Skip to main content

2021 | OriginalPaper | Buchkapitel

Aspects of Biometric Security in Internet of Things Devices

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter provides detailed insight into the general mechanisms utilized for biometric application in Internet of things devices. The mechanisms and internal working of these biometric technologies presented in this chapter are focused specifically on the applicability in IOT devices. IOT devices incorporates various scanners and sensors to allow the IOT device to biometrically interact with a human being. These scanners and sensors were primary designed to facilitate and ease user interaction with the IOT device in an effort to make the day to day usability of the IOT device faster and easier if you may. It must be noted that every biometric technology has certain strengths, but indeed, also certain noteworthy shortcomings. It is often these shortcomings that get exploited in a security subversion attempt. This chapter introduces and discusses the various biometric technologies used in IOT devices. Attention is given to the software and the hardware aspects of each biometric system. The generic working of these biometric technologies is presented. Attention is given to legacy biometric technology implemented on IOT devices, currently used biometric technology implemented on IOT devices, and finally, possible future biometric applications of biometric technology destined for IOT devices. In conclusion practical examples of biometric subversion on IOT devices such as fingerprint, facial and voice biometric subversion and hacking, will be investigated, discussed and evaluated.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Mitra S, Gofman M (2016) Biometrics in a data driven world: trends, technologies, and challenges. Publisher, CRC Press, California Mitra S, Gofman M (2016) Biometrics in a data driven world: trends, technologies, and challenges. Publisher, CRC Press, California
2.
Zurück zum Zitat Hariharan R, Logeswari S (2019) Finger print as a personal identification tool in forensic science. Global J Res Anal 8.1 Hariharan R, Logeswari S (2019) Finger print as a personal identification tool in forensic science. Global J Res Anal 8.1
3.
Zurück zum Zitat Oforka VO (2016) Evaluation of factors influencing biometrics adoption in Nigeria banks. Dissertation, Federal University of Technology, Owerri Oforka VO (2016) Evaluation of factors influencing biometrics adoption in Nigeria banks. Dissertation, Federal University of Technology, Owerri
4.
Zurück zum Zitat Chauhan A, Jyoti S (2015) A review; timeline of palm prints since beginning till now. Int J Res (IJR) 2(06) Chauhan A, Jyoti S (2015) A review; timeline of palm prints since beginning till now. Int J Res (IJR) 2(06)
5.
Zurück zum Zitat Cothron GR (2012) Fingerprint evidence Part I: tracing friction ridges through history. SSRN 2130808 Cothron GR (2012) Fingerprint evidence Part I: tracing friction ridges through history. SSRN 2130808
6.
Zurück zum Zitat Sodhi GS, Jasjeet K (2005) The forgotten Indian pioneers of fingerprint science. Curr Sci 88(1):185–191 Sodhi GS, Jasjeet K (2005) The forgotten Indian pioneers of fingerprint science. Curr Sci 88(1):185–191
7.
Zurück zum Zitat Matsumoto T et al (2002) “Impact of artificial” gummy fingers on fingerprint systems. In: Optical security and counterfeit deterrence techniques IV, vol 4677. International Society for Optics and Photonics Matsumoto T et al (2002) “Impact of artificial” gummy fingers on fingerprint systems. In: Optical security and counterfeit deterrence techniques IV, vol 4677. International Society for Optics and Photonics
8.
Zurück zum Zitat Matyas Jr SM, Peyravian M (2003) Protection of biometric data via key-dependent sampling. U.S. Patent No 6,507,912. 14 January 2003 Matyas Jr SM, Peyravian M (2003) Protection of biometric data via key-dependent sampling. U.S. Patent No 6,507,912. 14 January 2003
9.
Zurück zum Zitat Borza SJ, Borza MA, Teitelbaum N (1999) Mouse adapted to scan biometric data. U.S. Patent No 5,991,431. 23 November 1999 Borza SJ, Borza MA, Teitelbaum N (1999) Mouse adapted to scan biometric data. U.S. Patent No 5,991,431. 23 November 1999
10.
Zurück zum Zitat Tait B, Von Solms B (2008) Secure biometrically based authentication protocol for a public network environment. In: International conference on global e-Security. Springer, Berlin, Heidelberg Tait B, Von Solms B (2008) Secure biometrically based authentication protocol for a public network environment. In: International conference on global e-Security. Springer, Berlin, Heidelberg
11.
Zurück zum Zitat Tait BL (2014) The biometric landscape, towards a sustainable biometric terminology framework. Int J Electron Secur Digit Forensics 9 6(2):147–156 Tait BL (2014) The biometric landscape, towards a sustainable biometric terminology framework. Int J Electron Secur Digit Forensics 9 6(2):147–156
12.
Zurück zum Zitat Liu S, Silverman M (2001) A practical guide to biometric security technology. IT Professional 3(1):27–32CrossRef Liu S, Silverman M (2001) A practical guide to biometric security technology. IT Professional 3(1):27–32CrossRef
13.
Zurück zum Zitat Jain AK, Arun R, Salil P (2004) An introduction to biometric recognition. IEEE Trans Circuits Syst Video Technol 14(1):4–20CrossRef Jain AK, Arun R, Salil P (2004) An introduction to biometric recognition. IEEE Trans Circuits Syst Video Technol 14(1):4–20CrossRef
14.
Zurück zum Zitat Garcia P (2018) Biometrics on the blockchain. Biom Technol Today 2018(5):5–7CrossRef Garcia P (2018) Biometrics on the blockchain. Biom Technol Today 2018(5):5–7CrossRef
15.
Zurück zum Zitat Xia F et al (2012) Internet of Things. Int J Commun Syst 25(9):1101 Xia F et al (2012) Internet of Things. Int J Commun Syst 25(9):1101
22.
Zurück zum Zitat Guo Z et al (2016) Hardware security meets biometrics for the age of IoT. In: 2016 IEEE international symposium on circuits and systems (ISCAS). IEEE Guo Z et al (2016) Hardware security meets biometrics for the age of IoT. In: 2016 IEEE international symposium on circuits and systems (ISCAS). IEEE
23.
Zurück zum Zitat Clarke J, Christopher C (2014) The potential subversion of biometric measurements. SSRN 2381614 Clarke J, Christopher C (2014) The potential subversion of biometric measurements. SSRN 2381614
24.
Zurück zum Zitat De Freitas P et al (2013) Can face anti-spoofing countermeasures work in a real world scenario? In: 2013 international conference on biometrics (ICB). IEEE De Freitas P et al (2013) Can face anti-spoofing countermeasures work in a real world scenario? In: 2013 international conference on biometrics (ICB). IEEE
25.
Zurück zum Zitat Adra B (2018) Facing the facts on biometric phone locks: your face and thumb not secure. U Ill JL Tech Pol’y 407 Adra B (2018) Facing the facts on biometric phone locks: your face and thumb not secure. U Ill JL Tech Pol’y 407
28.
Zurück zum Zitat Toth B (2005) Biometric liveness detection. Inf Secur Bull 10(8):291–297 Toth B (2005) Biometric liveness detection. Inf Secur Bull 10(8):291–297
31.
Zurück zum Zitat Jahromi MNS et al (2018) Automatic access control based on face and hand biometrics in a non-cooperative context. In: 2018 IEEE winter applications of computer vision workshops (WACVW). IEEE Jahromi MNS et al (2018) Automatic access control based on face and hand biometrics in a non-cooperative context. In: 2018 IEEE winter applications of computer vision workshops (WACVW). IEEE
32.
Zurück zum Zitat Hong Lai LQ, You J (2020) A novel method for touchless palmprint ROI extraction via skin color analysis. In: Recent trends in intelligent computing, communication and devices. Springer, Singapore, pp 271–276 Hong Lai LQ, You J (2020) A novel method for touchless palmprint ROI extraction via skin color analysis. In: Recent trends in intelligent computing, communication and devices. Springer, Singapore, pp 271–276
34.
Zurück zum Zitat Bowyer KW (2004) Face recognition technology: security versus privacy. Technol Soc Magaz IEEE 23(1):9-19. ISSN: 0278-0097. IEEE Society on Social Implications of Technology Bowyer KW (2004) Face recognition technology: security versus privacy. Technol Soc Magaz IEEE 23(1):9-19. ISSN: 0278-0097. IEEE Society on Social Implications of Technology
35.
Zurück zum Zitat Woodward Jr JD, Orleans MN (2003) Identity assurance in the information age—biometrics. ISBN 0-07-222227-1 Woodward Jr JD, Orleans MN (2003) Identity assurance in the information age—biometrics. ISBN 0-07-222227-1
38.
Zurück zum Zitat Liu S, Silverman MA (2001) Practical guide to biometric security technology, pp 27–32. ISBN 1520-9202. IEEE Computer Society Liu S, Silverman MA (2001) Practical guide to biometric security technology, pp 27–32. ISBN 1520-9202. IEEE Computer Society
39.
Zurück zum Zitat Tait BL, Von Solms SH (2009) BioVault: biometrically based encryption. In: Conference on e-Business, e-Services and e-Society. Springer, Berlin, Heidelberg Tait BL, Von Solms SH (2009) BioVault: biometrically based encryption. In: Conference on e-Business, e-Services and e-Society. Springer, Berlin, Heidelberg
40.
Zurück zum Zitat Rehman YAU, Lai MP, Mengyang L (2018) LiveNet: improving features generalization for face liveness detection using convolution neural networks. Expert Syst Appl 108:159–169 Rehman YAU, Lai MP, Mengyang L (2018) LiveNet: improving features generalization for face liveness detection using convolution neural networks. Expert Syst Appl 108:159–169
Metadaten
Titel
Aspects of Biometric Security in Internet of Things Devices
verfasst von
Bobby L. Tait
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-60425-7_7