Internet Security Using Biometrics

Internet Security Using Biometrics

Shrikant Tiwari, Aruni Singh, Ravi Shankar Singh, Sanjay K. Singh
DOI: 10.4018/978-1-4666-2919-6.ch074
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Internet security is a big challenge for Internet users, and passwords are the primary means of authenticating users. Establishing identity is becoming difficult in this vastly interconnected society. The need for reliable Internet security techniques has increased in the wake of heightened concerns about security and rapid advancements in networking, communication, and mobility. Biometrics is the science of identifying an individual based on his physical (static) or behavioral (dynamic) characteristics, and it is beginning to gain acceptance as a legitimate method for determining an individual’s identity. Biometrics has been used for many years in high security government and military applications, but the technology is now becoming affordable for use as an authentication methods and general security feature. In this chapter, the authors provide an overview of Internet security using Biometrics.
Chapter Preview
Top

Internet Security

Existing Security Primitives and Their Limitations

The existing security primitives use a generic cryptographic system, the user authentication method is possession based. It means the possession of the decrypting key is sufficient to establish the authenticity of the user. Since cryptographic keys are long and random they are difficult to member. So, these keys are stored and released based on some alternative authentication mechanism i.e. password. As shown in Figure 1 if internet users use simple password then it is easy to guess, and they compromise security and complex password which are difficult to remember, and are costly to maintain. Most internet users use the same password across different application, as hacker or impostor after getting a single password can now access multiple applications. So in a multiuser account case, passwords are unable to provide no repudiation.

Figure 1.

Different methods to remember passwords

978-1-4666-2919-6.ch074.f01

Password Survey (Nov. 2006)

  • 1.

    26%- use common words, dates, phone, address numbers

  • 2.

    38%- recycle old passwords

  • 3.

    62%- change password only if perceiving a security threat

  • 4.

    17%- keep password list on monitor, keyboard or desk drawer.

Complete Chapter List

Search this Book:
Reset