Advancing Human-Computer Interaction through Biometric Authentication: Innovations, Challenges, and Future Directions
Keywords:
HCI, User Recognition, Behavioral BiometricsAbstract
The personalized experience that people want and that organizations strive to provide relies heavily on recognizing and identifying individual users. Recent paradigm shifts in biometric system design have prompted the need for more thorough testing procedures, particularly in mobile settings where user input is less constrained by physical space, which might have a significant impact on system efficiency. In order to gather data for testing and design, testing methodologies include thinking about how user-system interaction affects system performance as a whole. In addition, we lay out the present obstacles and future directions for research on biometrics systems interface.
Downloads
References
Harvard University. (n.d.). Technology factsheet series: Internet of things. Belfer Center for Science and International Affairs. https://www.belfercenter.org/sites/default/files/2019-06/TechFactSheet/iot%20-%205.pdf (Accessed on June 30, 2021).
Bera, B., Das, A. K., Balzano, W., & Medaglia, C. M. (2020). On the design of biometric-based user authentication protocol in smart city environment. Pattern Recognition Letters, 138, 439–446. https://doi.org/10.1016/j.patrec.2020.08.004
Swamy, S. N., Jadhav, D., & Kulkarni, N. (2017). Security threats in the application layer in IoT applications. In Proceedings of the International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) (pp. 477–480). IEEE. https://doi.org/10.1109/I-SMAC.2017.8058300
Trnka, M., Cerny, T., & Stickney, N. (2018). Survey of authentication and authorization for the Internet of Things. Security and Communication Networks. https://doi.org/10.1155/2018/4829042
Verizon. (n.d.). Data breach investigations report. Verizon Enterprise. https://enterprise.verizon.com/resources/reports/dbir/ (Accessed on June 30, 2021).
Fernandes, E., Rahmati, A., Eykholt, K., & Prakash, A. (2017). Internet of things security research: A rehash of old ideas or new intellectual challenges? IEEE Security & Privacy, 15(4), 79–84. https://doi.org/10.1109/MSP.2017.3151330
Lin, H., & Bergmann, N. W. (2016). IoT privacy and security challenges for smart home environments. Information, 7(3), 44. https://doi.org/10.3390/info7030044
Ometov, A., Petrov, V., Bezzateev, S., Andreev, S., Koucheryavy, Y., & Gerla, M. (2019). Challenges of multi-factor authentication for securing advanced IoT applications. IEEE Network, 33(2), 82–88. https://doi.org/10.1109/MNET.2019.1800271
Gupta, S., Buriro, A., & Crispo, B. (2018). Demystifying authentication concepts in smartphones: Ways and types to secure access. Mobile Information Systems. https://doi.org/10.1155/2018/7363294
Bonneau, J., Herley, C., Van Oorschot, P. C., & Stajano, F. (2012). The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In Proceedings of the Symposium on Security and Privacy (pp. 553–567). IEEE. https://doi.org/10.1109/SP.2012.44
Gamundani, A. M., Phillips, A., & Muyingi, H. N. (2018). An overview of potential authentication threats and attacks on Internet of Things (IoT): A focus on smart home applications. In Proceedings of the International Conference on Internet of Things (iThings) (pp. 50–57). IEEE. https://doi.org/10.1109/iThings/GreenCom/CPSCom/SmartData.2018.00025
Antonakakis, M. (2017). Understanding the Mirai botnet. In Proceedings of the 26th USENIX Security Symposium (pp. 1093–1110). https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/antonakakis
Katsini, C., Belk, M., Fidas, C., Avouris, N., & Samaras, G. (2016). Security and usability in knowledge-based user authentication: A review. In Proceedings of the 20th Pan-Hellenic Conference on Informatics (pp. 1–6). IEEE. https://doi.org/10.1109/PCI.2016.7740607
Tsai, C.-L., Chen, C.-J., & Zhuang, D.-J. (2012). Secure OTP and biometric verification scheme for mobile banking. In Proceedings of the 3rd FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing (pp. 138–141). https://doi.org/10.1109/MUIC.2012.61
Gorodnichy, D., Yanushkevich, S., & Shmerko, V. (2014). Automated border control: Problem formalization. In Proceedings of the IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (pp. 118–125). IEEE. https://doi.org/10.1109/CIBIM.2014.7015445
Derawi, M. O., Nickel, C., Bours, P., & Busch, C. (2010). Unobtrusive user authentication on mobile phones using biometric gait recognition. In Proceedings of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 306–311). https://doi.org/10.1109/IIH-MSP.2010.88
Kumar, A. (2012). Can we use minor finger knuckle images to identify humans? In Proceedings of the IEEE 5th International Conference on Biometrics: Theory, Applications and Systems (pp. 55–60). https://doi.org/10.1109/BTAS.2012.6374566
Sathik, M. M., & Sofia, G. (2011). Identification of student comprehension using forehead wrinkles. In Proceedings of the International Conference on Computer, Communication and Electrical Technology (pp. 66–70). https://doi.org/10.1109/ICCCET.2011.5762451
Jain, A. K., & Klare, B. (2011). Matching forensic sketches and mug shots to apprehend criminals. Computer, 44(5), 94–96. https://doi.org/10.1109/MC.2011.147
Von Zezschwitz, E., De Luca, A., Janssen, P., & Hussmann, H. (2015). Easy to draw, but hard to trace? On the observability of grid-based (Un)lock patterns. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 2339–2342). https://doi.org/10.1145/2702123.2702202
Patrick, A. S. (2004). Usability and acceptability of biometric security systems. In Proceedings of the Financial Cryptography Conference (pp. 105–107). https://doi.org/10.1007/978-3-540-27809-2_11
Theofanos, M. F., Micheals, R. J., & Stanton, B. C. (2009). Biometric systems include users. IEEE Systems Journal, 3(4), 461–468. https://doi.org/10.1109/JSYST.2009.2039074
Theofanos, M., Stanton, B., Micheals, R., & Orandi, S. (2007). Biometric systematic uncertainty and the user. In Proceedings of the 1st IEEE International Conference on Biometrics: Theory, Applications, and Systems (pp. 1–6). https://doi.org/10.1109/BTAS.2007.4401920
Zimmermann, V., & Gerber, N. (2017). If it wasn’t secure, they would not use it in the movies—security perceptions and user acceptance of authentication technologies. In Human Aspects of Information Security, Privacy and Trust (pp. 265–283). Springer, Cham. https://doi.org/10.1007/978-3-319-58460-7_19
Wong, R., Poh, N., Kittler, J., & Frohlich, D. (2010). Towards inclusive design in mobile biometry. In Proceedings of the 3rd International Conference on Human System Interaction (pp. 267–274). https://doi.org/10.1109/HSI.2010.5514537
Poh, N., Blanco-Gonzalo, R., Wong, R., & Sanchez-Reillo, R. (2016). Blind subjects faces database. IET Biometrics, 5(1), 20–27. https://doi.org/10.1049/iet-bmt.2015.0037
Stanton, B., Theofanos, M., & Sheppard, C. (2008). A study of users with visual disabilities and a fingerprint process. NIST, Gaithersburg, MD, USA. NISTIR 7484. https://doi.org/10.6028/NIST.IR.7484
Sasse, M. A., & Krol, K. (2013). Usable biometrics for an ageing population. In Age Factors in Biometric Processing. Stevenage, U.K.: IET. https://doi.org/10.1049/PBSE003E
Fairhurst, M. (2013). Age Factors in Biometric Processing. Stevenage, U.K.: IET. https://www.theiet.org/resources/books/security/age_factors.cfm
Sanchez-Reillo, R., Blanco-Gonzalo, R., Liu-Jimenez, J., Lopez, M., & Canto, E. (2013). Universal access through biometrics in mobile scenarios. In Proceedings of the 47th International Carnahan Conference on Security Technology (pp. 1–6). IEEE. https://doi.org/10.1109/CCST.2013.6922038
Blanco-Gonzalo, R., Lunerti, C., Sanchez-Reillo, R., & Guest, R. M. (2018). Biometrics: Accessibility challenge or opportunity? PLoS One, 13(3), e0194111. https://doi.org/10.1371/journal.pone.0194111
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.