Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

Biometric Systems

a)      Fingerprint
•       Define Fingerprint 
•       Techniques and technologies used for fingerprint
•       Advantages of fingerprint
•       Disadvantages of fingerprint
•       Example application

b)      Hand Geometry
•       Define Hand Geometry
•       Techniques and technologies used for hand geometry
•       Advantages of hand geometry 
•       Disadvantages of hand geometry
•       Example application

c)      Iris Recognition
•       Define Iris Recognition
•       Techniques and technologies used for Iris Recognition
•       Advantages of Iris Recognition
•       Disadvantages of Iris Recognition
•       Example application

d)      Privacy Enhancing Technologies used on the internet
•       Introduction on PET used on the internet
•       Research and discuss 3 PET’s used on the internet
•       Example to illustrate your answer

e)      Wireless Sensor networks
•       Introduction on Wireless sensor networks
•       Research and discuss 3 types of Threats and Vulnerabilities which attacks WSN
•       Recommendations to reduce the threat and vulnerabilities

Fingerprint

The concept of authorised and authenticated security can be considered as one of the most integral part which is related to the life of the common people (Fahmy, 2016). In this context it can be stated that the biometric concept can be applied in the aspect of generating security measures which is done mainly based on the aspect of physiological and behavioural characteristics. There are different techniques of biometric which can be implemented some of the example in the field are DNA, face recognition, signature and voice and many more.

A fingerprint can be considered as one of the techniques which can be implemented within the working of the authentication purpose with an aim of providing proper authorisation of a person. It is one of the most common method which is relating to the authentication of a person.

The main concept which is applied to the biometric is that it directly acquires the image of the fingerprint and uses a live scan method to detect the image and insert it into a reader. The reader reads the finger print and accordingly gives access to the person.

Advantage

The concept which is related to the biometric can be considered to a method which is in use for years due to the security aspects which is involved into the concept and the level of accuracy which can be achieved from the concept.

Disadvantage

One of the problem which is related to the fingerprint is that sometimes access is not granted to the person even though he is an authorised access granter. This is due to the factor that the lineage problem between the reader and the database fails sometimes which can be a major disadvantage in the sector of operation

Example application

Example of application of fingerprint can be in  areas were access permission of all the person is not allowed specially in office or government related jobs which keep secured data which are highly important for the organisation.

Define Hand Geometry

The concept of hand biometric can be stated as a method of authentication which directly relates to the use of different parameters which are related to the human body. It can be stated as one of the methods which can give higher level of authentication in different sectors.

Techniques and technologies used for hand geometry 

The main technology which is used in the concept of hand geometry is that it takes the length of the finger or the length of the hand. It directly provides authentication at a level which provides functionality relating to the different features of the body which may not be common for two individual

Hand Geometry

Advantage

The main advantage which can be related to the concept of hand biometry is the mechanical principle and the optical technique which is included into the concept. It can be stated that it is one of the most advanced technique which can be used in the sector of authentication.

Disadvantage

One of the major disadvantage which is related to the concept is the security of the data which prevails in the concept (Fahmy, 2016). It can be stated that intruders can easily get involved into the concept and the get the data of the authenticated person and grant access to the area which is restricted.

Example application

The application of the hand geometry can be done in area were high security should be involved such as the banking sector.

Define Iris Recognition

Iris recognition technique can be considered as one of the most important technique which is related to the recognition of a person (Yavuz et al., 2016). It can be stated as one of the most recent technique which is invented which in the near future can be stated to be playing a more dominating role.  

Advantage

The main advantage which can be stated here is that the iris is less intrusive than the retina comparing it to retina because it can be visible form a long distance. Iris of identical twins can be stated to be different so it can be an added advantage in the technology.

Techniques and technologies used for Iris Recognition

The main technique which is related to the concept of iris recognition is that it directly creates a pattern which is related to the some of the feature of the human body such as the arching, ligaments, rings, corn, ridges and zigzag collarets

Advantages

The main advantage which can be related to the concept is that the technology is less intrusive relating to the aspect of retina due to the factor that it can be directly be visible form long distance. Iris can be considered as one of the authenticated methods due to the factor that there cannot be two common iris of two person.

Disadvantages

The main disadvantage which is related to the concept is the sector of recognition of disabled person who would be trying to get involved into the concept. Another important factor which can be stated here is that there can be sometimes be problem related to recognition due to factors of validation which are involved into the concept.

Iris Recognition

Example application

Example of application of iris technology can be in the sector of different high official areas such as school, banking and trading were data are very much crucial.

The concept of privacy can be considered as one of the most primary factors which is related to the aspect of generation of different security aspects (Yavuz et al., 2016). In this aspect the privacy enhancing technologies are playing a very vital role which directly provided security to the concept of the internet.

Obfuscation: The concept of obfuscation can be considered one of the technology which can be used in the aspect of providing security to the concept of the internet. The concept can be directly related to the practice which is related to the adding data which are not correct which can directly mislead an intruder if they intend to hack the system (Luca et al., 2015). It can be stated as very much frustrating from the point of view of the intruders due to the lack of authentication of the data which is being given to them.

Access to data which are personal: The access of the data directly gives the user the authority to directly access, control and manipulate their own data. So it can be stated here that it is not of the techniques in which the user has the overall control of the data securing the data which would be directly safeguarding the data from the intruders.

Enhanced Privacy ID (EPID): The concept which is related to the EPID mainly comes with the aspect of digital signature authentication (Tunca, Donmez & Ersoy, 2014). This practice can be very much be as security aspect policy due to the factor that without the authenticated signature the data which is saved in the concept cannot be accessed.

Obfuscation: An example of the application would be the shallow algorithm which mainly consist of data which is not authenticated and which directly misleads an intruder.

Access to data which are personal: Example of this PET would be the normal mail which is used by the common people.

Enhanced Privacy ID (EPID): The example which can be stated here is the authentication aspect which is related to any type of data which is done using the concept of digital signature.

The wireless sensor network can be considered as a collection of dedicated server and spatially sensors which are directly dispersed for the aspect of monitoring and controlling the physical documents in an environment which is not optimal (Tunca, Donmez & Ersoy, 2014). Some of the threats which can be seen in the sector of wireless sensor network are stated below:
•       Research and discuss 3 types of Threats and Vulnerabilities which attacks WSN

Privacy Enhancing Technologies used on the Internet

Wormhole attack: The attack which is related to the Wormhole tatck can be considered to be very much crucial due to the factor that the attacker directly records the packet at a single location in a tunnel which is of their own (Ghosh et al., 2017). The attack does not need any type of compromising sensors in the network or into other network.

Sybil attack

It can be stated that the attack which is related to the Sybil is one of the most common attack which is related to the wireless sensor network (Luca et al., 2015). The attack directly tries to degrade the security, resource utilisation and the integrity of the data which is stored in the concept of the network.

Denial of service attack (DNS)

The main aspect which can be related to the DNS attack is that the attacker’s tries to drain the resource allocation to the user making the system busy all the time (Fahmy, 2016). There are certain type of target which the attacker have to reach such as the network infrastructure to initiate the attack.

Wormhole attack: Restriction of the entry point of the data should be done.

Sybil attack: The data which is stored in the network should be protected by means of encryption involved into the concept.

Denial of service attack (DNS): The main mitigation which can be related to the concept is the authenticated flow of the data

References

Bhagavatula, R., Ur, B., Iacovino, K., Kywe, S. M., Cranor, L. F., & Savvides, M. (2015). Biometric authentication on iphone and android: Usability, perceptions, and influences on adoption.

De Luca, A., Hang, A., Von Zezschwitz, E., & Hussmann, H. (2015, April). I feel like I'm taking selfies all day!: towards understanding biometric authentication on smartphones. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 1411-1414). ACM.

Fadel, E., Gungor, V. C., Nassef, L., Akkari, N., Malik, M. A., Almasri, S., & Akyildiz, I. F. (2015). A survey on wireless sensor networks for smart grid. Computer Communications, 71, 22-33.

Fahmy, H. M. A. (2016). Wireless Sensor Networks. Concepts, Applications, Experimenta.

Ghosh, S., Majumder, A., Goswami, J., Kumar, A., Mohanty, S. P., & Bhattacharyya, B. K. (2017). Swing-pay: One card meets all user payment and identity needs: A digital card module using NFC and biometric authentication for peer-to-peer payment. IEEE Consumer Electronics Magazine, 6(1), 82-93.

Hejazi, M., Al-Haddad, S. A. R., Singh, Y. P., Hashim, S. J., & Aziz, A. F. A. (2016). ECG biometric authentication based on non-fiducial approach using kernel methods. Digital Signal Processing, 52, 72-86.

Kurt, S., Yildiz, H. U., Yigit, M., Tavli, B., & Gungor, V. C. (2017). Packet size optimization in wireless sensor networks for smart grid applications. IEEE Transactions on Industrial Electronics, 64(3), 2392-2401.

Murillo-Escobar, M. A., Cruz-Hernández, C., Abundiz-Pérez, F., & López-Gutiérrez, R. M. (2015). A robust embedded biometric authentication system based on fingerprint and chaotic encryption. Expert Systems with Applications, 42(21), 8198-8211.

Tunca, C., Isik, S., Donmez, M. Y., & Ersoy, C. (2014). Distributed mobile sink routing for wireless sensor networks: A survey. IEEE communications surveys & tutorials, 16(2), 877-897.

Yang, K. (2014). Wireless sensor networks. Principles, Design and Applications.

Yavuz, F., Zhao, J., Yagan, O., & Gligor, V. (2014, June). On secure and reliable communications in wireless sensor networks: Towards k-connectivity under a random pairwise key predistribution scheme. In Information Theory (ISIT), 2014 IEEE International Symposium on (pp. 2381-2385). IEEE.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). Biometric Systems: Fingerprint, Hand Geometry, Iris Recognition, PET, And WSN Essay.. Retrieved from https://myassignmenthelp.com/free-samples/understanding-biometric-authentication.

"Biometric Systems: Fingerprint, Hand Geometry, Iris Recognition, PET, And WSN Essay.." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/understanding-biometric-authentication.

My Assignment Help (2019) Biometric Systems: Fingerprint, Hand Geometry, Iris Recognition, PET, And WSN Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/understanding-biometric-authentication
[Accessed 26 April 2024].

My Assignment Help. 'Biometric Systems: Fingerprint, Hand Geometry, Iris Recognition, PET, And WSN Essay.' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/understanding-biometric-authentication> accessed 26 April 2024.

My Assignment Help. Biometric Systems: Fingerprint, Hand Geometry, Iris Recognition, PET, And WSN Essay. [Internet]. My Assignment Help. 2019 [cited 26 April 2024]. Available from: https://myassignmenthelp.com/free-samples/understanding-biometric-authentication.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close