1 / 14

Ubiquitous Security , is it just Biometrics?

Ubiquitous Security , is it just Biometrics?. By: Group 7. What is Ubiquitous Security?. Presented by Wasan Amnatwipavee ( TP011279). What is Ubiquitous Security?.

yan
Download Presentation

Ubiquitous Security , is it just Biometrics?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ubiquitous Security,is it just Biometrics? By: Group 7

  2. What is Ubiquitous Security? Presented by Wasan Amnatwipavee (TP011279)

  3. What is Ubiquitous Security? • Ubiquitous Security identifies users and the surroundings properly to offer suitable services desired by “Individuals” safely and securely that “dynamically” change security levels according to the situation. • Assist all users (from all walks of life, young and old, disabled) to enjoy the safe reliable service of ICT. • E.g. A person is identified through biometrics, while an object is identified by RFID as an “individual” distinguished from others. In addition, the network can detect autonomously a person’s location or surrounding environment using video camera systems, environmental sensors, or positioning systems such as the global positioning system (GPS). The network can also monitor the person’s health conditions and behaviour through sensors placed on one’s body. Presented by : WasanAmnatwipavee(TP011279)

  4. What does it do? • Prevent from intruder • Example • Finger scan device, Fire wall • Prevent from threads • Example • Anti-virus , Anti-spyware • Increase efficiency of services • Example • Identity card reader Presented by : WasanAmnatwipavee(TP011279)

  5. Situations where ubiquitous computing exist • Production/Distribution • Production objects are tagged with RFIDs in factories, farms with various sensors embedded in the environment to manage and monitor product quality, location and to track path during distribution. • Transport • Embedded chips in roads to monitor vehicle movements to prevent collisions, improve traffic flow this creating a safe energy efficient traffic system. Presented by : WasanAmnatwipavee(TP011279)

  6. References • KatsumasaShinozuka, President and CEO (2007), Ubiquitous Security – Towards Realization of a Safe and Secure Digital World, accessed on 10 April 2008 from http://www.oki.com/en/otr/210/downloads/otr-210-R19.pdf . • Timothy K. Buennemeyer Randolph C. Marchany Joseph G. Tront,Bradley Department of Electrical and Computer Engineering,Virginia Polytechnic Institute and State University, accessed on 10 April 2008 from http://www.vs.inf.ethz.ch/res/papers/privacy-principles.pdf Presented by : WasanAmnatwipavee(TP011279)

  7. Flaws of Biometrics in Ubiquitous Environment Presented by Povanaswari Devindaran (TP010961)

  8. The Flaws of Biometrics Security • [1] Not every biometric solution fits every security problem, and some companies, such as Keyware Solutions of Woburn, MA, promote a layered approach using card and code systems with biometric technologies. • The flaws in biometrics security technology features • Facial Recognition • Low light or a surgeon wearing a facemask reduces the effectiveness of facial recognition • Iris Scanning • can be uncomfortable for the person who must get close to the scanner. • Palm Recognition • measures the height of the fingers, distance between the joints and the shape of the knuckles, but is less accurate than other approaches and little used in healthcare • Voice Recognition • A noisy emergency room environment makes voice verification less useful. • Fingerprint • Most widely used in health care security (HOSPITALS) but a slight changes on the finger print such as cuts may cause recognition problems. Presented by : :Povanaswari Devindaran (TP010961)

  9. Flaws of Biometrics Security • [1] “Biometrics security may be high level security to be invaded but it should be taken into consideration. This is because a well secured system that has never been invaded will be a system with no users. Such system is useless.” said Danny Chu the Keyware Solutions Managing Director. • According to Danny Chu, applying security features in a system is akin to placing roadblocks in front of intruders. Security comes in how many roadblocks you put in front of intruders and how widespread the roadblocks are for intruders to get over them. Biometrics is another roadblock for any intruder." • According to the Ronald E. Keener biometrics security are best fitted in hospitals because doctors and nurses require speedy access in other departments in a hospital and smart card and password features of security is messy process of security for them. Presented by : :Povanaswari Devindaran (TP010961)

  10. RFID another security solution • RFID • [2] Radio Frequency Identification (RFID) is the quintessential Pervasive Computing technology. • [2] Information about RFID-tagged objects can be transmitted for multiple objects simultaneously, through physical barriers, and from a distance. • [2] In line with Mark Weiser’s concept of “ubiquitous computing” [1], RFID tags could turn our interactions with computing infrastructure into something hidden and inspiring. Presented by : Povanaswari Devindaran (TP010961)

  11. RFID another security solution • RFID tags helps in counterfeiting of goods that comes from all types such as pharmaceutical drugs, designer items, money, travel bags, and many others. • RFID technology manages :- • Supply chains • Mediates access to buildings • Children’s safety • RFID a good security solution for ubiquitous environment because • Implementation cost is low compared to biometrics • Small in size and can be embedded • Can be carried in any form because of it ability to be embedded. (Can be embedded in jewelry, and watches) Presented by : Povanaswari Devindaran (TP010961)

  12. Wearable Stuffs with RFID The FLORA (Fluorescent Light Organizing Radio Accessory) - RFID Watches Picture Taken From: http://www.we-make-money-not-art.com/yyy/abudd.jpg Mybi Cards – cellphone styles with RFID shopping capabilities Picture Taken From: http://www.weblogsinc.com/common/images/6336667344488645.jpg?0.16142709965392676 Presented by : Povanaswari Devindaran (TP010961)

  13. References • [1] Ronald E.Keener (2000), Put Your Finger on the Right Solution - Technology Information, Health Management Technology (Dec, 2000), accessed on 2nd April 2008 from http://findarticles.com/p/articles/mi_m0DUD/is_12_21/ai_68643926 • [2] Melanie R. Rieback, Patrick N.D. Simpons, Bruno Crispo, Andrew S. Tanenbaum, RFID Malware: Design Principles and examples (Feb 2006), accessed on 24th April 2008 from http://www.cs.vu.nl/~ast/publications/pmc-2006.pdf Presented by : Povanaswari Devindaran (TP010961)

  14. It is not just Biometrics Security Presented by Goh Da Suan

More Related