Abstract

While the Internet of Things (IoT) devices, such as smartwatches, provide a range of services from managing financial transactions to monitoring smart homes, these devices often lead to gateways for malicious access to a user’s cyber-physical space. Biometric-based authentications are becoming popular to secure IoT devices and provide other services. However, when to use what type of biometrics remains challenging due to various factors, including sensing and computing requirements, user interaction requirements, stability over time, and application scenarios, among others. Unlike soft biometrics, e.g., gait, traditional biometrics, e.g., iris, are more stable over time but require active user input and robust sensing and computing, which limits their continuous adaptability to secure a user’s cyber-physical space. Additionally, the integration of new sensors to IoT devices brings opportunistic data types that can individually or in combination with other common biometrics to identify a user. There is a dearth of knowledge about the limitations and applications of new opportunistic biometrics and their combinations with existing biometrics obtained from single or multiple IoT-connected devices. Therefore, this article thoroughly discusses different biometrics that can be implemented on IoT devices to understand the potential of biometric authentications better.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.