., Yuan, J., Meng, J., & Zhang, Z. (2013). Robust part-based hand gesture recognition using kinect sensor. IEEE transactions on multimedia, 15(5), 1110-1120.
Sousedik, C., & Busch, C. (2014). Presentation attack detection methods for fingerprint recognition systems: a survey. Iet Biometrics, 3(4), 219-233.
Yang, K. (2014). Wireless sensor networks. Principles, Design and Applications.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). ICT Project Management. Retrieved from https://myassignmenthelp.com/free-samples/itc505-ict-project-management/different-types-of-biometric-system.html.
"ICT Project Management." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/itc505-ict-project-management/different-types-of-biometric-system.html.
My Assignment Help (2021) ICT Project Management [Online]. Available from: https://myassignmenthelp.com/free-samples/itc505-ict-project-management/different-types-of-biometric-system.html
[Accessed 16 April 2021].
My Assignment Help. 'ICT Project Management' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/itc505-ict-project-management/different-types-of-biometric-system.html> accessed 16 April 2021.
My Assignment Help. ICT Project Management [Internet]. My Assignment Help. 2021 [cited 16 April 2021]. Available from: https://myassignmenthelp.com/free-samples/itc505-ict-project-management/different-types-of-biometric-system.html.
Are you someone who is dealing with reflection paper for the first time? If you lack the skill of good writing, you may wonder ‘how to write a good reflection essay paper’. At MyAssignmenthelp.com, you can get writing help for your reflection essay from the best writers. We also have an advanced essay typer tool where you can quickly check plagiarism, grammar, etc. If you are running short in time, ask our experts 'do my homework’, and they will assign the best writers for your essay.
Answer: Introduction The UML profiles are the some of the profiles that are used for the purpose of the generic mechanism for customizing the model of UML designs that constrained to particular domains and the different sorts of platforms. According to Gómez et al. 2016, right from the initiation of the generic mechanism of the UML profiles, there have been a lot of profiles that have been developed over the years. These profiles are m...
Read MoreAnswer: TRANSIMS and its working procedure TRANSIMS is the acronym of Transportation Analysis and Simulation System. This is a collection of a definite set of technological tools that are developed with an intention to conduct some analyses that are in relation to the regional transportation system or cellular automata micro-simulator (Smith and Razo 2016). TRANSIMS follows a new paradigm that is destined towards the modelling of individual t...
Read MoreAnswer: Introduction: Data ownership generally refers to the process of having rights that are legal along with having an overall control of a particular portion of the data or over the dataset elements. Data ownership is associated with providing information about the entities who are the rightful owner of the data assets and the acquisition, along with the usage and distribution of the policies which assets that determined by the data owner...
Read MoreAnswer: Introduction: As a fresh graduate in computer technology, getting a chance to enrol myself in the learning course of computer networking and administration of the University of Bedfordshire. Computer networking have been my topic of interest since I enrolled myself for graduation in computer science. The career path was clear for me and it led to the post of network administrator to one of the most esteemed companies in United K...
Read MoreAnswer: The main purpose of behind the selection of the resource is that it gives information related to the different types of processing units such as the CPU and GPU. The functionalities of each of those processing units are described briefly in the resource which helps in understanding their difference and their applications. The resource provides in depth knowledge about the differences between the two processing units and also states abo...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
i was very satisfied with the responses provided to me for my assignment. It helped me to achieve high marks on my assignment. Thank you experts
Australia
Thanks. I love the fast solutions. I am sure that I will receive an excellent grade, as I usually do
Australia
Thanks for the fast solution. This is a reliable source that is sure to get you a good grade
Australia
Amazing! delivered on time was very patient and thank you so much for your efforts. I really appreciate :)
Australia