365 - Article1713938876
365 - Article1713938876
*
Corresponding author: Sampath Talluri, Department of Computer Science, Western Michigan University, 1903 W Michigan Ave,
Kalamazoo, MI 49008.
Citation: Sampath Talluri (2024) Cybersecurity in Biometric Authentication. Nov Joun of Appl Sci Res, 1(2), 01-05.
Abstract
Biometrics is the study and application of unique individual features, whether physical or behavioral, integrated for
measurement or analysis to ensure security. Fingerprints, iris patterns, facial features, speech patterns, hand geome-
try, and behavioral aspects such as typing speed, rhythm, and stride are examples of such characteristics. Biometrics
are most typically employed for identification and authentication because of their capacity to reliably distinguish
individuals based on their unique characteristics. Because biometrics may make many systems and procedures more
secure, they are an absolute must-have for cybersecurity professionals. Using biometrics for identity verification and
multi-factor authentication can assist with defense-in-depth, commonly known as layers of security.
Keywords: Cybersecurity, Biometric Authentication, Fingerprints, Iris Patterns, Facial Features, Speech Patterns, Hand Geometry
Introduction When it involves securing our on-line world from the steady
Background danger posed by way of hackers and different antagonistic ac-
With the increasing digitization of the society and their daily tors, conventional protection approaches are inadequate. Bio-
lives, there has never been a more critical time in the society for metrics enhances our security features by leveraging wonderful
integrating cyber security [1]. With the increased advent of dig- behavioral and physical features.
italization, the cyber threats are also increasing on a high pace.
Cybercriminals and hackers are always honing their craft to ex- In a global where personal identity numbers (PINs) and pass-
ploit new holes in the systems and steal sensitive information. words are the norm, biometrics offer a novel solution. Unlike
They are continually expanding their powers. Biometric cyber conventional authentication strategies that rely upon passwords
security outperforms more traditional, ineffective security solu- or protection tokens, biometrics leverage a person's unique
tions. physiological or behavioral capabilities. This is an assessment
of traditional identification verification approaches.
Biometric solutions that use cutting-edge biometric technology
have made it easier than ever before to protect digital assets [1]. Despite its several benefits, biometric generation does have
Voice recognition, fingerprint scanning, and facial recognition positive downsides. Researchers and builders are continuously
are just a few of the unique biological and behavioral character- improving biometric technologies to address flaws and growth
istics that these systems use to verify identities and grant access. security. Adding biometrics to multi-element authentication
Bad actors' constant attacks on cybersecurity render traditional (MFA) systems that already employ different authentication ele-
security processes ineffectual. Biometrics enhances our securi- ments, which include passwords or tokens, improves safety and
ty measures by leveraging distinct behavioral and physical fea- reduces the chance of potential risks. Cybersecurity is presently
tures. doing research and improvement in a whole lot of fields, along
with biometric statistics, privateness and information security,
Biometrics is a means of precisely identifying a person primar- and other associated issues. To resolve those issues and maintain
ily based on physiological and behavioral factors which include the integrity and secrecy of the biometric authentication pro-
their face, fingerprints, voice, or different traits. On the other cedure, efforts are ongoing to improve encryption, maintain a
hand, “Cybersecurity” refers to the process of defensive data steady biometric information garage, and improve anti-spoofing
systems, networks, records, and devices from net-primarily mechanisms.
based attacks [2].
Objectives
• To develop an understanding of the notion of cyber security
and biometric authentication.
• To highlight the factors of biometric authentication.
• To outline the principles of cyber security.
• To draw on the relationship between cyber security and bio-
metric authentication.
Research Questions
• What is the idea of cyber security and biometric authenti-
cation?
• What are the elements of biometric authentication? Figure 1: Biometric System [Source: Sheikh and Majid, 2019]
• What are the fundamentals of cyber security?
• What is the link between cyber security and biometric au- Face features such as nose distance, lips, ears, facial length, and
thentication? skin tone are used for verification and identification. Fog, eye-
wear, aging, and other factors may all reduce accuracy. Patterns
Research Rationale detected in the eye are unique and may be used for both identifi-
Biometrics refers to the use of physical and behavioral charac- cation and recognition. Devices for testing the retina are expen-
teristics to identify individuals. Fingerprints, facial traits, voice sive; hence, they are less common. Diseases like cataracts may
patterns, iris/retina scans, and even typing rhythm are examples affect iris patterns.
of such qualities. Unlike passwords or tokens, which can be
readily lost or stolen, biometrics are unique to each person, mak- Impact on Business Efficiency, Security, and Compliance
ing them difficult to counterfeit or copy. Biometric identity plays Biometric security refers to the use of biometric information for
an increasingly important part in our daily security. Physical identification, access control, and authentication. Biometric data
characteristics are usually stable and unmistakable, especially is recorded by hardware components such as cameras or finger-
in the case of twins. Everyone’s unique biometric identification print scanners and then scanned and algorithmically compared
might be used to replace or supplement password systems for to information stored in a database [5]. If the two pieces of data
computers, phones, limited access rooms, and buildings. match, the identification is verified, and access is granted.
Significance of the Research The biometric system is vulnerable to several harmful assaults
Fingerprints are unique to each person. They may be quantified that may be carried out by various types of threats. Malicious
in many ways. The minutiae-based assessment uses graphs to assaults on a biometric machine pose a security concern and re-
compare ridges, while image-based measurement compares duce the system's performance. There are various limitations to
similarities between an individual's finger image and fingerprint biometric systems, such as spoof attacks, noisy sensor data, in-
photos already in the database. It offers a high level of securi- terclass variations, and interclass similarities.
ty and is used for both identification and verification. Howev-
er, fingerprints may be altered due to aging or disease/injury. There are almost 20 different types of biometric data, including
Common applications include authentication on mobile devices fingerprints, face, and voice. Each sort of biometric information
and identity in the workplace. Physical biometrics assesses in- may be hacked in a variety of ways. Installing a skimmer on
trinsic physiological characteristics such as the anatomy of the ATMs or other biometric scanning equipment is a common and
eye, face, hand, or voice. For example, iPhone biometrics al- long-standing method of obtaining fingerprints. It scans finger-
lows you to unlock your phone using your fingerprint. When you prints and creates phony reproductions that may be used to gain
walk through a scanner at the airport, the system compares your access to devices or sensitive data.
scanned face structure to the data in your passport.
Framework for HRMS's and IAM's Successful Integration
Literature Review of deepfake technology has made biometric hacking far more
Factors Affecting the Integration sophisticated while also making it more accessible to hackers.
Biometric security is a kind of security that uses behavioral and By launching a biometric spoofing attack, hackers may breach
physical characteristics to identify individuals. It is the most ac- a protected system by using users' selfies, images, and videos
curate and reliable physical security solution for identity verifi- from social media to create bogus identifiers such as face, voice,
cation. Biometric authentication indicates that individuals may or even fingerprints.
be accurately recognized based on their inherent behavioral or
physical characteristics. Biometrics are often used in securi- "While we are the owners of our own faces and voices, we are not
ty systems where physical protection is required and theft is a the only ones with access to them," said Warmenhoven. "People
problem. These biometric security solutions store and employ have left so much biometric data throughout the years of being
physical characteristics that are consistent over time, such as active social media users that the present capabilities of artificial
The Need
Every day, it seems that there are more stories about data breach-
es affecting both large and small businesses. As these incidents
continue, businesses are realizing that they must immediately
implement additional security measures. Companies are gradu-
ally moving away from passwords in favor of biometric authen-
tication technologies, without fully considering all the implica-
tions. While there are apparent advantages to biometrics, it is
critical to thoroughly weigh each option.
Conclusion
Biometric technology, which includes fingerprint ID, retinal
scanning, and face recognition, uses unique human behavior-
al or physical characteristics and indicators to verify identities
and authenticate transactions. Passive speech recognition, also
known as AI-based conversational biometrics, may detect an
individual's usage of words, language, and grammar. In other
words, biometric security uses your body as the "key" to open
your access. Biometric IDs are unique and impossible to forge,
making it very unlikely that an unauthorized user would get ac-
Figure 3: Data Spoofing Attacks [Source: Kamble, et al., 2020] cess to sensitive information. Even if a biometric template is
produced, it cannot be used correctly since it needs the physical
Pitch, voice modulation, and tone are among the variables exam- presence of the individual.
ined. Security is medium, and since people' voices are similar, it
is frequently used for verification. The accuracy may be affected Biometrics are identification methods that use an individual's
because of noise, ageing, or illness. physiological and behavioral attributes, such as face, fingerprint,
voice, or other characteristics, to precisely identify them. De-
DNA is unique and remains constant throughout life. Thus, secu- pending on the use case and criticality, some systems employ
rity is good and may be used for both identification and verifica- biometrics as a form of authentication, while others use it as
tion. Eye identification uses the unique pattern of an individual's needed. Regardless, biometrics has improved security. Most or-
iris or retina to identify them. Because this kind of biometric ganizations choose the latter since it requires both something
authentication is more complex to deploy, it is less common than you know/have (passwords, authentication devices) and some-
the other biometric authentication options. To be accurate, an iris thing you are (biometrics) for authentication. This provides an
scan needs an infrared light source, an IR-capable camera, and additional layer of security and ensures a person's precise iden-
little light pollution. Despite its limitations, it is one of the most tification. Consequently, it reduces infractions. For example,
accurate biometric identification systems known if certain pa- some very secure server rooms use face recognition in conjunc-
rameters are satisfied. Eye recognition is often used in contexts tion with a password to allow access.
where security is crucial, such as nuclear research facilities etc.
Recommendations
Challenges, Benefits, and Best Practices A biometrics degree combines skills from a variety of disciplines,
Integrating IAM with HRMS has captured and mapped many including biology, computer science, engineering, statistics, and
biometric data, and it is saved to be matched with future attempts electrical engineering. Cybercrime is becoming more prevalent
at access. Most of the time, this data is e-encrypted and stored as internet technology advances. The cyber security sector has
on the device or a distant server. Biological material, such as grown significantly in recent years. As the level of Internet espi-
DNA extracted from blood, saliva, or hair samples, is very ac- onage and terrorism rises around the world, so does the demand
curate and is often used as evidence in criminal trials. However, for cyber security experts. Due to the increased complexity of
biological biometric analysis is currently too slow to be used cybercrime, the training required to enter the field becomes more
for security control in most cases. Behavioral biometrics mea- stringent as the number of cybersecurity jobs available grows.
sures differentiating characteristics expressed in your external Recent high-profile hackings of government and commercial
activities. Everyone's handwriting differs, and everyone writes sector websites have prompted the training and certification of
on a keyboard and walks differently enough that artificial intel- additional security staff.
ligence can accurately identify people based on those character-
istics. Surfing behaviors and the specific gear used may even be For decades, governments have collected biometric data, starting
combined to generate a distinct surfing fingerprint. with paper records of basic physical features like eye color, hair
color, and height. For more than a century, police have used fin-
Biometric scanners are pieces of technology that collect biomet- gerprints collected at crime scenes to build databases of suspects
ric data for the purpose of verifying identification [11]. These and offenders. At the start of World War, I, Britain and other
scans compare the stored database to allow or prohibit access to countries started issuing passports with basic physical identifiers
the system. Global cybercrime is expected to generate $8 trillion to allow governments to screen immigrants and differentiate be-
Copyright: ©2024 Sampath Talluri. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits
unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.