ITC596 IT Risk Management: Biometrics, PETs, and WSN Network Attacks

Verified

Added on  2024/07/01

|14
|2633
|452
Report
AI Summary
This report provides an assessment of IT risk management, focusing on biometrics systems, privacy-enhancing technologies (PETs), and wireless sensor network (WSN) security. It begins with an overview of various biometrics systems such as Iris Recognition, Hand Geometry, and Fingerprint, detailing their advantages and disadvantages. The report then discusses PETs, including metadata with digital rights management, identity management, and encryption, highlighting their role in enhancing data privacy and security within networks. Furthermore, it examines WSN architecture, protocol stack, and potential network attacks like Denial of Service (DoS), Wormhole, and Sybil attacks, along with risk mitigation strategies. This document is available on Desklib, a platform offering a wide array of study resources for students.
Document Page
ITC596
IT RISK MANAGEMENT

ASSESSMENT 2
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Part 2 Answer 2
............................................................................................................................. 2
Part 2 Answer
3:............................................................................................................................ 6
Part 2 Answer 4:
............................................................................................................................ 8
Reference:
................................................................................................................................... 13
List of figure:

Figure 1: Iris Recognition Biometrics system
.................................................................................2
Figure 2: Hand Geometry Biometrics system
................................................................................ 3
Figure 3: Fingerprint Biometrics system
........................................................................................ 4
Figure 4: Wireless network Sensor Node
....................................................................................... 8
Figure 5: Wireless sensor network Architecture
............................................................................9
Figure 6: Protocol Stack of WSN
.................................................................................................. 10
List of Table:

Table 1: Iris Recognition Biometrics system Advantage and disadvantage
....................................3
Table 2: Hand Geometry Biometrics system Advantage and disadvantage
...................................4
Table 3: Fingerprint Biometrics system Advantage and disadvantage
...........................................5
1
Document Page
Part 2 Answer 2
Biometrics word creation forms the Greek word which meaning identifies the user

characteristics, behaviour, and physical activity. This is used for the authentication process in

the organization. Identification system and authentication system are another names of the

biometric system.
It is two types such as Physiological Biometrics and Behavioural Biometrics.
Iris recognition, Face recognition, Hand Geometry, voice and signature recognition, and

fingerprinting are the common example of the biometric system. There is defined various types

of
Biometrics system for example
Iris Recognition:
it is a Biometrics system that used to recognize the user with the help of
pattern
techniques. This technique is used in the mathematical process to match the iris of one
person eyes to another person's eyes. There is represented the block diagram of the Iris

Recognition Biometrics system. it used the 750mm wavelength light to search out the image

which is placed near the infrared. This allows chunking the light reflection from the eye’s cornea

and catching the picture that highpoints the iris assembly. It contained 3 phases such as

Picture capture
Trace image and the Iris optimization
identical or Storing the biometric template (Bhalerao, 2013)
Illustration:
ATM Application
2
Document Page
Figure 1: Iris Recognition Biometrics system
Source: (Bhalerao, 2013)

Table
1: Iris Recognition Biometrics system Advantage and disadvantage
S.No

.

Advantages
Disadvantages
1.
Highly threatened due to internal organ Distorts inelasticity
2
encoding and Decision-making is a Traceable
process

Invisible lighting

3.
externally visible Expensive technology.
Hand Geometry:
It is a biometric system that is recognised by the person according to their
hand’s outline. It is depended on the hand geometric shape. It takes different types of

information such as fingers length and width, size of a palm, and interplanetary in between the

knobs. There is shown the block diagram for a matching process of Hand Geometry system that

used the scanner and CCD camera to recognise the person. This system is able to notice the

succeeding facts in the person's hands:

Wrist point of the hand
Finger-distance and tips in between the fingers of the hands
3
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
“finger-end points” which is placed each finger
2 finger-lines of every finger of the hand ( four fingers)
Points of “palm-with-reference” and Side-points("Biometrics Quick Guide", 2014)
Illustration: Exam application

Figure
2: Hand Geometry Biometrics system
Source: ("Biometrics Quick Guide", 2014)

https://www.tutorialspoint.com/biometrics/biometrics_quick_guide.htm

Table
2: Hand Geometry Biometrics system Advantage and disadvantage
S.No

.

Advantages
Disadvantages
1.
Collection of the data is an easy
process comparison than
fingerprint
system

Not suitable for the
embedded systems
because it needed a larger database to

save information.

2
It is a user-friendly and low-cost system It is not a good technique for the
growing persons

3.
Intrusion is fewer This is not contained unique data
Fingerprint:
it is a biometrics system that contained information on the fingerprint image. With
the fingerprint image, it contained different types of information such as minutiae, furrows, and

4
Document Page
edges framework with sideways, arches, loops, and whorls information. This is a type of
Physiological Biometrics system that uses transducer technology(Unar, Seng, & Abbasi, 2014).

Figure
3: Fingerprint Biometrics system
Source: (Unar, Seng, & Abbasi, 2014).

Illustration: Mobile system

Table
3: Fingerprint Biometrics system Advantage and disadvantage
S.No

.

Advantages
Disadvantages
1.
This is used for the historical
process to identify the person

It depends on different types of factors such

as
environmental, age, and race factors.
2
It is a low-cost system and offers
the
sensible performance.
easily sidestep, dirt, and Grime

3.
Unique and permanent technology There is a suggestion with Law
implementation.

5
Document Page
Part 2 Answer 3:
Privacy-Enhancing Technologies is known as the ICT system that works on the information

privacy, data protection, and network security with the help of the minimising or excluding

private data. PETs avoid the unauthorized or unnecessary operation on the private data of the

network. It concentrated information system (IS) functionality which is occurring the data loss

in the network. WSN networks used the PET for recognized the human right in the network as

either implicitly or explicitly manner. In the WSN Network, this is gathering of the technologies

that appliance certified privacy integrities in order to increase and protect the privacy of the

info technology. It controls online service providers, and data transmit.

There is defined the Privacy-Enhancing Technologies that provides the network security, data

privacy and data integrity such as

1.
Metadata with the Digital rights management: this is a novel PET technology. There is
used the Metadata which represents the info about the data. It also contained a

framework that recitation the semantics for the data. This process is used for the DRM

(digital right management) for the data protection in the network. PET technology is

successfully worked on the submission data in the network. It is easily differentiated

between personal information, awfully sensitive data, and general data. DRM is PET

technology that offers the high control on the network users concluded their private

info. This also offers the ACT in the network such as audibility, Controllability, and

Transparency that are represented ICA term (Integrity, Confidentiality, and Availability).

ICA is a represented privacy term in the network. As related to other PETs technology,

metadata is moderately easy to the appliance the collection of organized facts and can

be extra effective and efficient

For illustration:
Whatsup, Facebook, Instagram
2.
Identity Management: the Online transaction is a common process for every
organization. They want to recognize their customer so there is used in the

authentication process. During the authentication process, there is used the Identity

Management (IM) that built a trust in between agencies, organizations, and individuals.

6
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
This process used three phases. In the first phase, there is the creation of an identity
that can need the discrete details such as a select certain password for the confirmation

procedure to recognize the details. The second phase is using the identification

nevertheless previously using, identifications are compulsory for the verification

procedure. The third phase is identity annulment which is second-hand to diminish the

distinctiveness theft.

For illustration: Facebook, client-server application,

3.
Encryption: Encryption is also known as the PET technique (Privacy-Enhancing
Technologies) which provides the data security. It used the data encryption and

decryption process for the data protection. It converted plaintext data into an encoded

data with the help of encryption key. This data is decoded with help of decryption key

and same encryption key. Encryption process supports the end-to-end data protection

in the network. it also provides the data security during data transmission process.

Symmetric and asymmetric cyphers key are used for the encryption process and

deception process. There is also a used hash function to the completed encryption

process. Authentication, data integrity, and non-repudiation are the major benefits of

the encryption PET process. Communication, digital certificates, and file systems are

some another illustrations of the encryption
.
For illustration:
Services Administration system.
7
Document Page
Part 2 Answer 4:
WSN means as Wireless Sensor Networks that works on the network sensors with the help of

the wireless communication. It is important to network because WSN increases the monitoring

capability in unreachable locations and remote where is not possible to install the wired

network infrastructure. This network worked medical applications, disaster relief and

prevention, military observation, logistics tracking, environmental monitoring, intelligence

gathering, and navigation. WSN network contained a limited function with low-cost hardware

such as the sensor node, and node operation with long time periods. It also contained a

different type of problems such as the multi-hop routing, self-configuration, medium access

control, and network discovery. It is a disturbed network that makes efficient protocol design

for the network (Gascón & Yarza, 2011).

Figure
4: Wireless network Sensor Node
Source: (Gascón & Yarza, 2011)

Architecture of WSN

WSN Architecture contained a wired and wireless device which are showed in the below

diagram. This Architecture works on the OSI model principle. It is a three layers Architecture

such as client-side layers, server side, and sensor Mote network side. These sides are managed

by the cross layers which contained three sides. task management, power management, and

8
Document Page
mobility management are presented as cross layers of the WSN Architecture. All these layers
are working together to achieve the high-level efficiency in the network (Nayak, 2016).

Figure
5: Wireless sensor network Architecture
Source: (Nayak, 2016)

Protocol Stack of WSN

WSN network contained the Protocol stack which provides a front layer and backend layers.

Power management, Task management, and mobility management are the backend layers of

the Protocol Stack. The transport layer, application layer, network layer, physical layer, and data

link layers are working as a front layer in the Protocol Stack.

9
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 6: Protocol Stack of WSN
Source: (Saad, 2013)

S.no.
Layer explain use
1
Transport layer This layer provides the
connectivity with another

WSN network. In the

network, it manages loss

recognition, reliability,

delivers congestion

avoidance and loss recovery.

Data flow management

2.
Application layer Network traffic management
is done by the Application

layers. It also gathered

information different type of

source and converts useful

information.

Changing or editing in the

administrator part of the network

with help of SMP, TADAP, and

SQDPP protocols

3
Network layer Buffers, sensor, partial
memory, and power

conserving are the different

Data routing which gets from the

WSN network’s transport layer

10
Document Page
types of tasks which are
managed by the network

layer.it also used the reliable

lane and redundant lanes for

the routing management.

4
Physical WSN network contained a
physical layer that supports

star topology and peers to

peer for the CSMA/CA. it also

works on communication

range, low cost, and density.

modulation, Frequency selection,

data & signal encryption, and

frequency carrier,

5
Data link layer It provides the linking
between the network layer

and physical.

error control, Multiplexing data

streams, detecting data frames,

and MAC (media access control)

(Saad, 2013)

WSN Network Attacks:

In this section, I have explained the different type of WSN Network Attacks such as

DoS: DoS Means as Denial of Service. It is the type of attack on the WSN network which
attacked during the data transmission process. It interrupts at the receiving side and

occurred noise, collision, and interference. With the help of this attack, network attacker is

able to access the network access points, server application, and network infrastructure.

Wormhole attack: Wormhole is a type of attack. In this attack, the attacker is monitoring the
packet (which carries useful information of the network) form the source location to

destination location. There is no needed to network sensor compromise. So it is easily

implemented in the network. When the network sensor is introduced then it provides

necessary information. The attacker used this information to implementation. There is

created a wormhole in between data (attacker attacks) and the sensor node.

11
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]