Advancing Human-Computer Interaction through Biometric Authentication: Innovations, Challenges, and Future Directions

Authors

  • Ishrat Begum, Meena Chaudhary

Keywords:

HCI, User Recognition, Behavioral Biometrics

Abstract

The personalized experience that people want and that organizations strive to provide relies heavily on recognizing and identifying individual users. Recent paradigm shifts in biometric system design have prompted the need for more thorough testing procedures, particularly in mobile settings where user input is less constrained by physical space, which might have a significant impact on system efficiency. In order to gather data for testing and design, testing methodologies include thinking about how user-system interaction affects system performance as a whole. In addition, we lay out the present obstacles and future directions for research on biometrics systems interface.

Downloads

Download data is not yet available.

References

Harvard University. (n.d.). Technology factsheet series: Internet of things. Belfer Center for Science and International Affairs. https://www.belfercenter.org/sites/default/files/2019-06/TechFactSheet/iot%20-%205.pdf (Accessed on June 30, 2021).

Bera, B., Das, A. K., Balzano, W., & Medaglia, C. M. (2020). On the design of biometric-based user authentication protocol in smart city environment. Pattern Recognition Letters, 138, 439–446. https://doi.org/10.1016/j.patrec.2020.08.004

Swamy, S. N., Jadhav, D., & Kulkarni, N. (2017). Security threats in the application layer in IoT applications. In Proceedings of the International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) (pp. 477–480). IEEE. https://doi.org/10.1109/I-SMAC.2017.8058300

Trnka, M., Cerny, T., & Stickney, N. (2018). Survey of authentication and authorization for the Internet of Things. Security and Communication Networks. https://doi.org/10.1155/2018/4829042

Verizon. (n.d.). Data breach investigations report. Verizon Enterprise. https://enterprise.verizon.com/resources/reports/dbir/ (Accessed on June 30, 2021).

Fernandes, E., Rahmati, A., Eykholt, K., & Prakash, A. (2017). Internet of things security research: A rehash of old ideas or new intellectual challenges? IEEE Security & Privacy, 15(4), 79–84. https://doi.org/10.1109/MSP.2017.3151330

Lin, H., & Bergmann, N. W. (2016). IoT privacy and security challenges for smart home environments. Information, 7(3), 44. https://doi.org/10.3390/info7030044

Ometov, A., Petrov, V., Bezzateev, S., Andreev, S., Koucheryavy, Y., & Gerla, M. (2019). Challenges of multi-factor authentication for securing advanced IoT applications. IEEE Network, 33(2), 82–88. https://doi.org/10.1109/MNET.2019.1800271

Gupta, S., Buriro, A., & Crispo, B. (2018). Demystifying authentication concepts in smartphones: Ways and types to secure access. Mobile Information Systems. https://doi.org/10.1155/2018/7363294

Bonneau, J., Herley, C., Van Oorschot, P. C., & Stajano, F. (2012). The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In Proceedings of the Symposium on Security and Privacy (pp. 553–567). IEEE. https://doi.org/10.1109/SP.2012.44

Gamundani, A. M., Phillips, A., & Muyingi, H. N. (2018). An overview of potential authentication threats and attacks on Internet of Things (IoT): A focus on smart home applications. In Proceedings of the International Conference on Internet of Things (iThings) (pp. 50–57). IEEE. https://doi.org/10.1109/iThings/GreenCom/CPSCom/SmartData.2018.00025

Antonakakis, M. (2017). Understanding the Mirai botnet. In Proceedings of the 26th USENIX Security Symposium (pp. 1093–1110). https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/antonakakis

Katsini, C., Belk, M., Fidas, C., Avouris, N., & Samaras, G. (2016). Security and usability in knowledge-based user authentication: A review. In Proceedings of the 20th Pan-Hellenic Conference on Informatics (pp. 1–6). IEEE. https://doi.org/10.1109/PCI.2016.7740607

Tsai, C.-L., Chen, C.-J., & Zhuang, D.-J. (2012). Secure OTP and biometric verification scheme for mobile banking. In Proceedings of the 3rd FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing (pp. 138–141). https://doi.org/10.1109/MUIC.2012.61

Gorodnichy, D., Yanushkevich, S., & Shmerko, V. (2014). Automated border control: Problem formalization. In Proceedings of the IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (pp. 118–125). IEEE. https://doi.org/10.1109/CIBIM.2014.7015445

Derawi, M. O., Nickel, C., Bours, P., & Busch, C. (2010). Unobtrusive user authentication on mobile phones using biometric gait recognition. In Proceedings of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 306–311). https://doi.org/10.1109/IIH-MSP.2010.88

Kumar, A. (2012). Can we use minor finger knuckle images to identify humans? In Proceedings of the IEEE 5th International Conference on Biometrics: Theory, Applications and Systems (pp. 55–60). https://doi.org/10.1109/BTAS.2012.6374566

Sathik, M. M., & Sofia, G. (2011). Identification of student comprehension using forehead wrinkles. In Proceedings of the International Conference on Computer, Communication and Electrical Technology (pp. 66–70). https://doi.org/10.1109/ICCCET.2011.5762451

Jain, A. K., & Klare, B. (2011). Matching forensic sketches and mug shots to apprehend criminals. Computer, 44(5), 94–96. https://doi.org/10.1109/MC.2011.147

Von Zezschwitz, E., De Luca, A., Janssen, P., & Hussmann, H. (2015). Easy to draw, but hard to trace? On the observability of grid-based (Un)lock patterns. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 2339–2342). https://doi.org/10.1145/2702123.2702202

Patrick, A. S. (2004). Usability and acceptability of biometric security systems. In Proceedings of the Financial Cryptography Conference (pp. 105–107). https://doi.org/10.1007/978-3-540-27809-2_11

Theofanos, M. F., Micheals, R. J., & Stanton, B. C. (2009). Biometric systems include users. IEEE Systems Journal, 3(4), 461–468. https://doi.org/10.1109/JSYST.2009.2039074

Theofanos, M., Stanton, B., Micheals, R., & Orandi, S. (2007). Biometric systematic uncertainty and the user. In Proceedings of the 1st IEEE International Conference on Biometrics: Theory, Applications, and Systems (pp. 1–6). https://doi.org/10.1109/BTAS.2007.4401920

Zimmermann, V., & Gerber, N. (2017). If it wasn’t secure, they would not use it in the movies—security perceptions and user acceptance of authentication technologies. In Human Aspects of Information Security, Privacy and Trust (pp. 265–283). Springer, Cham. https://doi.org/10.1007/978-3-319-58460-7_19

Wong, R., Poh, N., Kittler, J., & Frohlich, D. (2010). Towards inclusive design in mobile biometry. In Proceedings of the 3rd International Conference on Human System Interaction (pp. 267–274). https://doi.org/10.1109/HSI.2010.5514537

Poh, N., Blanco-Gonzalo, R., Wong, R., & Sanchez-Reillo, R. (2016). Blind subjects faces database. IET Biometrics, 5(1), 20–27. https://doi.org/10.1049/iet-bmt.2015.0037

Stanton, B., Theofanos, M., & Sheppard, C. (2008). A study of users with visual disabilities and a fingerprint process. NIST, Gaithersburg, MD, USA. NISTIR 7484. https://doi.org/10.6028/NIST.IR.7484

Sasse, M. A., & Krol, K. (2013). Usable biometrics for an ageing population. In Age Factors in Biometric Processing. Stevenage, U.K.: IET. https://doi.org/10.1049/PBSE003E

Fairhurst, M. (2013). Age Factors in Biometric Processing. Stevenage, U.K.: IET. https://www.theiet.org/resources/books/security/age_factors.cfm

Sanchez-Reillo, R., Blanco-Gonzalo, R., Liu-Jimenez, J., Lopez, M., & Canto, E. (2013). Universal access through biometrics in mobile scenarios. In Proceedings of the 47th International Carnahan Conference on Security Technology (pp. 1–6). IEEE. https://doi.org/10.1109/CCST.2013.6922038

Blanco-Gonzalo, R., Lunerti, C., Sanchez-Reillo, R., & Guest, R. M. (2018). Biometrics: Accessibility challenge or opportunity? PLoS One, 13(3), e0194111. https://doi.org/10.1371/journal.pone.0194111

Downloads

Published

26.03.2024

How to Cite

Ishrat Begum. (2024). Advancing Human-Computer Interaction through Biometric Authentication: Innovations, Challenges, and Future Directions. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 4705 –. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/6701

Issue

Section

Research Article