A biometric is defined as a technology which uses information and data of any person to investigate the identity of any person. In this modern technology biometric technology is growing very fast and many organizations and communities are using this technology for security purpose. This technology depends on particular data or information of any person and this technology will include data programmes in terms of algorithms to identify any person. The main objective of this technology is to increase security in information industries and identify any person by using information systems (Semwal, Singha, Sharma, Chauhan, & Behera, 2017).
There are mainly three types of biometric systems which are following
The fingerprint is a type of biometric technology which uses automatic reorganization systems (Nandakumar, & Jain, 2015). This is a very popular biometric system and many mobile organizations are using this technology to increase productivity and efficiency. This is made of a series of grooves and ridges and once a fingerprint is scanned by this technology the information system recognizes information of that person and compare with stored data. This captured fingerprint locates the minutia points and these points are mapped and a line is marked between each point. This map is used to store data or information which is called as minutia template and provides complete information on any person (Marasco, & Ross, 2015).
Examples: Access management, criminal investigation, background check, and point of sale.
Hand geometry is one of the oldest technologies of biometric which was implemented in year 1980s. This technology is used for public acceptance, for reorganization and identification, and integration capabilities. One of the common limitations of hand geometry is that this technology is not highly unique and many organization and communities are using this technology for recognition and detection process. This technology utilizes the simple concept of recording detecting the thickness, length, and width of any person’s hand and this biometric system use camera to imprisonment an image of the hand. After that statistics capture through a CCD process which involves the highest view of the pointer and measures the distance of hand using CCD technology (Gupta, & Gupta, 2018).
Examples: distance measurement, for identification, and background check.
Iris recognition is one of the latest versions of the biometric system and around 1000 ATMs in Montreal and Chicago are using this advanced technology. Iris recognition uses pattern technique which is completely based on high determination and alteration free duplicate of people eyes. This technology takes a high-resolution image of human eyes and makes a pattern which is compared with stored data in information systems. This technology reduces the drawbacks of fingerprint biometric and uses a digital camera to capture human eyes after that this image compare with biometric database and recognize person eyes (Gupta, Srivastava, & Gupta, 2016).
Examples: for verification purpose, and security purpose.
Privacy enhancing technologies refer to a process which is used as a security system and also protect data or information of human-computer systems. This is modern technology provide a platform to protect data of individual personal information systems. PET is defined as an ICT technology which is used to protect the informational privacy through minimizing their personal data without losing their personal information. The main purpose of this technology is to protect human personal data by using personally identifiable information systems. In this advanced generation, there are many hackers and cyber risks that can encrypt human personal data and also block their computer system. Therefore to reduce security risks and cyber risks PET is used which uses online services and protect their personal data’s (Acquisti, Brandimarte & Loewenstein, 2015).
There are many organizations which are using PETs to reduce security risks and protect personal data by another person. The main application of Privacy enhancing technology is in the information and technology industries to protect human personal information’s. There are many examples of PETs such as announcement anonymizers, communal bogus operational accounts, admission to individual files, and improved privacy ID. In the last few years, the use of the internet is growing rapidly in all countries and many people use the internet for suffering in which they share their personal information through online communities. When any person communicates with another person through online websites than they lost their personal information therefore to reduce this type of security problems PETs are used (Kokolakis, 2017). New users of online websites do not realize that when they use online websites, and social media websites and send emails which can be easily hacked and can be encrypted. Cyber-attack is one of the biggest problems in the information industry because hacker blocks human-computer systems by sending spam emails and messages after that they enter into computer and mobile devices and encrypt all personal files. These type of problem can be reduced by PETs technologies because this technology block spam and fraud emails and protect human personal data and information.
There are many tools are used in this technology such as SSL, encryption method, security tools to protect personal data, and various network systems. It is observed that PETs can reduce security risks by 60% and around 70% of people are using this technology for security purpose. There are mainly three types of PETs which are following
Examples: In industries to reduce security risks, use in mobiles to protect personal files and reduce cyber-attacks.
Encryption is one of the biggest changes in the information system and it reduces many cyber risks and security risks. This technology is used in PETs to protect human personal information from another person. Encryption is also used in a telecommunication system to protect transmitted data from the transmitter. In which data is converted into particular code which can be read by users and at when any information transfer from one location to another than this technology is used.
This tool is used into PET to enable the customer to interact anonymously and this provides a unique IP address to every user. There are many users which are using a proxy server as an anonymity tool which can reduce the problem of hacking. The main drawback of this tool is that it is not used for online transaction and it is the very expensive process. There are mainly three types of anonymity tools which are following
A wireless sensor network is defined as a wireless network which is used to monitor physical and environmental conditions. This is an advanced technology of wired network in which data or information can be transferred from one location to another without using any electric cables or wires. The main advantage of a wireless network is that it can be sued for long distance communication and many organizations are using this technology for security purpose. There are many applications of wireless sensor networks such as monitoring air and water, monitor and control industrial machines, asset tracking, and monitoring of building structures (Han, Liu, Jiang, Shu, & Hancke, 2017).
The most popular construction of wireless sensor system is the OSI model and this model involves five layer and 3 cross layers. Wireless sensor networks require five layers such as transport coating, data link layer, application layer, network layer, physical layer and three cross layers such as task management plane, power management plan, and mobility management flat (Kurt, Yildiz, Yigit, Tavli, & Gungor, 2017).
This type of layer is used for traffic management and uses numerous software to convert the data signal into information. There are many applications of wireless networks in various fields such as in medical, agricultural, environment, and military.
There are main two Strengths of transport layer such as provide congestion avoidance, and it is the very reliable process. These types of network protocols utilize dissimilar mechanisms for loss recovery. The transport layer can be divided into two part such as a packet driven and event-driven.
The main purpose of this layer is to provide routing for wireless networks and there are many tasks performed by this layer such as partial; memory, buffers, power conserving and self-organized. There are many types of available protocols of this layer which are following
Data link layer is used to detect multiplexing data frames, MAC, control data errors, and for data streams.
This type of layer provides an edge for sending a bit of stream and it is also responsible for the generation of the carrier signal, modulation, signal detection and data encryption. IEEE 802.15.4 is one of the best wireless networks with low cost and power consumption (Han, Liu, Jiang, Shu, & Hancke, 2017).
Denial of Service Attacks
In wireless networks, Denial of Service (DOS) is delivered by the unexpected disappointment of hubs or noxious activity. In DOS assault the foe endeavours to subvert, disturb or annihilate a system. DOS assault decreases a system able to give a support of any occasion. The smallest multifaceted DOS attack attempts to debilitate the properties accessible to the fatality hub, by distribution extra pointless letters. There are many DOS in wireless networks such as jamming, tampering, collision, exhaustion, flooding, and DE synchronization (Fadel, Gungor, Nassef, Akkari, Malik, Almasri, & Akyildiz, 2015).
The wireless networks perform multiple tasks at the time and in which data transfer into the air through which many noise and losses occur in signals which can reduce the efficiency of the input signal. The Sybil assault boards blame accepting plans, for instance, multipath direction-finding disseminates volume and topology provision. Sybil assault attempts to corrupt the uprightness of info safety and advantage use that the dispersed calculation endeavors to accomplish. Any distributed system particularly remote organize is powerless against Sybil assault (Han, Liu, Jiang, Shu, & Hancke, 2017).
A malicious node that acts as a black hole in the scope of the sink draws in the whole movement to be steered through it by publicizing itself as the briefest course. The enemy drops bundles coming from particular sources in the system. This type of threat also impact on long-distance base stations and it produces the high portion of the loss in data or information signals (Han, Liu, Jiang, Shu, & Hancke, 2017).
Therefore these types of threats and risks in WSNs can be reduced by improving security systems and by using an encryption method. The encryption method is very common to reduce security risks and in which signal convert into a form of code which increases the overall performance of signal and reduce threats and risks of wireless networks.
References
Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behaviour in the age of information. Science, 347(6221), 509-514.
Darshan, G. P., Premkumar, H. B., Nagabhushana, H., Sharma, S. C., Prashanth, S. C., & Prasad, B. D. (2016). Effective fingerprint recognition technique using doped yttrium aluminate nano phosphor material. Journal of colloid and interface science, 464, 206-218.
Fadel, E., Gungor, V. C., Nassef, L., Akkari, N., Malik, M. A., Almasri, S., & Akyildiz, I. F. (2015). A survey on wireless sensor networks for the smart grid. Computer Communications, 71, 22-33.
Fraschini, M., Hillebrand, A., Demuru, M., Didaci, L., & Marcialis, G. L. (2015). An EEG-based biometric system using eigenvector centrality in resting state brain networks. IEEE Signal Processing Letters, 22(6), 666-670.
Gupta, P., & Gupta, P. (2018). Multi-biometric Authentication System using Slap Fingerprints, Palm Dorsal Vein and Hand Geometry. IEEE Transactions on Industrial Electronics, 65(12), 9777.
Gupta, P., Srivastava, S., & Gupta, P. (2016). An accurate infrared hand geometry and vein pattern based authentication system. Knowledge-Based Systems, 103, 143-155.
Han, G., Liu, L., Jiang, J., Shu, L., & Hancke, G. (2017). Analysis of energy-efficient connected target coverage algorithms for industrial wireless sensor networks. IEEE Transactions on Industrial Informatics, 13(1), 135-143.
Jain, A. K., Arora, S. S., Cao, K., Best-Rowden, L., & Bhatnagar, A. (2017). Fingerprint recognition of young children. IEEE Transactions on Information Forensics and Security, 12(7), 1501-1514.
Klonowski, M., Plata, M., & Syga, P. (2018). User authorization based on hand geometry without special equipment. Pattern Recognition, 73, 189-201.
Kokolakis, S. (2017). Privacy attitudes and privacy behavior: A review of current research on the privacy paradox phenomenon. Computers & Security, 64, 122-134.
Kurt, S., Yildiz, H. U., Yigit, M., Tavli, B., & Gungor, V. C. (2017). Packet size optimization in wireless sensor networks for smart grid applications. IEEE Transactions on Industrial Electronics, 64(3), 2392-2401.
Marasco, E., & Ross, A. (2015). A survey on ant spoofing schemes for fingerprint recognition systems. ACM Computing Surveys (CSUR), 47(2), 28.
Nandakumar, K., & Jain, A. K. (2015). Biometric template protection: Bridging the performance gap between theory and practice. IEEE Signal Processing Magazine, 32(5), 88-100.
Semwal, V. B., Singha, J., Sharma, P. K., Chauhan, A., & Behera, B. (2017). An optimized feature selection technique based on incremental feature analysis for bio-metric gait data classification. Multimedia tools and applications, 76(22), 24457-24475.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download