Evaluating and selecting the biometrics in network security

Since Apple merged with AuthenTec, a leading fingerprint recognition company, in 2012, biometrics has widely been considered to strengthen security and privacy in the network security field. Although biometrics has been applied in specific areas for decades, it has gradually proliferated in customer...

Full description

Saved in:
Bibliographic Details
Published inSecurity and communication networks Vol. 8; no. 5; pp. 727 - 739
Main Authors Liu, Che-Hung, Wang, Jen-Sheng, Peng, Chih-Chiang, Shyu, Joseph Z.
Format Journal Article
LanguageEnglish
Published London Blackwell Publishing Ltd 25.03.2015
Hindawi Limited
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Since Apple merged with AuthenTec, a leading fingerprint recognition company, in 2012, biometrics has widely been considered to strengthen security and privacy in the network security field. Although biometrics has been applied in specific areas for decades, it has gradually proliferated in customer and mobile electronic products to enhance security and privacy. This study aims to evaluate biometrics through conventional technology assessment considerations combined with viewpoints on the specifics of biometric technologies and then to provide suggestions for selection. To conduct the biometric technology assessment, the fuzzy analytic hierarchy process and non‐fuzzy best performance approaches are used. Although the outcomes first indicate that technology assessment should be the key object in selecting biometric technologies, that object is followed by biometric competence and key elements of biometrics. The outcomes also indicate that features of the target technologies should be considered when evaluating them. Additionally, fingerprint recognition, iris recognition, and face recognition are the preferred biometrics in evaluation and selection. Copyright © 2014 John Wiley & Sons, Ltd. Biometrics has widely been considered to strengthen security and privacy in the network security field. This study aims to evaluate biometrics and to provide suggestions for selection. The outcomes first indicate that technology assessment should be the key object in selecting biometric technologies. The outcomes also indicate that features of the target technologies should be considered when evaluating them. In addition, fingerprint recognition, iris recognition, and face recognition are the preferred biometrics in evaluation and selection.
Bibliography:ark:/67375/WNG-KMJ1T48S-Q
istex:BABCCB773DA53E21EBF072E89B44A5320B64A9BA
ArticleID:SEC1020
ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ISSN:1939-0114
1939-0122
DOI:10.1002/sec.1020