ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Assessment 2: Biometric Systems, Privacy Enhancing Technologies, and Wireless Sensor Network Security

Verified

Added on  2024/07/01

|13
|2735
|90
AI Summary
This assessment explores the concepts of biometric systems, privacy enhancing technologies (PETs), and wireless sensor network (WSN) security. It delves into the different types of biometric systems, their advantages and disadvantages, and their applications. The assessment also examines various PETs, including encryption, identity management, and user interface and architecture design, highlighting their role in protecting user privacy. Finally, it discusses the threats and vulnerabilities associated with WSNs, including DoS attacks, Sybil attacks, and physical layer attacks, and provides recommendations for mitigating these risks.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
ITC596
IT Risk Management

Assessment 2

Student Name:
Venkata Sai Venu Sasi Sheker Medidi
Student ID: 11621920

Contents

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
a).................................................................................................................................................................... 2
b)
.................................................................................................................................................................... 7
c)
.................................................................................................................................................................... 9
References
....................................................................................................................................................12
List of Figures

Figure 1: Fingerprint
...................................................................................................................................... 3
Figure 2 Hand geometry
................................................................................................................................4
Figure 4 Iris recognition
.................................................................................................................................5
Figure 6 Encryption
....................................................................................................................................... 7
Figure 9 WSN Architecture
........................................................................................................................... 9
1
Document Page
a)
Biometric is a security system which allows a person to be authenticated and identified. It is all

based upon the personal data, which is unique and specific. Biometric system is the process of

authentication of personal information of a person. The aim of the system is to capture and store

the unique personal information of a particular person. It can be their face, voice, fingerprint,

eyes etc. This data is then compared to the previously stored data of various persons which are

stored in database.

Biometric system is secure with many kinds of cybercrimes, unauthorized individuals, frauds,

etc. These technologies made a huge change in oppose to terrorism activities and gradually being

implemented. Today the biometric system is the most reliable system because of true

identification and fast processing (unar, et. Al., 2014).

There are majorly two types of biometric systems

1.
Physiological
2.
Behavioural
Physiological – These measurements based on the physical features of a particular person which

mostly consist of fingerprints, shape of a hand, vein pattern, iris or retina identification, DNA,

blood, saliva etc.

Behavioural – Behaviour of an individual is being identified, the most common are voice

recognition, gestures, accent etc.

Fingerprint – Fingerprint biometrics are very reliable and use full today, any individual
having different and unique fingerprint helps the biometric function to work properly and

make it faster than any biometric sections. The working principle of fingerprint

biometrics is based upon two special types of features which are core points and delta

points of finger (Labati, et. Al., 2015). These points are commonly referred to as

singularity points. The core point is mostly used as a reference point which is located at

the topmost point and the innermost point of fingerprint. Increasing in technology also

increase the security techniques which reads the fingerprint matching methods

An automatic fingerprint identification system
An automatic fingerprint authentication system
Fingerprint scanner is being used in various different places for example-

Office, blood banks, college, industries etc.

2
Document Page
Figure 1: Fingerprint
Source: (Msiza 2011)

Advantages:

1.
Fingerprint biometric system has high accuracy
2.
Improve security
3.
It is easy to use
4.
It cannot be forgotten or lost
5.
This biometric system reduces the operational costs
6.
It requires small storage space in the database memory
Disadvantages:

1.
It is not appropriate for children because of the size of children fingers changes
quickly

2.
Fingerprint biometric can make an error in identification when the finger is wet and
dirty.

3.
Systems are not that much accurate
4.
It cannot be reset easily.
Hand geometry – Hand geometry biometric is also very useful to enhance the security.
Basically, this is based upon the geometrical shape and size of the hand, shape of palm,

width and length of the fingers etc. Hand geometry biometric capture the image of the

hand by using a camera. The hand is being placed over on a plate and palm should be

3

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
down. This biometric is more reliable and increase the security and the hand geometric
data is easy to collect but the database requirement is high (Svoboda, et. Al., 2015).

This biometric technique is used in many places for example –

Banks, US military, universities, San Francisco international airport etc.

Figure
2 Hand geometry
Source:
(Vaidehi, 2018)
Advantages –

1.
It is very simple and easy to use
2.
Hand geometry data is very easier to collect as compared to other biometric systems
like retinal data where a light plays a vital role.

3.
Dry skin and environmental factors are not an issue with hand geometry biometrics
Disadvantages –

1.
The hand geometry is not unique n some cases so as a result it cannot be used as an
identification process.

2.
It is also not ideal for growing children because the shape of their hand changes
continuously.

3.
It requires the large database to store the data.
4.
Rings and other accessories may occur any problem with the shape of hand
geometry.

4
Document Page
Iris recognition - Iris recognition is the next level of security. It is the biometric process
where age does not play any role because the shape of eyeball and iris pattern of each

individual is unique and remains constant throughout the whole lifetime. The working

principle of iris recognition is based upon pupil detection, iris detection, normalization,

feature extraction, matching etc. The pupil is the circular black disk which lies in the

centre of the eyeball which changes its size according to light. The annual ring which lies

between pupil boundary and sclera is called iris which contains the large number of

minute details, unique to every individual(Bowyer and Burge, 2016).

Iris recognition is used in many places, for example –

ATMs of financial institutions, banks, large industries etc.

Figure
3 Iris recognition
Source: (Thakkar 2015)

Advantages-

1.
Iris recognition is one of the best biometrics of all which has high accuracy
2.
Iris scanning can be done from a normal distance unlike retina scanning
3.
It is very easy to use just stand still in front of camera
4.
Iris recognition is very fast in processing and recognition process
5
Document Page
5. The decision making of iris pattern, as well as the encoding, is highly traceable
Disadvantages –

1.
Iris scanners are relatively very higher in cost as compared to other scanning
biometric systems

2.
A person needs to be at a specific distance to scan iris
3.
Detection process takes place only when a person stands still in front of the device
4.
The constant use of this iris scanner can cause harm to eyes because of infrared rays
6

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
b)
Privacy enhancing technologies (PETs) are the technologies for the user to protect their personal

data and ensure the user that their data is protected. Basically, the aim of PETs is that it allows

the online and network users to protect their data and privacy of their personal information which

provided by applicants. This has gained a momentum in both academia as well as in the

industries.

There are various types of technologies which referred to PETs which are following-

1.
Encryption – Encryption is considered as a good technology to secure the data and not
only to secure at one by the encryption method the data can also be transmitted from one

device to another device using internet access. The data is fully encrypted which cannot

be understandable to any third person (gross, et. al., 2018). It also supports the security

functions of data protection laws. Encryption today is very mature technology because it

always being in the state of advancement. Encryption of data is relatively simple and

more reliable to implement.

Encryption is the method where a plain text is converted into an unreadable format which

can only decrypt by another person if they have access to the decryption key.

It provided end-to-end protection of data.

Some examples where encryption process is used are –

Digital certificates, communication, files, authentication etc.

Figure
4 Encryption
Source: (Kohout 2015)

2.
Identity management– The remote nature of many online transactions has transformed
many organizations and agencies to require individuals to authenticate and identified

during transactions. Identify management system provides a trust between any individual,

agencies and organizations.
In this process, some rules have been executed to determine
7
Document Page
how much personal the data is processed. These rules should have to place the data
protection as well as requirements. The security provided by these rules, being

implemented upon data strategies.

The personal data can be easily accessed by the attacker if there is no security applied.

Example –

Large industries, banks, govt. offices etc.

3.
User Interface and architecture – Nowadays, many professionals and user interface
designers started applying the proper engineering in their work. The emerging use of

technologies is also providing the security. Professionals started making such designs,

they provide some principles and operations which automatically generates the data

privacy. Engineering psychology influences include sequencing of task, shapes, colours,

font sizes.

On the other hand, architect plays a vital role in the data protection compliance, for

example, their design decisions on use of cryptographic acceleration, database design,

inbound and outbound interfaces etc. to web servers.

8
Document Page
c)
WSN is a wireless network which consists of various devices using sensors, which monitor

environmental or physical conditions. WSN system provides wireless connectivity. The protocol

which has been selected by user totally depends upon user’s application requirements
(yang,
2014). WSN architecture follows OSI model, this basically includes five layers and three cross

layers. Five layers have been required for sensor network like- Transport, network, data-link,

application and physical layer. These layers are used to accomplish network and make it makes

the sensors to work along with them.

Figure
5 WSN Architecture
Source: (Agarwal 2015)

Application layer – Application layer offers the software for various applications
and traffic management that convert the data into positive and clear information.

Transport layer – Transport layer is needed when a system is properly planned to
contact other networks. Transport layer can be easily divided into packet driven as

well as event-driven.

Network layer – The function and working of network layer are routing. The main
task of routing is buffers, power conversing and partial memories.

Data link layer – Data frame detection is processed in data link layer as well as
multiplexing of data streams, MAC and error control.

9

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Physical layer – Physical layer is mostly responsible for the selection of data
encryption, frequencies, modulation and signal detection.

WSN are used in many critical and vast applications like habitat monitoring, military
etc. The minimum level of security is required to protect certain applications like

authentication and integrity. WSN nodes include various technical components

including radio, analog circuit, sensor interface, battery, microcontroller.

Threats and vulnerabilities -

Wireless sensor networks can be affected by different types of attacks.

1.
Attacks to authentication and secrecy
2.
Stealthy attack against service integrity
3.
Attacks on network availability
Some of the standard cryptographic techniques can eliminate these threats and protect the

secrecy and authentication. The main goal of an attacker is to make access to the network which

allows the false data and false value. The DoS attack usually refers to disrupt or destroy the

network (Stallings, 2017).

DoS attacks –

There are different types of DoS attacks which defined as an event that attempts to decrease the

network’s capacity to analyse and perform. Some of the important DoS attacks are mentioned

below –

a.
Network layer attack – This layer of WSN is vulnerable to various kinds of attacks such as
sinkhole, Sybil, spoofing wormhole etc. (Pawar and Agarwal, 2017).

b.
Sybil attack - In many cases, the sensors in WSN might need to work together to complete a
specific task. In this kind of situations, a node pretends to be more than one node using

identification of other nodes. In Sybil attack, the node forges the identities of more than one

node.

c.
Physical layer attack –This layer is always responsible for the frequency, data encryption
and modulation. The possibility of jamming is there in any radio-based medium. (Bloessl,

2015).

d.
Link layer attack - These attacks are those attacks where some layers are involved. This
layer is always responsible for the medium to access control, data frame detection, error

control as well as multiplexing of the data. An attacker can create collision to these layers

and unfairness in allocation.

Recommendations to mitigate the threats and vulnerabilities-

These attacks can be eliminated and protected by applying proper cryptographic techniques.
Use encrypted data always to protect and have a second layer of security.
10
Document Page
Deploy multiple layers for security to protect Wireless networks.
Collision – The time diversity can play a major role to counter the collision in layers, error
correcting nodes and CRC can also play a vital role to protect such types of threats.

Sybil attack – Changing the keys regularly can eliminate these types of attacks.
DoS – The physical protection of the data is required as well as the protection of network and
specific data link ID

11
Document Page
References
Bloessl, B., Sommer, C., Dressier, F., & Eckhoff, D. (2015, February). In
2015 International
Conference on Computing, Networking and Communications (ICNC)
(pp. 395-400). IEEE.
Bowyer, K. W., & Burge, M. J. (Eds.). (2016).
Handbook of iris recognition. Springer London.
Gross, D., Lackey, J., Levy, D. E., Jover, R. P., Ramachandran, J., & Serban, C. (2018).
U.S.
Patent No. 9,967,173
. Washington, DC: U.S. Patent and Trademark Office.
Labati, R. D., Piuri, V., & Scotti, F. (2015).
Touchless fingerprint biometrics. CRC Press.
Msiza, I., Mistry, J., Leke-betechuoh, B., Nelwamondo, V., F., & Marvala, T. (2011). [Image]

Retrieved from :
https://www.researchgate.net/figure/A-fingerprint-showing-clear-markings-of-
the-core-circle-and-the-delta-triangle_fig1_221913728
[Accessed 24 aug. 2018]
Pawar, M., & Agarwal, J. (2017). A literature survey on security issues of WSN and different

types of attacks in network.".
Indian Journal of Computer Science and Engineering, 8(2), 80-83.
Stallings, W. (2017).
Cryptography and network security: principles and practice (p. 743).
Upper Saddle River, NJ: Pearson.

Svoboda, J., Bronstein, M. M., & Drahansky, M. (2015, May). Contactless biometric hand

geometry recognition using a low-cost 3D camera. In
Biometrics (ICB), 2015 International
Conference on
(pp. 452-457). IEEE.
Unar, J. A., Seng, W. C., & Abbasi, A. (2014).
A review of biometric technology along with
trends and prospects.

Vaidehi. (2018). [image] Retrieved from:
https://www.lanews.org/hand-geometry-biometrics-
market-to-register-steady-expansion-during-2014-2020
[Accessed 24 aug. 2018]
Yang, K. (2014). Wireless sensor networks.
Principles, Design and Applications.
12
1 out of 13
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]