Assessment 2: Biometric Systems, Privacy Enhancing Technologies, and Wireless Sensor Network Security
VerifiedAdded on 2024/07/01
|13
|2735
|90
AI Summary
This assessment explores the concepts of biometric systems, privacy enhancing technologies (PETs), and wireless sensor network (WSN) security. It delves into the different types of biometric systems, their advantages and disadvantages, and their applications. The assessment also examines various PETs, including encryption, identity management, and user interface and architecture design, highlighting their role in protecting user privacy. Finally, it discusses the threats and vulnerabilities associated with WSNs, including DoS attacks, Sybil attacks, and physical layer attacks, and provides recommendations for mitigating these risks.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
ITC596
IT Risk Management
Assessment 2
Student Name: Venkata Sai Venu Sasi Sheker Medidi
Student ID: 11621920
Contents
IT Risk Management
Assessment 2
Student Name: Venkata Sai Venu Sasi Sheker Medidi
Student ID: 11621920
Contents
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
a).................................................................................................................................................................... 2
b).................................................................................................................................................................... 7
c).................................................................................................................................................................... 9
References....................................................................................................................................................12
List of Figures
Figure 1: Fingerprint...................................................................................................................................... 3
Figure 2 Hand geometry................................................................................................................................4
Figure 4 Iris recognition.................................................................................................................................5
Figure 6 Encryption....................................................................................................................................... 7
Figure 9 WSN Architecture........................................................................................................................... 9
1
b).................................................................................................................................................................... 7
c).................................................................................................................................................................... 9
References....................................................................................................................................................12
List of Figures
Figure 1: Fingerprint...................................................................................................................................... 3
Figure 2 Hand geometry................................................................................................................................4
Figure 4 Iris recognition.................................................................................................................................5
Figure 6 Encryption....................................................................................................................................... 7
Figure 9 WSN Architecture........................................................................................................................... 9
1
a)
Biometric is a security system which allows a person to be authenticated and identified. It is all
based upon the personal data, which is unique and specific. Biometric system is the process of
authentication of personal information of a person. The aim of the system is to capture and store
the unique personal information of a particular person. It can be their face, voice, fingerprint,
eyes etc. This data is then compared to the previously stored data of various persons which are
stored in database.
Biometric system is secure with many kinds of cybercrimes, unauthorized individuals, frauds,
etc. These technologies made a huge change in oppose to terrorism activities and gradually being
implemented. Today the biometric system is the most reliable system because of true
identification and fast processing (unar, et. Al., 2014).
There are majorly two types of biometric systems
1. Physiological
2. Behavioural
Physiological – These measurements based on the physical features of a particular person which
mostly consist of fingerprints, shape of a hand, vein pattern, iris or retina identification, DNA,
blood, saliva etc.
Behavioural – Behaviour of an individual is being identified, the most common are voice
recognition, gestures, accent etc.
Fingerprint – Fingerprint biometrics are very reliable and use full today, any individual
having different and unique fingerprint helps the biometric function to work properly and
make it faster than any biometric sections. The working principle of fingerprint
biometrics is based upon two special types of features which are core points and delta
points of finger (Labati, et. Al., 2015). These points are commonly referred to as
singularity points. The core point is mostly used as a reference point which is located at
the topmost point and the innermost point of fingerprint. Increasing in technology also
increase the security techniques which reads the fingerprint matching methods
An automatic fingerprint identification system
An automatic fingerprint authentication system
Fingerprint scanner is being used in various different places for example-
Office, blood banks, college, industries etc.
2
Biometric is a security system which allows a person to be authenticated and identified. It is all
based upon the personal data, which is unique and specific. Biometric system is the process of
authentication of personal information of a person. The aim of the system is to capture and store
the unique personal information of a particular person. It can be their face, voice, fingerprint,
eyes etc. This data is then compared to the previously stored data of various persons which are
stored in database.
Biometric system is secure with many kinds of cybercrimes, unauthorized individuals, frauds,
etc. These technologies made a huge change in oppose to terrorism activities and gradually being
implemented. Today the biometric system is the most reliable system because of true
identification and fast processing (unar, et. Al., 2014).
There are majorly two types of biometric systems
1. Physiological
2. Behavioural
Physiological – These measurements based on the physical features of a particular person which
mostly consist of fingerprints, shape of a hand, vein pattern, iris or retina identification, DNA,
blood, saliva etc.
Behavioural – Behaviour of an individual is being identified, the most common are voice
recognition, gestures, accent etc.
Fingerprint – Fingerprint biometrics are very reliable and use full today, any individual
having different and unique fingerprint helps the biometric function to work properly and
make it faster than any biometric sections. The working principle of fingerprint
biometrics is based upon two special types of features which are core points and delta
points of finger (Labati, et. Al., 2015). These points are commonly referred to as
singularity points. The core point is mostly used as a reference point which is located at
the topmost point and the innermost point of fingerprint. Increasing in technology also
increase the security techniques which reads the fingerprint matching methods
An automatic fingerprint identification system
An automatic fingerprint authentication system
Fingerprint scanner is being used in various different places for example-
Office, blood banks, college, industries etc.
2
Figure 1: Fingerprint
Source: (Msiza 2011)
Advantages:
1. Fingerprint biometric system has high accuracy
2. Improve security
3. It is easy to use
4. It cannot be forgotten or lost
5. This biometric system reduces the operational costs
6. It requires small storage space in the database memory
Disadvantages:
1. It is not appropriate for children because of the size of children fingers changes
quickly
2. Fingerprint biometric can make an error in identification when the finger is wet and
dirty.
3. Systems are not that much accurate
4. It cannot be reset easily.
Hand geometry – Hand geometry biometric is also very useful to enhance the security.
Basically, this is based upon the geometrical shape and size of the hand, shape of palm,
width and length of the fingers etc. Hand geometry biometric capture the image of the
hand by using a camera. The hand is being placed over on a plate and palm should be
3
Source: (Msiza 2011)
Advantages:
1. Fingerprint biometric system has high accuracy
2. Improve security
3. It is easy to use
4. It cannot be forgotten or lost
5. This biometric system reduces the operational costs
6. It requires small storage space in the database memory
Disadvantages:
1. It is not appropriate for children because of the size of children fingers changes
quickly
2. Fingerprint biometric can make an error in identification when the finger is wet and
dirty.
3. Systems are not that much accurate
4. It cannot be reset easily.
Hand geometry – Hand geometry biometric is also very useful to enhance the security.
Basically, this is based upon the geometrical shape and size of the hand, shape of palm,
width and length of the fingers etc. Hand geometry biometric capture the image of the
hand by using a camera. The hand is being placed over on a plate and palm should be
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
down. This biometric is more reliable and increase the security and the hand geometric
data is easy to collect but the database requirement is high (Svoboda, et. Al., 2015).
This biometric technique is used in many places for example –
Banks, US military, universities, San Francisco international airport etc.
Figure 2 Hand geometry
Source: (Vaidehi, 2018)
Advantages –
1. It is very simple and easy to use
2. Hand geometry data is very easier to collect as compared to other biometric systems
like retinal data where a light plays a vital role.
3. Dry skin and environmental factors are not an issue with hand geometry biometrics
Disadvantages –
1. The hand geometry is not unique n some cases so as a result it cannot be used as an
identification process.
2. It is also not ideal for growing children because the shape of their hand changes
continuously.
3. It requires the large database to store the data.
4. Rings and other accessories may occur any problem with the shape of hand
geometry.
4
data is easy to collect but the database requirement is high (Svoboda, et. Al., 2015).
This biometric technique is used in many places for example –
Banks, US military, universities, San Francisco international airport etc.
Figure 2 Hand geometry
Source: (Vaidehi, 2018)
Advantages –
1. It is very simple and easy to use
2. Hand geometry data is very easier to collect as compared to other biometric systems
like retinal data where a light plays a vital role.
3. Dry skin and environmental factors are not an issue with hand geometry biometrics
Disadvantages –
1. The hand geometry is not unique n some cases so as a result it cannot be used as an
identification process.
2. It is also not ideal for growing children because the shape of their hand changes
continuously.
3. It requires the large database to store the data.
4. Rings and other accessories may occur any problem with the shape of hand
geometry.
4
Iris recognition - Iris recognition is the next level of security. It is the biometric process
where age does not play any role because the shape of eyeball and iris pattern of each
individual is unique and remains constant throughout the whole lifetime. The working
principle of iris recognition is based upon pupil detection, iris detection, normalization,
feature extraction, matching etc. The pupil is the circular black disk which lies in the
centre of the eyeball which changes its size according to light. The annual ring which lies
between pupil boundary and sclera is called iris which contains the large number of
minute details, unique to every individual(Bowyer and Burge, 2016).
Iris recognition is used in many places, for example –
ATMs of financial institutions, banks, large industries etc.
Figure 3 Iris recognition
Source: (Thakkar 2015)
Advantages-
1. Iris recognition is one of the best biometrics of all which has high accuracy
2. Iris scanning can be done from a normal distance unlike retina scanning
3. It is very easy to use just stand still in front of camera
4. Iris recognition is very fast in processing and recognition process
5
where age does not play any role because the shape of eyeball and iris pattern of each
individual is unique and remains constant throughout the whole lifetime. The working
principle of iris recognition is based upon pupil detection, iris detection, normalization,
feature extraction, matching etc. The pupil is the circular black disk which lies in the
centre of the eyeball which changes its size according to light. The annual ring which lies
between pupil boundary and sclera is called iris which contains the large number of
minute details, unique to every individual(Bowyer and Burge, 2016).
Iris recognition is used in many places, for example –
ATMs of financial institutions, banks, large industries etc.
Figure 3 Iris recognition
Source: (Thakkar 2015)
Advantages-
1. Iris recognition is one of the best biometrics of all which has high accuracy
2. Iris scanning can be done from a normal distance unlike retina scanning
3. It is very easy to use just stand still in front of camera
4. Iris recognition is very fast in processing and recognition process
5
5. The decision making of iris pattern, as well as the encoding, is highly traceable
Disadvantages –
1. Iris scanners are relatively very higher in cost as compared to other scanning
biometric systems
2. A person needs to be at a specific distance to scan iris
3. Detection process takes place only when a person stands still in front of the device
4. The constant use of this iris scanner can cause harm to eyes because of infrared rays
6
Disadvantages –
1. Iris scanners are relatively very higher in cost as compared to other scanning
biometric systems
2. A person needs to be at a specific distance to scan iris
3. Detection process takes place only when a person stands still in front of the device
4. The constant use of this iris scanner can cause harm to eyes because of infrared rays
6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
b)
Privacy enhancing technologies (PETs) are the technologies for the user to protect their personal
data and ensure the user that their data is protected. Basically, the aim of PETs is that it allows
the online and network users to protect their data and privacy of their personal information which
provided by applicants. This has gained a momentum in both academia as well as in the
industries.
There are various types of technologies which referred to PETs which are following-
1. Encryption – Encryption is considered as a good technology to secure the data and not
only to secure at one by the encryption method the data can also be transmitted from one
device to another device using internet access. The data is fully encrypted which cannot
be understandable to any third person (gross, et. al., 2018). It also supports the security
functions of data protection laws. Encryption today is very mature technology because it
always being in the state of advancement. Encryption of data is relatively simple and
more reliable to implement.
Encryption is the method where a plain text is converted into an unreadable format which
can only decrypt by another person if they have access to the decryption key.
It provided end-to-end protection of data.
Some examples where encryption process is used are –
Digital certificates, communication, files, authentication etc.
Figure 4 Encryption
Source: (Kohout 2015)
2. Identity management– The remote nature of many online transactions has transformed
many organizations and agencies to require individuals to authenticate and identified
during transactions. Identify management system provides a trust between any individual,
agencies and organizations. In this process, some rules have been executed to determine
7
Privacy enhancing technologies (PETs) are the technologies for the user to protect their personal
data and ensure the user that their data is protected. Basically, the aim of PETs is that it allows
the online and network users to protect their data and privacy of their personal information which
provided by applicants. This has gained a momentum in both academia as well as in the
industries.
There are various types of technologies which referred to PETs which are following-
1. Encryption – Encryption is considered as a good technology to secure the data and not
only to secure at one by the encryption method the data can also be transmitted from one
device to another device using internet access. The data is fully encrypted which cannot
be understandable to any third person (gross, et. al., 2018). It also supports the security
functions of data protection laws. Encryption today is very mature technology because it
always being in the state of advancement. Encryption of data is relatively simple and
more reliable to implement.
Encryption is the method where a plain text is converted into an unreadable format which
can only decrypt by another person if they have access to the decryption key.
It provided end-to-end protection of data.
Some examples where encryption process is used are –
Digital certificates, communication, files, authentication etc.
Figure 4 Encryption
Source: (Kohout 2015)
2. Identity management– The remote nature of many online transactions has transformed
many organizations and agencies to require individuals to authenticate and identified
during transactions. Identify management system provides a trust between any individual,
agencies and organizations. In this process, some rules have been executed to determine
7
how much personal the data is processed. These rules should have to place the data
protection as well as requirements. The security provided by these rules, being
implemented upon data strategies.
The personal data can be easily accessed by the attacker if there is no security applied.
Example –
Large industries, banks, govt. offices etc.
3. User Interface and architecture – Nowadays, many professionals and user interface
designers started applying the proper engineering in their work. The emerging use of
technologies is also providing the security. Professionals started making such designs,
they provide some principles and operations which automatically generates the data
privacy. Engineering psychology influences include sequencing of task, shapes, colours,
font sizes.
On the other hand, architect plays a vital role in the data protection compliance, for
example, their design decisions on use of cryptographic acceleration, database design,
inbound and outbound interfaces etc. to web servers.
8
protection as well as requirements. The security provided by these rules, being
implemented upon data strategies.
The personal data can be easily accessed by the attacker if there is no security applied.
Example –
Large industries, banks, govt. offices etc.
3. User Interface and architecture – Nowadays, many professionals and user interface
designers started applying the proper engineering in their work. The emerging use of
technologies is also providing the security. Professionals started making such designs,
they provide some principles and operations which automatically generates the data
privacy. Engineering psychology influences include sequencing of task, shapes, colours,
font sizes.
On the other hand, architect plays a vital role in the data protection compliance, for
example, their design decisions on use of cryptographic acceleration, database design,
inbound and outbound interfaces etc. to web servers.
8
c)
WSN is a wireless network which consists of various devices using sensors, which monitor
environmental or physical conditions. WSN system provides wireless connectivity. The protocol
which has been selected by user totally depends upon user’s application requirements (yang,
2014). WSN architecture follows OSI model, this basically includes five layers and three cross
layers. Five layers have been required for sensor network like- Transport, network, data-link,
application and physical layer. These layers are used to accomplish network and make it makes
the sensors to work along with them.
Figure 5 WSN Architecture
Source: (Agarwal 2015)
Application layer – Application layer offers the software for various applications
and traffic management that convert the data into positive and clear information.
Transport layer – Transport layer is needed when a system is properly planned to
contact other networks. Transport layer can be easily divided into packet driven as
well as event-driven.
Network layer – The function and working of network layer are routing. The main
task of routing is buffers, power conversing and partial memories.
Data link layer – Data frame detection is processed in data link layer as well as
multiplexing of data streams, MAC and error control.
9
WSN is a wireless network which consists of various devices using sensors, which monitor
environmental or physical conditions. WSN system provides wireless connectivity. The protocol
which has been selected by user totally depends upon user’s application requirements (yang,
2014). WSN architecture follows OSI model, this basically includes five layers and three cross
layers. Five layers have been required for sensor network like- Transport, network, data-link,
application and physical layer. These layers are used to accomplish network and make it makes
the sensors to work along with them.
Figure 5 WSN Architecture
Source: (Agarwal 2015)
Application layer – Application layer offers the software for various applications
and traffic management that convert the data into positive and clear information.
Transport layer – Transport layer is needed when a system is properly planned to
contact other networks. Transport layer can be easily divided into packet driven as
well as event-driven.
Network layer – The function and working of network layer are routing. The main
task of routing is buffers, power conversing and partial memories.
Data link layer – Data frame detection is processed in data link layer as well as
multiplexing of data streams, MAC and error control.
9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Physical layer – Physical layer is mostly responsible for the selection of data
encryption, frequencies, modulation and signal detection.
WSN are used in many critical and vast applications like habitat monitoring, military
etc. The minimum level of security is required to protect certain applications like
authentication and integrity. WSN nodes include various technical components
including radio, analog circuit, sensor interface, battery, microcontroller.
Threats and vulnerabilities -
Wireless sensor networks can be affected by different types of attacks.
1. Attacks to authentication and secrecy
2. Stealthy attack against service integrity
3. Attacks on network availability
Some of the standard cryptographic techniques can eliminate these threats and protect the
secrecy and authentication. The main goal of an attacker is to make access to the network which
allows the false data and false value. The DoS attack usually refers to disrupt or destroy the
network (Stallings, 2017).
DoS attacks –
There are different types of DoS attacks which defined as an event that attempts to decrease the
network’s capacity to analyse and perform. Some of the important DoS attacks are mentioned
below –
a. Network layer attack – This layer of WSN is vulnerable to various kinds of attacks such as
sinkhole, Sybil, spoofing wormhole etc. (Pawar and Agarwal, 2017).
b. Sybil attack - In many cases, the sensors in WSN might need to work together to complete a
specific task. In this kind of situations, a node pretends to be more than one node using
identification of other nodes. In Sybil attack, the node forges the identities of more than one
node.
c. Physical layer attack –This layer is always responsible for the frequency, data encryption
and modulation. The possibility of jamming is there in any radio-based medium. (Bloessl,
2015).
d. Link layer attack - These attacks are those attacks where some layers are involved. This
layer is always responsible for the medium to access control, data frame detection, error
control as well as multiplexing of the data. An attacker can create collision to these layers
and unfairness in allocation.
Recommendations to mitigate the threats and vulnerabilities-
These attacks can be eliminated and protected by applying proper cryptographic techniques.
Use encrypted data always to protect and have a second layer of security.
10
encryption, frequencies, modulation and signal detection.
WSN are used in many critical and vast applications like habitat monitoring, military
etc. The minimum level of security is required to protect certain applications like
authentication and integrity. WSN nodes include various technical components
including radio, analog circuit, sensor interface, battery, microcontroller.
Threats and vulnerabilities -
Wireless sensor networks can be affected by different types of attacks.
1. Attacks to authentication and secrecy
2. Stealthy attack against service integrity
3. Attacks on network availability
Some of the standard cryptographic techniques can eliminate these threats and protect the
secrecy and authentication. The main goal of an attacker is to make access to the network which
allows the false data and false value. The DoS attack usually refers to disrupt or destroy the
network (Stallings, 2017).
DoS attacks –
There are different types of DoS attacks which defined as an event that attempts to decrease the
network’s capacity to analyse and perform. Some of the important DoS attacks are mentioned
below –
a. Network layer attack – This layer of WSN is vulnerable to various kinds of attacks such as
sinkhole, Sybil, spoofing wormhole etc. (Pawar and Agarwal, 2017).
b. Sybil attack - In many cases, the sensors in WSN might need to work together to complete a
specific task. In this kind of situations, a node pretends to be more than one node using
identification of other nodes. In Sybil attack, the node forges the identities of more than one
node.
c. Physical layer attack –This layer is always responsible for the frequency, data encryption
and modulation. The possibility of jamming is there in any radio-based medium. (Bloessl,
2015).
d. Link layer attack - These attacks are those attacks where some layers are involved. This
layer is always responsible for the medium to access control, data frame detection, error
control as well as multiplexing of the data. An attacker can create collision to these layers
and unfairness in allocation.
Recommendations to mitigate the threats and vulnerabilities-
These attacks can be eliminated and protected by applying proper cryptographic techniques.
Use encrypted data always to protect and have a second layer of security.
10
Deploy multiple layers for security to protect Wireless networks.
Collision – The time diversity can play a major role to counter the collision in layers, error
correcting nodes and CRC can also play a vital role to protect such types of threats.
Sybil attack – Changing the keys regularly can eliminate these types of attacks.
DoS – The physical protection of the data is required as well as the protection of network and
specific data link ID
11
Collision – The time diversity can play a major role to counter the collision in layers, error
correcting nodes and CRC can also play a vital role to protect such types of threats.
Sybil attack – Changing the keys regularly can eliminate these types of attacks.
DoS – The physical protection of the data is required as well as the protection of network and
specific data link ID
11
References
Bloessl, B., Sommer, C., Dressier, F., & Eckhoff, D. (2015, February). In 2015 International
Conference on Computing, Networking and Communications (ICNC) (pp. 395-400). IEEE.
Bowyer, K. W., & Burge, M. J. (Eds.). (2016). Handbook of iris recognition. Springer London.
Gross, D., Lackey, J., Levy, D. E., Jover, R. P., Ramachandran, J., & Serban, C. (2018). U.S.
Patent No. 9,967,173. Washington, DC: U.S. Patent and Trademark Office.
Labati, R. D., Piuri, V., & Scotti, F. (2015). Touchless fingerprint biometrics. CRC Press.
Msiza, I., Mistry, J., Leke-betechuoh, B., Nelwamondo, V., F., & Marvala, T. (2011). [Image]
Retrieved from : https://www.researchgate.net/figure/A-fingerprint-showing-clear-markings-of-
the-core-circle-and-the-delta-triangle_fig1_221913728 [Accessed 24 aug. 2018]
Pawar, M., & Agarwal, J. (2017). A literature survey on security issues of WSN and different
types of attacks in network.". Indian Journal of Computer Science and Engineering, 8(2), 80-83.
Stallings, W. (2017). Cryptography and network security: principles and practice (p. 743).
Upper Saddle River, NJ: Pearson.
Svoboda, J., Bronstein, M. M., & Drahansky, M. (2015, May). Contactless biometric hand
geometry recognition using a low-cost 3D camera. In Biometrics (ICB), 2015 International
Conference on (pp. 452-457). IEEE.
Unar, J. A., Seng, W. C., & Abbasi, A. (2014). A review of biometric technology along with
trends and prospects.
Vaidehi. (2018). [image] Retrieved from: https://www.lanews.org/hand-geometry-biometrics-
market-to-register-steady-expansion-during-2014-2020 [Accessed 24 aug. 2018]
Yang, K. (2014). Wireless sensor networks. Principles, Design and Applications.
12
Bloessl, B., Sommer, C., Dressier, F., & Eckhoff, D. (2015, February). In 2015 International
Conference on Computing, Networking and Communications (ICNC) (pp. 395-400). IEEE.
Bowyer, K. W., & Burge, M. J. (Eds.). (2016). Handbook of iris recognition. Springer London.
Gross, D., Lackey, J., Levy, D. E., Jover, R. P., Ramachandran, J., & Serban, C. (2018). U.S.
Patent No. 9,967,173. Washington, DC: U.S. Patent and Trademark Office.
Labati, R. D., Piuri, V., & Scotti, F. (2015). Touchless fingerprint biometrics. CRC Press.
Msiza, I., Mistry, J., Leke-betechuoh, B., Nelwamondo, V., F., & Marvala, T. (2011). [Image]
Retrieved from : https://www.researchgate.net/figure/A-fingerprint-showing-clear-markings-of-
the-core-circle-and-the-delta-triangle_fig1_221913728 [Accessed 24 aug. 2018]
Pawar, M., & Agarwal, J. (2017). A literature survey on security issues of WSN and different
types of attacks in network.". Indian Journal of Computer Science and Engineering, 8(2), 80-83.
Stallings, W. (2017). Cryptography and network security: principles and practice (p. 743).
Upper Saddle River, NJ: Pearson.
Svoboda, J., Bronstein, M. M., & Drahansky, M. (2015, May). Contactless biometric hand
geometry recognition using a low-cost 3D camera. In Biometrics (ICB), 2015 International
Conference on (pp. 452-457). IEEE.
Unar, J. A., Seng, W. C., & Abbasi, A. (2014). A review of biometric technology along with
trends and prospects.
Vaidehi. (2018). [image] Retrieved from: https://www.lanews.org/hand-geometry-biometrics-
market-to-register-steady-expansion-during-2014-2020 [Accessed 24 aug. 2018]
Yang, K. (2014). Wireless sensor networks. Principles, Design and Applications.
12
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.