IT Risk Management: Biometric Security and Privacy in Wireless Sensor Networks
VerifiedAdded on 2024/07/01
|15
|2412
|429
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
ITC596 IT RISK MANAGEMENT
ASSESSMENT 2
ASSESSMENT 2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
PART-2...................................................................................................................................... 3
Part A..................................................................................................................................... 3
Fingerprint..........................................................................................................................3
Hand Geometry.................................................................................................................. 8
Iris Recognition................................................................................................................ 10
Part B....................................................................................................................................11
Part-C...................................................................................................................................13
References:............................................................................................................................... 16
PART-2...................................................................................................................................... 3
Part A..................................................................................................................................... 3
Fingerprint..........................................................................................................................3
Hand Geometry.................................................................................................................. 8
Iris Recognition................................................................................................................ 10
Part B....................................................................................................................................11
Part-C...................................................................................................................................13
References:............................................................................................................................... 16
PART-2
Part A
Fingerprint
The word Biometric has two parts i.e. Bio and Metric. The word bio is defined as life and
metric is used to measure something. The Biometrics is used to determine the actual identity
of a person. This aspect of identification is mostly used than any other methods like pattern
drawing, passwords and pin numbers. These type systems used to detect the identification of
the validate users in the system. Biometric system is divided into various types which contain
fingerprint recognition, iris pattern, face recognition, vein pattern etc.
Figure 1: Biometric Sensors
Biometric of a person is used to recognize a person’s verification. A biometric sensor is
tending to change a person into electrical signals. Methods for biometric includes fingerprint
identification, face recognition, iris recognition, voice recognition etc. These sensors use
many different measures many different aspects like speed, temperature and many different
types of energies. In every type of biometric devices, at least one type of sensor device is
used. The devices which use biometrics use many applications like high-quality camera for
face detection, capture voice in microphones. Some biometrics is specially designed to
identify special features in recognizing technology. (Higgins et al., 2009)
Part A
Fingerprint
The word Biometric has two parts i.e. Bio and Metric. The word bio is defined as life and
metric is used to measure something. The Biometrics is used to determine the actual identity
of a person. This aspect of identification is mostly used than any other methods like pattern
drawing, passwords and pin numbers. These type systems used to detect the identification of
the validate users in the system. Biometric system is divided into various types which contain
fingerprint recognition, iris pattern, face recognition, vein pattern etc.
Figure 1: Biometric Sensors
Biometric of a person is used to recognize a person’s verification. A biometric sensor is
tending to change a person into electrical signals. Methods for biometric includes fingerprint
identification, face recognition, iris recognition, voice recognition etc. These sensors use
many different measures many different aspects like speed, temperature and many different
types of energies. In every type of biometric devices, at least one type of sensor device is
used. The devices which use biometrics use many applications like high-quality camera for
face detection, capture voice in microphones. Some biometrics is specially designed to
identify special features in recognizing technology. (Higgins et al., 2009)
Figure 2: Biometric Devices
Types of Biometric sensors:
Using Biometric systems, it is feasible to access the system in authenticating form. These
systems are classified into two forms i.e. Behavioral and physiological.
Figure 3: Types of Biometrics
Types of Biometric sensors:
Using Biometric systems, it is feasible to access the system in authenticating form. These
systems are classified into two forms i.e. Behavioral and physiological.
Figure 3: Types of Biometrics
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Finger Print Identification: This type of verification method take the image of the finger
and store the features of the finger for further identification. This feature matches the finger
using three attempts like match the equivalent pixels between two images, match the set of
points in an image, capture ridges. This method is very stable and provides reliability to the
users. This sensor is used at doors for safety. Nowadays some banks also initiate the
fingerprint sensor recognition at ATM.
Figure 4: Finger Print Scanner device
Advantages:
1. These sensors are highly secured and unique.
2. This sensor is used to unlock the system and applications without remembering the
password.
3. Fingerprint identification provides high accuracy.
4. These sensors make system convenient and provide transaction facility in the
minimum amount of time.
5. It uses the minimum amount of data to store in the system and reduce the size of
memory.
6. It is the most widely used security method. It is difficult to create a fake identity for
the user. The users cannot guess the password to unlock the system.
Disadvantage:
1. Sometimes, hackers steal the fingerprint of the target on other surfaces and using
these prints to access the device.
2. Fingerprint details are easy to steal and if some consequences occur then a large
amount of data destroy.
and store the features of the finger for further identification. This feature matches the finger
using three attempts like match the equivalent pixels between two images, match the set of
points in an image, capture ridges. This method is very stable and provides reliability to the
users. This sensor is used at doors for safety. Nowadays some banks also initiate the
fingerprint sensor recognition at ATM.
Figure 4: Finger Print Scanner device
Advantages:
1. These sensors are highly secured and unique.
2. This sensor is used to unlock the system and applications without remembering the
password.
3. Fingerprint identification provides high accuracy.
4. These sensors make system convenient and provide transaction facility in the
minimum amount of time.
5. It uses the minimum amount of data to store in the system and reduce the size of
memory.
6. It is the most widely used security method. It is difficult to create a fake identity for
the user. The users cannot guess the password to unlock the system.
Disadvantage:
1. Sometimes, hackers steal the fingerprint of the target on other surfaces and using
these prints to access the device.
2. Fingerprint details are easy to steal and if some consequences occur then a large
amount of data destroy.
3. Sometimes, cheap components are used in the development of the device and this
results in the denial of the authorized person. This technique is very sensitive.
Example of Fingerprint application is:
A system is developed known as Automated Fingerprint identification system is a
technique which is used to store and identify data of print in the system. It is mainly used
for the identification of criminals. It helps in preventing from fraud people. This system is
also acceptable in court cases for identification. It has revealed an advanced version on
the live scanning of records. (Gu et al., 2009)
results in the denial of the authorized person. This technique is very sensitive.
Example of Fingerprint application is:
A system is developed known as Automated Fingerprint identification system is a
technique which is used to store and identify data of print in the system. It is mainly used
for the identification of criminals. It helps in preventing from fraud people. This system is
also acceptable in court cases for identification. It has revealed an advanced version on
the live scanning of records. (Gu et al., 2009)
Hand Geometry
It identifies users with the shape of their hands. This technique measures the hand in many
ways. They compare the dimensions in multiple forms and measurements are stored in a file.
It provides access to too many systems. Hand Geometry technique is not that much unique as
fingerprint recognition but it is very highly demanding and more secured for applications.
This technique is highly reliable for the system to provide the best security to the users. In
this process of verification, the system captures the images of the hand and associates a
verification process. It checks the similarity associated and after this, it produces the results
of acceptance or rejection. It is basically based on the size of hand i.e. its length, breadth and
other aspects.
Figure 5: Hand Geometry sensor
Advantages of Hand Geometry:
1. This technology is very simple and easy for the users.
2. It is not costly for the users.
3. The data maintained in the system is easy to use and provides secure transmission of
data sets.
4. It is less used in place of other sensors like fingerprint recognition.
5. Environment factors are not considered as the major aspect and it doesn’t provide any
issue for the system.
The disadvantage of Hand Geometry:
1. It is not majorly used in the process of identification.
2. The features of the hand are not the same as it keeps changing as the growth of the
children.
3. The hand geometry system required to store a large amount of data.
It identifies users with the shape of their hands. This technique measures the hand in many
ways. They compare the dimensions in multiple forms and measurements are stored in a file.
It provides access to too many systems. Hand Geometry technique is not that much unique as
fingerprint recognition but it is very highly demanding and more secured for applications.
This technique is highly reliable for the system to provide the best security to the users. In
this process of verification, the system captures the images of the hand and associates a
verification process. It checks the similarity associated and after this, it produces the results
of acceptance or rejection. It is basically based on the size of hand i.e. its length, breadth and
other aspects.
Figure 5: Hand Geometry sensor
Advantages of Hand Geometry:
1. This technology is very simple and easy for the users.
2. It is not costly for the users.
3. The data maintained in the system is easy to use and provides secure transmission of
data sets.
4. It is less used in place of other sensors like fingerprint recognition.
5. Environment factors are not considered as the major aspect and it doesn’t provide any
issue for the system.
The disadvantage of Hand Geometry:
1. It is not majorly used in the process of identification.
2. The features of the hand are not the same as it keeps changing as the growth of the
children.
3. The hand geometry system required to store a large amount of data.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Example of Hand Geometry application is:
It is used in Automated Identification and Data capture systems. These systems are helpful in
providing high security to the users. All the features involve the identification of a particular
user and maintain its known criteria. (Kozuka, Wan & Sato, 2008)
It is used in Automated Identification and Data capture systems. These systems are helpful in
providing high security to the users. All the features involve the identification of a particular
user and maintain its known criteria. (Kozuka, Wan & Sato, 2008)
Iris Recognition
Iris recognition system is an automatic method used to identify the individual eye and this
methodology is unique and stable for long period of time. It is the most secure method for the
identification and authentication of an individual. It considers unique patterns for people in
the recognition process. It allows searching the patterns of the individuals. Its database can
store multiple aspects and provide speed in matching the eyes recognition.
Figure 6: Iris Recognition Sensor
Advantages of Iris Recognition System:
1. Iris recognition system is one of the accurate systems for an individual to provide
authenticate access. It helps a fast accessing of the system in a valid form.
2. This system is highly scalable because it is used for both large and small-scale
systems.
3. It provides access from large distances and it is easy to use these systems.
Disadvantages of Iris Recognition system:
1. It is very costly for a person to use this feature.
2. A person is required to be in a static position for enabling the access to the users.
3. It is very difficult to provide stability to the systems due to reflection.
Example of Iris recognition application is:
It is used in the finance and banking sectors. It helps to replace the use of passwords and pins
for security and save the time in the process. These systems are expected to improve the
financial services and became free in the given amount of time. It provides safety to the
systems and gives high security to the users. (Xiao, Sun & Tan, 2012)
Iris recognition system is an automatic method used to identify the individual eye and this
methodology is unique and stable for long period of time. It is the most secure method for the
identification and authentication of an individual. It considers unique patterns for people in
the recognition process. It allows searching the patterns of the individuals. Its database can
store multiple aspects and provide speed in matching the eyes recognition.
Figure 6: Iris Recognition Sensor
Advantages of Iris Recognition System:
1. Iris recognition system is one of the accurate systems for an individual to provide
authenticate access. It helps a fast accessing of the system in a valid form.
2. This system is highly scalable because it is used for both large and small-scale
systems.
3. It provides access from large distances and it is easy to use these systems.
Disadvantages of Iris Recognition system:
1. It is very costly for a person to use this feature.
2. A person is required to be in a static position for enabling the access to the users.
3. It is very difficult to provide stability to the systems due to reflection.
Example of Iris recognition application is:
It is used in the finance and banking sectors. It helps to replace the use of passwords and pins
for security and save the time in the process. These systems are expected to improve the
financial services and became free in the given amount of time. It provides safety to the
systems and gives high security to the users. (Xiao, Sun & Tan, 2012)
Part B
The protection is defined as the relation between the collection of data and technology
together. It allows showing the legal and certain issues in the system. Some privacy issues are
considering a wide variety of sources. The motive of data privacy is to use information and
protect individual privacy. It has contained the information about individual privacy. Some
techniques are providing for security like data security, system security, and information
security. It provides software and hardware services to utilize the issues. Some laws for
protecting and maintaining privacy are constantly changing.
Some privacy concerns are:
1. Internet: It has the power to control the information that someone leaks it on the
network. Data is available in the large amount and it can be adapted from many
sources. Some sources of the internet are required to be of privacy concern like email.
2. Cable Television: It describes the utilization of information that which type of
information should be kept private or public. The scheduled list of the events is
tracked by someone.
3. Medical: It is important for a person to not leak the medical information in front of
others. It is required to be kept private.
Privacy Enhancing Technologies:
The amount of data which comes from personal data is increased. Some risk occurs in
data protection and some laws are generated. Sometimes, laws are created to protect the
world I response to users. There is some organization which helps to provide great use of
automated controls. Privacy Enhancing Technologies can protect confidential
information:
1. Encryption: Today, encryption is used to protect data. Encryption helps in protecting
data and security laws. Encryption is defined as a simple and highly effective tool.
2. Application programming: In software systems, private data determines how rules
are processed. Those rules are required to help data and regulate the protection
requirements. These activities are applied on software provider than protecting data.
The protection is defined as the relation between the collection of data and technology
together. It allows showing the legal and certain issues in the system. Some privacy issues are
considering a wide variety of sources. The motive of data privacy is to use information and
protect individual privacy. It has contained the information about individual privacy. Some
techniques are providing for security like data security, system security, and information
security. It provides software and hardware services to utilize the issues. Some laws for
protecting and maintaining privacy are constantly changing.
Some privacy concerns are:
1. Internet: It has the power to control the information that someone leaks it on the
network. Data is available in the large amount and it can be adapted from many
sources. Some sources of the internet are required to be of privacy concern like email.
2. Cable Television: It describes the utilization of information that which type of
information should be kept private or public. The scheduled list of the events is
tracked by someone.
3. Medical: It is important for a person to not leak the medical information in front of
others. It is required to be kept private.
Privacy Enhancing Technologies:
The amount of data which comes from personal data is increased. Some risk occurs in
data protection and some laws are generated. Sometimes, laws are created to protect the
world I response to users. There is some organization which helps to provide great use of
automated controls. Privacy Enhancing Technologies can protect confidential
information:
1. Encryption: Today, encryption is used to protect data. Encryption helps in protecting
data and security laws. Encryption is defined as a simple and highly effective tool.
2. Application programming: In software systems, private data determines how rules
are processed. Those rules are required to help data and regulate the protection
requirements. These activities are applied on software provider than protecting data.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Figure 7: Privacy Enhancing Technologies
3. System Design: Architecture of the system has the basic effect on data protection.
The design of the architecture of the system supports the privacy requirement.
Architecture has become the strategy to support all principles of data protection.
(Buchanan, Kwecka & Ekonomou, 2012)
3. System Design: Architecture of the system has the basic effect on data protection.
The design of the architecture of the system supports the privacy requirement.
Architecture has become the strategy to support all principles of data protection.
(Buchanan, Kwecka & Ekonomou, 2012)
Part-C
Wireless Sensor Network is used as spatial sensor to detect and record the physical condition
of the environment. It helps in organizing the data at a central point of location. These
networks are helpful in measuring environmental conditions like sound, temperature etc.
These networks are distributed to monitor both physical and environmental conditions. The
wireless sensor network is consisting of various nodes and each node in the sensor is
connected to a sensor. Example of wireless networks is a radio transceiver which consists of
an antenna and a microcontroller which contains an electronic circuit.
Figure 8: Wireless Sensor Network
The architecture of Wireless Sensor Network
Wireless Sensor Network architecture is the most widely used OSI model design. This
architecture consists of multiple layers i.e. five layers and three cross layers. The cross layers
are specified as manage power resource, management of mobility in systems, and task
management. It provides configuration to network layers.
Wireless Sensor Network is used as spatial sensor to detect and record the physical condition
of the environment. It helps in organizing the data at a central point of location. These
networks are helpful in measuring environmental conditions like sound, temperature etc.
These networks are distributed to monitor both physical and environmental conditions. The
wireless sensor network is consisting of various nodes and each node in the sensor is
connected to a sensor. Example of wireless networks is a radio transceiver which consists of
an antenna and a microcontroller which contains an electronic circuit.
Figure 8: Wireless Sensor Network
The architecture of Wireless Sensor Network
Wireless Sensor Network architecture is the most widely used OSI model design. This
architecture consists of multiple layers i.e. five layers and three cross layers. The cross layers
are specified as manage power resource, management of mobility in systems, and task
management. It provides configuration to network layers.
Figure 9: Architecture of Wireless Sensor Network
Some characteristics of Wireless Sensor Network are:
1. The amount of power received by batteries for nodes.
2. It has the capacity to handle the network when a node fails.
3. It is simple in use.
4. It has hard environmental situations.
5. It provides scalability to large systems.
Threats in the network:
Some characteristics of Wireless Sensor Network are:
1. The amount of power received by batteries for nodes.
2. It has the capacity to handle the network when a node fails.
3. It is simple in use.
4. It has hard environmental situations.
5. It provides scalability to large systems.
Threats in the network:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1. Botnets: These types of threats can create infected computers that are able to be
controlled by the beginner. It is used to send spam emails with the attached virus.
They have found attacks in the network.
Figure 10: Botnet
2. Hacking: It is the most basic step which is taken to provide invalid access to the users
i.e. they are suffered from unauthorized access to data. The information is available
on the network for malicious activities. (Makarov & Potomskii, 2015)
Figure 11: Hacking
controlled by the beginner. It is used to send spam emails with the attached virus.
They have found attacks in the network.
Figure 10: Botnet
2. Hacking: It is the most basic step which is taken to provide invalid access to the users
i.e. they are suffered from unauthorized access to data. The information is available
on the network for malicious activities. (Makarov & Potomskii, 2015)
Figure 11: Hacking
References:
Buchanan, W., Kwecka, Z., & Ekonomou, E. (2012). A Privacy Preserving Method Using
Privacy Enhancing Techniques for Location Based Services. Mobile Networks And
Applications, 18(5), 728-737. doi: 10.1007/s11036-012-0362-6
Gu, L., Kanade, T., Gorodnichy, D., Yang, M., Tistarelli, M., & Grother, P. et al. (2009).
Fingerprint Sensor. Encyclopedia Of Biometrics, 523-523. doi: 10.1007/978-0-387-
73003-5_2206
Higgins, P., Choi, A., Chen, Y., Fondeur, J., Li, P., & Tian, J. et al. (2009). Biometric
Sensors. Encyclopedia Of Biometrics, 133-133. doi: 10.1007/978-0-387-73003-5_2065
Kozuka, K., Wan, C., & Sato, J. (2008). Rectification of 3D data obtained from moving
range sensor by using extended projective multiple view geometry. International Journal
Of Automation And Computing, 5(3), 268-275. doi: 10.1007/s11633-008-0268-8
Lewis, F. L. (2004). Wireless sensor networks. Smart environments: technologies,
protocols, and applications, 11-46.
Makarov, V., & Potomskii, S. (2015). Erratum to: Performance Factors of a Wireless
Sensor Network of Rectangular Mesh Configuration. Measurement Techniques, 58(10),
1187-1187. doi: 10.1007/s11018-015-0865-1
Schmitt, J. C., & Setlak, D. R. (2000). U.S. Patent No. 6,088,585. Washington, DC: U.S.
Patent and Trademark Office.
Tankard, C. (2011). Advanced persistent threats and how to monitor and deter
them. Network security, 2011(8), 16-19.
Xiao, L., Sun, Z., & Tan, T. (2012). Fusion of Iris and Periocular Biometrics for Cross-
Sensor Identification. Biometric Recognition, 202-209. doi: 10.1007/978-3-642-35136-
5_25
Buchanan, W., Kwecka, Z., & Ekonomou, E. (2012). A Privacy Preserving Method Using
Privacy Enhancing Techniques for Location Based Services. Mobile Networks And
Applications, 18(5), 728-737. doi: 10.1007/s11036-012-0362-6
Gu, L., Kanade, T., Gorodnichy, D., Yang, M., Tistarelli, M., & Grother, P. et al. (2009).
Fingerprint Sensor. Encyclopedia Of Biometrics, 523-523. doi: 10.1007/978-0-387-
73003-5_2206
Higgins, P., Choi, A., Chen, Y., Fondeur, J., Li, P., & Tian, J. et al. (2009). Biometric
Sensors. Encyclopedia Of Biometrics, 133-133. doi: 10.1007/978-0-387-73003-5_2065
Kozuka, K., Wan, C., & Sato, J. (2008). Rectification of 3D data obtained from moving
range sensor by using extended projective multiple view geometry. International Journal
Of Automation And Computing, 5(3), 268-275. doi: 10.1007/s11633-008-0268-8
Lewis, F. L. (2004). Wireless sensor networks. Smart environments: technologies,
protocols, and applications, 11-46.
Makarov, V., & Potomskii, S. (2015). Erratum to: Performance Factors of a Wireless
Sensor Network of Rectangular Mesh Configuration. Measurement Techniques, 58(10),
1187-1187. doi: 10.1007/s11018-015-0865-1
Schmitt, J. C., & Setlak, D. R. (2000). U.S. Patent No. 6,088,585. Washington, DC: U.S.
Patent and Trademark Office.
Tankard, C. (2011). Advanced persistent threats and how to monitor and deter
them. Network security, 2011(8), 16-19.
Xiao, L., Sun, Z., & Tan, T. (2012). Fusion of Iris and Periocular Biometrics for Cross-
Sensor Identification. Biometric Recognition, 202-209. doi: 10.1007/978-3-642-35136-
5_25
1 out of 15
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.