Biometrics are gaining popularity as an added layer in many private and business security systems. Because they are unique identifications that reflect your body and behavior it could appear to be to be guarantee. However biometric authentication has prompted many to be cautious about use of biometrics as an independent authentication method.
Modern cybersecurity focuses in minimizing risk of this useful security option Traditional passwords have for long time been an area of vulnerability in security solutions. Biometrics seeks to solve this problem by connecting proof of identity to body and our behaviour patterns.
In this piece well go over basic principles of cybersecurity using biometrics. In order to help you understand basics into simpler terms well address some commonly asked biometrics related questions:
- What exactly is biometrics?
- What are biometrics?
- What exactly is biometric scanner?
- What are dangers of biometric security?
- What can we do to improve security of biometrics?
Lets begin with fundamentals:
What is Biometrics?
To get brief biometrics explanation definition of biometrics is that they are biological measures (or physical traits which can be used to distinguish individuals. Examples include face recognition fingerprints as well as retina scans are just few types of biometrics however theyre not only known choices.
Researchers have claimed that shape of an ears shape how someone walks and sits and sits unique smell of their body as well as veins on hands of person as well as facial expressions are also distinctive markers. biometric traits are further defined by these characteristics.
3 Types of Biometrics Security
Although they may have different purposes biometrics were frequently used for security purposes and they are generally classified biometrics in three categories:
- Biometrics and biological biometrics
- Biometrics with Morphological emoji
- The use of biometrics for behavioral purposes
Biometrics that are biological utilize traits on molecular and genetic levels. This could be feature such as DNA or blood. These could be analyzed through test of fluids in your body.
Biometrics that are morphological are based on shape in your physique. Physical traits such as shape of your eyes fingerprints or appearance of your face could be recorded for security scanners.
Biometrics that are based on behavior depend upon patterns specific for every person. way you move talk or even write on keyboard may indicate identity of you if these patterns are recorded.
Biometric Security Working
Biometric identity plays significant importance in everyday security. Physical attributes are generally specific and individual and can be individualized even for twins. biometric identification of each person is able as replacement or even enhance password security systems on smartphones computers restricted access buildings and rooms.
When biometric data has been retrieved and stored it is stored to match against future attempts to gain access. In most cases it is protected and saved inside device or remote server.
Biometric scanners can be used as hardware to take biometric to verify of identity of an individual. They match stored database in order to allow or deny access to system.
Also biometric security is when your body is your “key” to unlock your access.
Biometrics are widely used as result of two main advantages:
- Use with ease: Biometrics are always in your pocket and are not deleted or lost.
- It is difficult to impersonate or steal: Biometrics cant be used to steal passwords just as key could be.
Although these systems may not be completely perfect they do hold plenty of potential for future of security.
The History of Biometrics
In 2nd century B.C. Chinese Emperor TsIn She had been already authenticating seals using use of fingerprints.
Fingerprints were first utilized for commercial purposes during 1858. William James Herschel British administrator from India.
After being given task of creating roads in Bengal and rest of Bengal he made his subcontractors sign contract documents with their fingers.
It was primitive form of biometric authentication. It was also it was guaranteed way of locating their users quickly should they fail to comply.
In late 19th century Bertillon was French official in police force made first steps towards field of scientific police.
The scientist used measurements using physical evidence of anatomical traits specific to determine if criminals are reoffending that were often effective.
- French police from Paris (prefecture of police) started this program in 1888 by establishing Forensic Identification Unit (mug shot and anthropometry). Four prints were introduced in 1894. Ten more prints were added by 1904.
- The U.K. Metropolitan Police first began using biometrics for identification in year 1901.
- Within U.S. it was started by New York police in 1902 as well as by FBI in 1924.
The detection of distinctive designs (behavioral biometrics)is also not any new at all. Telegraph operators who used Morse code could identify one another by how they sent dots and dash signals. When it came to World War II allied forces utilized same technique to determine senders identities and authenticity of messages that they received. This is fundamental basis of biometric systems: identification of person based on specific features.
Biometrics is growing rapidly and is especially gaining popularity in realm of identification documents. majority of time it combines security techniques like smart I.D. cards as well as chips (for electronically enabled passports).
Examples
Here are some typical samples of biometric security
- Voice Recognition
- Fingerprint Scanning
- Facial Recognition
- Iris Recognition
- Heart Rate Sensors
The practical application of biometric security has seen successful applications across variety of industries.
Advanced biometrics can be used to secure sensitive documents and valuables. Citibank has already implemented voice recognition. Similarly British bank Halifax has been testing use of heartbeat sensors to confirm identity of customers. Ford may even consider installing biometric sensors into automobiles.
Biometrics are integrated into e Passports across globe. For instance in United States e passports have an embedded chip with an image of digital fingerprint face or iris aswell being protected by technology to prevent that card from getting readas well as data being skimmed by non authorized data readers.
While these security devices are being in use were watching advantages and disadvantages play out live.
Are Biometric Scanners Safe? Improvements and Concerns
Scanners for biometrics are becoming more advanced. There are even biometrics embedded in security devices for phones. As an example facial recognition feature on iPhone X projects 30000 infrared dots on persons face for authentication using pattern matching. risk of mistaken identity based on fingerprints on iPhone X biometrics is one out of million as per Apple.
The LG V30 smartphone combines facial and voice recognition as well as fingerprint scanning. It also stores your phones data to provide better security. CrucialTec which is maker of sensors has connected heart rate sensor with fingerprint scanners in order to create two step verification. This ensures that fake fingerprints arent employed to get access to companys systems.
The issue lies in fact that scanners using biometrics which include facial recognition technology are susceptible to being manipulated. Researchers from University of North Carolina at Chapel Hill took photographs of twenty volunteers via social media and then made 3 D representations of faces. They were able to break into five of security systems they tried.
The evidence of fingerprint cloning is all around. case study from an event at Black Hat cybersecurity conference demonstrated possibility of fingerprints being duplicated with confidence in just 40 minutes using only $10 of substance just by creating fingerprint on mold as well as candle wax.
The German Chaos Computer Club spoofed iPhones TouchID fingerprint reader in just two days after its launch. club simply took an image of fingerprints on glass and then utilized it to open 5s iPhone.
Identity & Privacy Concerns
Biometric authentication is convenient Privacy advocates are concerned security of biometrics could compromise your privacy of individuals. There is concern that data about individuals can be gathered easily without consent.
The use of facial recognition has become feature of daily routine in Chinese cities. Its utilized for purchases that are routine as well as London is renowned for its CCTV cameras. In present New York Chicago as well as Moscow are connecting CCTV cameras of their cities with databases for facial recognition to assist local police tackle crimes. In addition Carnegie Mellon University is working on camera to look at iris of individuals who are in crowds at 10 meters away.
In year 2018 facial recognition was added to Dubai airport. Passengers are filmed by more than more than 80 cameras while they travel through tunnel that is an underwater virtual.
The cameras for facial recognition are operating in various airports around globe such as those in Helsinki Amsterdam Minneapolis St. Paul and Tampa. data that is collected must be kept somewhere causing fear of continuous surveillance and misuse of information…
Biometric Data Security Concerns
The issue is that databases containing private information can be target for cybercriminals. In case of example when U.S. Office of Personnel Management was breached in 2015 cybercriminals escaped using signatures of 5.6 million employees of government and made them liable to identity fraud.
Data stored on biometrics in devices such as that of iPhones TouchID or Face ID is thought to be safer as compared to keeping it on service provider in event that data is protected.
This risk is comparable to those of password database where hackers could access database to steal data if its not adequately protected. However consequences differ significantly. If passwords are stolen it is modified. Biometric information when contracted will remain same.
Ways to Protect Biometric Identity
In order to protect privacy and security extra security measures must be implemented when using biometrics.
The difficulty of unauthorized access increases as systems need multiple ways of authentication. This includes live detection (like blinking) as well as matching encoded sample data with users in secure domains.
A few security systems include other features like gender age and height in biometrics to fight cybercriminals.
The unique ID authority of India Aadhaar can be great illustration. It was launched in 2009 and is multi step authentication system combines finger prints iris scans 10 fingers and facial recognition.
The information is tied to an individual identification card which is given to every one in Indias 1.2 billion citizens. In near future this card will become mandatory for all who use social services within India.
Biometrics are great substitute for usernames in an authentication method that requires two factors. It includes:
- Something you are (biometrics)
- You have something you own (like hardware token) or thing youre familiar with (like an account password)
Two factor authentication is potent combination particularly as IoT devices multiply. Through layering security secure internet devices they become less prone to breaches of data. Additionally using an online password manager to save all passwords that are traditional can offer user additional protection.