scholarly journals Mobile Biometrics and their Risks

Hadmérnök ◽  
2020 ◽  
Vol 15 (4) ◽  
pp. 15-28
Author(s):  
Kata Rebeka Szűcs ◽  
Arnold Őszi ◽  
Tibor Kovács

The present article aims to introduce the ways of secure access control, with a special emphasis on  biometric solutions on mobile devices. Apart from secure biometric data storage, which is also a very important aspect of this topic, there are several other  types of threats. On the following pages we provide a short description of the possible risks of  biometric systems. In order to understand the current status and attitude towards biometrics, we introduce our own survey as well.

2013 ◽  
Vol 2013 ◽  
pp. 1-12 ◽  
Author(s):  
Shin-Yan Chiou

Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.


Diagnostics ◽  
2021 ◽  
Vol 11 (6) ◽  
pp. 1067
Author(s):  
Karla Jaimes Merazzo ◽  
Joseba Totoricaguena-Gorriño ◽  
Eduardo Fernández-Martín ◽  
F. Javier del Campo ◽  
Eva Baldrich

Smartphones are becoming increasingly versatile thanks to the wide variety of sensor and actuator systems packed in them. Mobile devices today go well beyond their original purpose as communication devices, and this enables important new applications, ranging from augmented reality to the Internet of Things. Personalized diagnostics is one of the areas where mobile devices can have the greatest impact. Hitherto, the camera and communication abilities of these devices have been barely exploited for point of care (POC) purposes. This short review covers the recent evolution of mobile devices in the area of POC diagnostics and puts forward some ideas that may facilitate the development of more advanced applications and devices in the area of personalized diagnostics. With this purpose, the potential exploitation of wireless power and actuation of sensors and biosensors using near field communication (NFC), the use of the screen as a light source for actuation and spectroscopic analysis, using the haptic module to enhance mass transport in micro volumes, and the use of magnetic sensors are discussed.


Author(s):  
Jiawei Zhang ◽  
Ning Lu ◽  
Jianfeng Ma ◽  
Ruixiao Wang ◽  
Wenbo Shi

Author(s):  
Jameson Mbale ◽  
Manish Wadhwa

Routers interconnect networks of various enterprises, and the more secure the entry or exit points are made, the more robust the security of these enterprises is. These routers become the first direct targets and are vulnerable to security attacks. If these routers are not tightly protected, the attackers get an edge to intrude the system. In order to ensure the security of these routers, Secure Access Control Lists (ACLs) Filtering-Based Enterprise Networks (SAFE-Nets) are proposed in this chapter. In this scheme, routers are configured with Access Control Lists (ACL) that are used to filter in the intended packets and filter out the dangerous malicious packets from network traffic. This consolidates security deployment over the entire network on top of anti-virus software, weak passwords, latent software vulnerabilities, and other related secure measures. This can help network technicians working for various enterprises manage security at low costs.


2013 ◽  
pp. 534-558
Author(s):  
Malohat Ibrohimovna ◽  
Sonia Heemstra de Groot

A personal network (PN) is a network of a user’s personal devices and services, cooperating with each other independently of their geographical location to provide ubiquitous services to the user. PNs can be the producers and consumers of the services, content and resources. They can also export the subsets of their personal resources and services to other PNs. In such cases, PNs may form a group-oriented secure network called a Federation of Personal Networks (Fednet). A Fednet is a temporal, ad-hoc opportunity or purpose driven network of PNs, in which PNs collaborate with each other to share resources and services in a peer-to-peer manner. A Fednet is a pervasive and ubiquitous computing technology that enables the users to enjoy cooperation and promises exciting opportunities for different applications in various fields, such as education, healthcare, entertainment, business and emergency.In this chapter, the authors discuss PN technology expanding on the concept of Fednet. They provide example scenarios for Fednets, showing their potential impact to the quality of life of their users. Furthermore, they present the architecture and lifecycle of a Fednet. They explain the interactions of the main architectural components during its lifecycle and present a framework for the secure access control and management for a Fednet. The framework provides a controlled collaboration of PNs, where each PN controls the access to its resources and services. Finally, the authors provide a brief overview of some of the existing resource sharing group-oriented networks related to Fednets.


Author(s):  
Sukhdev Singh ◽  
Chander Kant

Growth of mobile devices uses has favored the user experience with different digital platforms, from basic activities such as sending messages, phone calls, taking pictures for social networks, email, bank account management, and commerce. These are some examples of daily tasks performed from mobile devices, which makes it essential to provide security of information. Therefore, privacy of stored information has become a main point in the development of mobile devices. This article presents research about the impact that mobile devices have in people's lives and the presence of biometric systems in this kind of device. Papers related with biometrics on mobile devices were examined to find which devices have integrated biometric systems; in addition to identifying biometric features used to authenticate people and find out what mobile platforms were created for. It was found that the smartphone is the device with more biometrics systems, and fingerprints are the most used feature; also, that the Android operating system is the most widely used mobile platform for these purposes.


Sign in / Sign up

Export Citation Format

Share Document