The vulnerability of biometric technologies in authentication

Descripción del Articulo

Technological advancements and the increasing necessity to protect sensitive data have elevated the significance of biometrics in the realm of security. Its application has expanded to encompass mobile devices and identity management. Nevertheless, as it integrates into everyday life and the busines...

Descripción completa

Detalles Bibliográficos
Autores: Vásquez Cerna, Jair Joel, Solano Quincho, Luz Maria, Mendoza de los Santos, Alberto Carlos
Formato: artículo
Fecha de Publicación:2023
Institución:Universidad Privada de Tacna
Repositorio:Revistas - Universidad Privada de Tacna
Lenguaje:español
OAI Identifier:oai:revistas.upt.edu.pe:article/866
Enlace del recurso:https://revistas.upt.edu.pe/ojs/index.php/ingenieria/article/view/866
Nivel de acceso:acceso abierto
Descripción
Sumario:Technological advancements and the increasing necessity to protect sensitive data have elevated the significance of biometrics in the realm of security. Its application has expanded to encompass mobile devices and identity management. Nevertheless, as it integrates into everyday life and the business environment, challenges concerning privacy and security surface inevitably. Therefore, it is imperative to evaluate potential vulnerabilities in biometric authentication. For the purpose of this evaluation, documents stored in various databases, including IEEE Xplore, SciELO, ScienceDirect, and Scopus, were analyzed. Inclusion and exclusion criteria were applied, allowing the selection of 20 articles. The findings uncovered several threats, such as fingerprint reconstruction and presentation attacks, along with proposed solutions like 3D representations and verification systems. Furthermore, it underscores the necessity for advanced attack detection technologies and ethical regulations. In conclusion, it emphasizes the paramount importance of ensuring security and privacy in biometric authentication systems, driving continuous research efforts to remain in step with ever-evolving threats.
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).