How Biometric Authentication Poses New Challenges to Our Security and Privacy [In the Spotlight]

Research output: Contribution to journalArticle

Abstract

Discusses the challenges that face biometric authentication in the areas of privacy and network security. The use of biometric data-an individual's measurable physical and behavioral characteristics-isn't new. Government and law enforcement agencies have long used it. The Federal Bureau of Investigation (FBI) has been building a biometric recognition database; the U.S. Department of Homeland Security is sharing its iris and facial recognition of foreigners with the FBI. But the use of biometric data by consumer goods manufacturers for authentication purposes has skyrocketed in recent years. For example, Apple's iPhone allows users to scan their fingerprints to unlock the device, secure mobile bill records, and authenticate payments. Lenovo and Dell are companies that leverage fingerprints to enable users to sign onto their computers with just a swipe. Using biometric data to access our personal devices is increasing as a way to get around the limitations of the commonly used password-based mechanism: it's easier, more convenient, and (theoretically) more secure. But biometric data can also be stolen and used in malicious ways. Capturing fingerprints at scale isn't as easy as lifting a credit card or Social Security number, but experience and history tells us that once something is used extensively, criminals will figure out how to misuse and monetize it.

Original languageEnglish (US)
Article number7974880
Pages (from-to)194-196
Number of pages3
JournalIEEE Signal Processing Magazine
Volume34
Issue number4
DOIs
StatePublished - Jul 1 2017

Fingerprint

Biometrics
Authentication
Privacy
Fingerprint
Homeland Security
Law Enforcement
Apple
National security
Network Security
Iris
Password
Network security
Law enforcement
Leverage
Figure
Sharing
History
Face
Industry

ASJC Scopus subject areas

  • Signal Processing
  • Electrical and Electronic Engineering
  • Applied Mathematics

Cite this

How Biometric Authentication Poses New Challenges to Our Security and Privacy [In the Spotlight]. / Memon, Nasir.

In: IEEE Signal Processing Magazine, Vol. 34, No. 4, 7974880, 01.07.2017, p. 194-196.

Research output: Contribution to journalArticle

@article{2f116985821f45eaa8702462c56afa9d,
title = "How Biometric Authentication Poses New Challenges to Our Security and Privacy [In the Spotlight]",
abstract = "Discusses the challenges that face biometric authentication in the areas of privacy and network security. The use of biometric data-an individual's measurable physical and behavioral characteristics-isn't new. Government and law enforcement agencies have long used it. The Federal Bureau of Investigation (FBI) has been building a biometric recognition database; the U.S. Department of Homeland Security is sharing its iris and facial recognition of foreigners with the FBI. But the use of biometric data by consumer goods manufacturers for authentication purposes has skyrocketed in recent years. For example, Apple's iPhone allows users to scan their fingerprints to unlock the device, secure mobile bill records, and authenticate payments. Lenovo and Dell are companies that leverage fingerprints to enable users to sign onto their computers with just a swipe. Using biometric data to access our personal devices is increasing as a way to get around the limitations of the commonly used password-based mechanism: it's easier, more convenient, and (theoretically) more secure. But biometric data can also be stolen and used in malicious ways. Capturing fingerprints at scale isn't as easy as lifting a credit card or Social Security number, but experience and history tells us that once something is used extensively, criminals will figure out how to misuse and monetize it.",
author = "Nasir Memon",
year = "2017",
month = "7",
day = "1",
doi = "10.1109/MSP.2017.2697179",
language = "English (US)",
volume = "34",
pages = "194--196",
journal = "IEEE Signal Processing Magazine",
issn = "1053-5888",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "4",

}

TY - JOUR

T1 - How Biometric Authentication Poses New Challenges to Our Security and Privacy [In the Spotlight]

AU - Memon, Nasir

PY - 2017/7/1

Y1 - 2017/7/1

N2 - Discusses the challenges that face biometric authentication in the areas of privacy and network security. The use of biometric data-an individual's measurable physical and behavioral characteristics-isn't new. Government and law enforcement agencies have long used it. The Federal Bureau of Investigation (FBI) has been building a biometric recognition database; the U.S. Department of Homeland Security is sharing its iris and facial recognition of foreigners with the FBI. But the use of biometric data by consumer goods manufacturers for authentication purposes has skyrocketed in recent years. For example, Apple's iPhone allows users to scan their fingerprints to unlock the device, secure mobile bill records, and authenticate payments. Lenovo and Dell are companies that leverage fingerprints to enable users to sign onto their computers with just a swipe. Using biometric data to access our personal devices is increasing as a way to get around the limitations of the commonly used password-based mechanism: it's easier, more convenient, and (theoretically) more secure. But biometric data can also be stolen and used in malicious ways. Capturing fingerprints at scale isn't as easy as lifting a credit card or Social Security number, but experience and history tells us that once something is used extensively, criminals will figure out how to misuse and monetize it.

AB - Discusses the challenges that face biometric authentication in the areas of privacy and network security. The use of biometric data-an individual's measurable physical and behavioral characteristics-isn't new. Government and law enforcement agencies have long used it. The Federal Bureau of Investigation (FBI) has been building a biometric recognition database; the U.S. Department of Homeland Security is sharing its iris and facial recognition of foreigners with the FBI. But the use of biometric data by consumer goods manufacturers for authentication purposes has skyrocketed in recent years. For example, Apple's iPhone allows users to scan their fingerprints to unlock the device, secure mobile bill records, and authenticate payments. Lenovo and Dell are companies that leverage fingerprints to enable users to sign onto their computers with just a swipe. Using biometric data to access our personal devices is increasing as a way to get around the limitations of the commonly used password-based mechanism: it's easier, more convenient, and (theoretically) more secure. But biometric data can also be stolen and used in malicious ways. Capturing fingerprints at scale isn't as easy as lifting a credit card or Social Security number, but experience and history tells us that once something is used extensively, criminals will figure out how to misuse and monetize it.

UR - http://www.scopus.com/inward/record.url?scp=85032756299&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85032756299&partnerID=8YFLogxK

U2 - 10.1109/MSP.2017.2697179

DO - 10.1109/MSP.2017.2697179

M3 - Article

AN - SCOPUS:85032756299

VL - 34

SP - 194

EP - 196

JO - IEEE Signal Processing Magazine

JF - IEEE Signal Processing Magazine

SN - 1053-5888

IS - 4

M1 - 7974880

ER -