Tuesday, May 5, 2020

Fast and accurate palm prints recognition - Myassignmenthelp.Com

Question: 1. Research into the different types of biometric systems which are currently available for access control systems. 2. Other than security concerns, privacy is considered a core value and is recognized either implicitly or explicitly as a fundamental human right. Privacy-enhancing technologies (PETs) can be defined as technologies that enforce legal privacy principles in order to protect and enhance the privacy of users of information technology. Research and discuss three PETs which can be used on the Internet. 3. Wireless sensor networks (WSNs) can be described as a network of nodes that makes a collaborative effort in sensing data around its periphery and its surrounding environment. Research into the area of WSNs and understand the WSN architecture and protocol stack. Discuss three different types of threats and vulnerabilities which can be used to attack the WSN. Give your recommendations on how the threats and vulnerabilties can be mitigated for the WSN. Answer: Answer 1 Biometric system is a technology-based system that uses some distinct information of a person to identify that person. These systems mainly rely on a specific data or biological traits of a person. The statistical analysis of peoples physical and behavioral characteristics is used as an identity of a person. These systems control the access of the restricted areas or systems by allowing only the authorized person to access the system or the area. Biometric access control systems ensure that right level of security is enforced within a specific system or place. The components of the biometric system include a metal oxide semiconductor or a charged coupled device for some particular systems (Banerjee Woodard, 2012). A biometric access system helps to transfer a biometric trait of a particular person in electrical signal that helps in identifying a person. The biometric access control system is mainly of two types, physiological and behavioral biometric system. The physiological biomet ric system consists of fingerprint recognition, face recognition, iris recognition, voice recognition, palm print recognition, gait recognition and so on. Out of these, face recognition, palm print recognition and gait recognition are discussed in the next section. Face Recognition Face recognition captures the digital image of the person and verifies the identity of the person by comparing and analyzing the different patterns of the image. This is one of the most commonly used biometric systems for security (Beveridge et al., 2013). The data of the nodal points of a digital image is captured, which is then used for verification. The advantages and disadvantages of face recognition are as follows- Advantages The advantages of using face recognition biometric system are as follows- It is a user-friendly biometric recognition system It is one of the most inexpensive techniques of verifying the identity of a person. It is a non-contact technology, as cameras are used for collecting the necessary information for identifying a person. Offers high speed identification in comparison to other biometric system Disadvantages The working principle of the facial recognition algorithm is largely dependent on the quality of the image. The relative angle of the targets face largely influences the recognition score. It requires a significantly larger storage space. Palm-print Recognition Palm print recognition is another biometric access control system that makes use of a scanning device to process an image data of a users palm and compare it with a stored record (Cappelli, Ferrara Maio, 2012). The advantages and disadvantages of palm print recognition are as follows- Advantages The advantages of Palm print recognition are as follows- The palm area is much larger and therefore it helps in capturing and analyzing the features of human hand more distinctively as compared to a fingerprint. Palm print recognition system can be easily integrated into other systems and devices. Disadvantages The disadvantage of palm print recognition is as follows- The system requires a large surface area and therefore, the entire device becomes larger in size. This increases the cost of the system as well. Gait Recognition This is a biometric method that deals with unique biological and behavioral characteristics of a user such as fingerprint or face. It is s systemic study of human motion and makes use of instruments in measuring the body movements and body mechanics. The advantages and disadvantages of gait recognition are as follows- Advantages The advantages of gait recognition are as follows- It is a contact less method as a gait recognition system can recognize a person from a distance Effective in use even in low-resolution image It is a non-invasive biometric technology Disadvantages The disadvantages of gait recognition are as follows- It may not work properly if a person changes or modifies its style of motion Even the surface of motion largely influences the gait recognition system. Answer 2 Privacy enhancing techniques refers to standardized methods of protecting the privacy of the stored data over internet. It considerably helps in protecting the privacy of the online users. It enforces legal privacy principles for protecting and enhancing the privacy of the users (De Cristofaro Wright, 2013). The three different Privacy Enhancing Techniques that can be used on internet are discussed below- Email Anonymity The email anonymity systems ensure that a particular email is sent without revealing the personal information and identity of the user. Use of remailer is prominent in achieving the email anonymity (Rainie et al., 2013). The working principle of the remailer is that, when a user sends an email, it at first goes to the remailer. The remailer in turn strips off the identification information of the user and re-mails the message to the intended recipient (Froomkin, 2015). Type-III remailer is an advanced remailer that provides efficient protection against the replay attacks. Interactive Anonymity With the advent of technology and internet, real time online interaction is increasing as well. An attacker can intercept these communications thus leading to the information loss or modification of the information (Larsson et al., 2012). An information can be modified during its transmission. Different internet applications such as, remote login and voice over IP posses significant threat to data privacy. In order to eliminate such risks, different systems are implemented over the years that provide practical security and privacy to the users. The examples of different systems that maintains the privacy of the of the users data over internet includes use of onion routing, freedom network, Java Anon Proxy, Tor and so on (Li et al., 2013). Communication Privacy Systems The communication privacy systems ensure that the identity of a user communicating over internet is kept private. The aim of this Privacy Enhancing Technique is to keep any information flow private from the third parties. Different techniques are applied to protect the information if a user wishes to keep the contents of a particular communication private (Wessels et al., 2012). Examples of different communication privacy systems include use of SSL and TLS, off the record messaging and so on. SSL or secure socket layer protocol is a privacy enhancing technology in which the web browser by default encrypts all the web requests while undergoing a communication with an SSL web server. TLS is the later version of SSL, while its application is similar to SSL (Bhargavan et al., 2013). One of the most striking features of SSL is that, no human intervention is needed for encryption. Off record messaging on the other hand, is a technology to protect the contents of the instant messaging and communication over the internet. This PET system encrypts all the instant messages so that no third party can access the information. Off record is used by many communication applications such as iChat and Trillian. Apart from these, there are other different privacy enhancing techniques such as private payments and use of anti phishing tools further helps in protecting the privacy of data over internet. Answer 3 Wireless sensor network can be termed as a network of the spatially distributed devices that are interconnected with each other. It is used for providing a wireless connection to the different devices. Sensors are used to monitor the physical and environmental conditions of the sensors. WSN consists of different base stations and nodes or the wireless sensors. The different layers of WSN protocol stack include application layer, transport layer, network layer, data link layer and physical layer. The different types of threats on which the WSN network is exposed to are as follows- Spoofing Attack Spoofing is one of the common attacks in the wireless sensor networks. It makes use of a malicious program disguised as a legitimate program in order to gain an illegitimate advantage. This as a result can corrupt the network traffic extensively (Singla Sachdeva, 2013). Furthermore, continuous alteration in messages can result in loss of data packet during its transmission. Sybil Attack Sybil attack is another prominent attack in the wireless sensor network. There are cases where the sensors of a particular network might need to work together. In such cases, the entire task is distributed into a number of sub tasks (Venkatraman, Daniel Murugaboopathi, 2013). Presence of a malicious node in the network often tunnels the information or data to a complete different location. Network Flooding It is often seen that a malicious code present in a WSN can generate a large number of useless traffic thereby flooding the entire network. This causes congestion in the network leading to the exhaustion of the nodes. This attack is much similar to denial of service attacks. Apart from these, there are certain other threats and vulnerabilities in WSN. These include sinkhole attack, node replication attack, wormhole attack and so on. The threat mitigation techniques for these attack is discussed in the following section. Threat Mitigation The different thereat mitigation techniques that can be employed in order to ensure a safe operation of wireless sensor network are as follows- Only the authorized nodes are allowed to communicate over the network. The attack can be avoided by verifying the identity of the different nodes of a WSN by a trust worthy node. The flooding attack can be prevented by limiting the number of requests a node can handle in a set amount of time. Use of a proper intrusion detection system in the network can help in identifying the presence of malicious nodes (Alrajeh, Khan Shams, 2013). References Alrajeh, N. A., Khan, S., Shams, B. (2013). Intrusion detection systems in wireless sensor networks: a review.International Journal of Distributed Sensor Networks,9(5), 167575. Banerjee, S. P., Woodard, D. L. (2012). Biometric authentication and identification using keystroke dynamics: A survey.Journal of Pattern Recognition Research,7(1), 116-139. Beveridge, J. R., Phillips, P. J., Bolme, D. S., Draper, B. A., Givens, G. H., Lui, Y. M., ... Flynn, P. J. (2013, September). The challenge of face recognition from digital point-and-shoot cameras. InBiometrics: Theory, Applications and Systems (BTAS), 2013 IEEE Sixth International Conference on(pp. 1-8). IEEE. Bhargavan, K., Fournet, C., Kohlweiss, M., Pironti, A., Strub, P. Y. (2013, May). Implementing TLS with verified cryptographic security. InSecurity and Privacy (SP), 2013 IEEE Symposium on(pp. 445-459). IEEE. Cappelli, R., Ferrara, M., Maio, D. (2012). A fast and accurate palmprint recognition system based on minutiae.IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics),42(3), 956-962. De Cristofaro, E., Wright, M. (2013). Privacy enhancing technologies. InProceedings of 13th International Symposium, PETS. Froomkin, A. M. (2015). From anonymity to identification.Browser Download This Paper. Larsson, S., Svensson, M., De Kaminski, M., Rnkk, K., Alkan Olsson, J. (2012). Law, norms, piracy and online anonymity: Practices of de-identification in the global file sharing community.Journal of Research in Interactive Marketing,6(4), 260-280. Li, B., Erdin, E., Gunes, M. H., Bebis, G., Shipley, T. (2013). An overview of anonymity technology usage.Computer Communications,36(12), 1269-1283. Rainie, L., Kiesler, S., Kang, R., Madden, M., Duggan, M., Brown, S., Dabbish, L. (2013). Anonymity, privacy, and security online.Pew Research Center,5. Singla, A., Sachdeva, R. (2013). Review on security issues and attacks in wireless sensor networks.International Journal of Advanced Research in Computer Science and Software Engineering,3(4). Venkatraman, K., Daniel, J. V., Murugaboopathi, G. (2013). Various attacks in wireless sensor network: survey.International Journal of Soft Computing and Engineering,3(1), 208-211. Wessels, B. (2012). Identification and the practices of identity and privacy in everyday digital communication.New Media Society,14(8), 1251-1268.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.