Biometrics and Password Less Authentication: The Future of Digital Security


Authors : Rajesh Kumar

Volume/Issue : Volume 9 - 2024, Issue 7 - July

Google Scholar : https://tinyurl.com/3mbd6pxt

Scribd : https://tinyurl.com/3ps4hz7f

DOI : https://doi.org/10.38124/ijisrt/IJISRT24JUL541

Abstract : Passwords and other old authentication mechanisms are becoming less secure as cybersecurity threats continue to change. By utilizing distinctive physical or behavioral characteristics to confirm the identification of anyone gaining access to sensitive data or systems, biometric authentication is a viable alternative (Bhattacharyya, Ranjan, Alisherov, & Choi, 2009). The purpose of this article is to investigate how biometric authentication might improve cybersecurity. It emphasizes the benefits of biometrics, such as their better user experience, multi-factor authentication capabilities, and uniqueness and non-replicability (Bhattacharyya, Ranjan, Alisherov, & Choi, 2009). Concerns and restrictions, including possible vulnerabilities and privacy issues, are also covered in the article. It also covers important factors to consider while implementing biometric authentication, such as safe processing and storage of biometric data (Bhattacharyya, Ranjan, Alisherov, & Choi, 2009). Biometrics are essential for bolstering cybersecurity and reducing the dangers connected with password-related issues since they offer a dependable and secure means of user verification. All things considered, biometric authentication provides a reliable and practical way to confirm user identities, strengthening an organization's security posture and shielding confidential data from unwanted access.

Keywords : Password, Authentication Mechanisms, Cyber Security Threats, Biometric Authentication, Vulnerability.

References :

  1. Bhattacharyya, D., Ranjan, R., Alisherov, F., & Choi, M. (2009). Biometric authentication: A review. International Journal of u-and e-Service, Science and Technology, 2(3), 13-28.
  2. Weaver, A. C. (2006). Biometric authentication. Computer, 39(2), 96-97.
  3. Gayathri, M., Malathy, C., & Prabhakaran, M. (2020). A review of various biometric techniques, their features, methods, security issues and application areas. Computational Vision and Bio-Inspired Computing: ICCVBIC 2019, 931-941.
  4. Li, L., Mu, X., Li, S., & Peng, H. (2020). A review of face recognition technology. IEEE access, 8, 139110-139120.
  5. Patel, C. D., Trivedi, S., & Patel, S. (2012). Biometrics in IRIS technology: A survey. International Journal of Scientific and Research Publications, 2(1), 1-5.
  6. Boreki, G., & Zimmer, A. (2005, October). Hand geometry: a new approach for feature extraction. In Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05) (pp. 149-154). IEEE.
  7. Alsaadi, I. M. (2021). Study on most popular behavioral biometrics, advantages, disadvantages, and recent applications: A review. Int. J. Sci. Technol. Res, 10(1).
  8. Dharavath, K., Talukdar, F. A., & Laskar, R. H. (2013, December). Study on biometric authentication systems, challenges, and future trends: A review. In 2013 IEEE international conference on computational intelligence and computing research (pp. 1-7). IEEE.
  9. Wayman, J. L., Jain, A. K., Maltoni, D., & Maio, D. (Eds.). (2005). Biometric systems: Technology, design, and performance evaluation. Springer Science & Business Media.
  10. Pooe, A., & Labuschagne, L. (2011). Factors impacting on the adoption of biometric technology by South African banks: An empirical investigation. Southern African Business Review, 15(1).
  11. Starlink, & Starlink. (2023, November 7). Biometric Face Recognition System: Benefits, Uses, & How does it Work? - StarLink India. StarLink India -. https://www.starlinkindia.com/blog/biometrics-face-recognition/
  12. Vks, S. A. (n.d.). An introduction to retinal scanning and iris scanning. https://www.divilabs.com/2013/04/ an-introduction-to-retinal-scanning-and.html

Passwords and other old authentication mechanisms are becoming less secure as cybersecurity threats continue to change. By utilizing distinctive physical or behavioral characteristics to confirm the identification of anyone gaining access to sensitive data or systems, biometric authentication is a viable alternative (Bhattacharyya, Ranjan, Alisherov, & Choi, 2009). The purpose of this article is to investigate how biometric authentication might improve cybersecurity. It emphasizes the benefits of biometrics, such as their better user experience, multi-factor authentication capabilities, and uniqueness and non-replicability (Bhattacharyya, Ranjan, Alisherov, & Choi, 2009). Concerns and restrictions, including possible vulnerabilities and privacy issues, are also covered in the article. It also covers important factors to consider while implementing biometric authentication, such as safe processing and storage of biometric data (Bhattacharyya, Ranjan, Alisherov, & Choi, 2009). Biometrics are essential for bolstering cybersecurity and reducing the dangers connected with password-related issues since they offer a dependable and secure means of user verification. All things considered, biometric authentication provides a reliable and practical way to confirm user identities, strengthening an organization's security posture and shielding confidential data from unwanted access.

Keywords : Password, Authentication Mechanisms, Cyber Security Threats, Biometric Authentication, Vulnerability.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe