5 research outputs found

    Biometric Authentication Based on Electrocardiogram

    Get PDF
    The life of modern society is impossible without trust. To ensure trust in the digital world, various encryption algorithms and password policies are used. Passwords are used in a variety of applications from banking applications to email. The advantages of passwords include ease of use and widespread distribution. Forgotten password can be restored or changed. Password weaknesses are largely related to the human factor. Many users use passwords such as “1234” or “qwerty,” and they are also willing to share passwords with friends and colleagues. Vulnerabilities are also associated with software and hardware manufacturers. Many Wi-Fi routers preset very simple passwords, which many users leave unchanged. There are questions for manufacturers of mobile applications. Due to the imperfection of their software, personal data of users often leak. Due to the prevalence of social networks, new authentication methods have appeared. On many websites, you can use accounts from Facebook  or Gmail.com for authentication. If hackers manage to break into large IT vendors, then millions of accounts will be leaked. Many common password problems can be overcome with biometric identification. In particular, biometric data are very difficult to fake; they usually do not change over time. Widespread methods of biometric identification, such as fingerprinting, retina recognition, and voice recognition have various vulnerabilities unfortunately

    Biometrics for internet‐of‐things security: A review

    Get PDF
    The large number of Internet‐of‐Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric‐based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric‐cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state‐of‐the‐art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward‐looking issues and future research directions
    corecore