Home  »  Blog  »  Internet of Things comprising Biometrics and Big Data

Internet of Things comprising Biometrics and Big Data

Internet of things

Introduction

In this evolving era, Internet Of Things ‘IOT’ coined by Kevin, 1999 can also be called as Internet Of Everything ‘IOE’. IOT is the foundation of everything the new technology tends to have. It consists of baby monitors to even a jet engine. (Subha, R., 2017) It empowers all these devices to connect/communicate with each other just with the Internet (Pathak, P., Vyas, N., and Joshi, S., 2017).

Bringing up the Machine-to-machine (M2M) communication, it completely affects Internet Traffic and increases security and privacy distress. Also, on the other hand, it upgrades business, minimizes material waste and unplanned downtime, diminishes road crowding and watches over homes and families remotely for the welfare. (Ashton, Gabbai, Simmonds) IOT generally conveys the data to cloud computing servers, where it’s piled and studied. (FIC, Intel, McLellan, OIC) Its gaining attention from every aspect, like there’s already 15-25 billion connected devices. There’s a possible chance to grow from 50-212 billion by 2020. And possibly a trillion connected devices by 2025. (Wasik) IOT cannot be explained, there’s a lot of revolution going on with the gadgets, and soon enough there’s going to change that we are not even considering right now. (Llewellyn, TechTarget)

On the other hand, biometrics is the method of recognition of a person that works body characters or behaviors. (Liu and Silverman, 2001) Collectability, Universality, Unicity, and Permanence are the necessity to identify individuals(Emilio and Massari, 2008:489). There are plenty of biometric characters which can be taken from us humans consisting of hand geometry, iris recognition, fingerprint recognition, voice recognition, and facial recognition (Rosenzweig, Kochems and Schwartz, 2004).

Biometric systems run in two basic modes, i.e. Verification and Identification. Verification: It uses 1 to 1 trial by employing biometric data taken from one to a biometric template kept in a database. Identification: It applies 1 to many matches and looks all the model in a database to find. The validity and numbers of record in the databases defines the reliability of biometric technology (Jain, 2008). The three main areas of the use of biometrics are commercial, government and forensic (Jain, 2004). Securing borders was during the war on drugs was one of the applications of biometric at first (Ceyham, 2008:114). The extending budget size of the government followed the development of biometrics (Wilson, 2007:209). Later, the affairs of global safety risk provided the public and political support for extensive uses of biometric.

Biometric authentication is a definite, rational technique to demonstrate an individual’s identity. And the internet of things is the change in how we interact and connect with the world. Physiological and Behavioral are two important classes for the division of biometric characters. Physiological: It includes fingerprint, hand, iris, face, and DNA. Behavioral: It involves keystroke, signature, and voice. (Subha, R., 2017) A password can be copied easily; these all cannot be easily replicated. Now, even the new Apple and Samsung mobile phones, the latest desktop and laptop computers carry or biometric implant sensors. IOT along with Biometrics helps with the scalable security solution of every kind keeping ahead of cybercriminals. Side by side, these two cannot only undo bank apps, email accounts but every other electronic device and it’s only limited up to our imagination.

 

Hurdles On Security And Big Data

The body can provide millions of information, and it might be replaced making one, who possesses that body unnecessary. (Aas, 2006:154) Hence, IOT is blamed for treating the individual like objects. (Adey, 2004) Also, many authors criticized the biometric system is the reason for social exclusion. (Wickens, 2005, Ackleson, 2005; Wilson, 2007; Ceyhan, 2008) Internet of things, biometrics, and big data always come side to side. The huge challenge is managing, manipulating and withdrawing the massive amount of data from IoT data, which results in strict privacy and security reflection. Data and data use for the logical purpose isn’t unique; new is the tremendous amount of data available now. So, the considerable challenge prevailing is to extend the techniques to take care of these significant data available on the network. (Pathak, P., Vyas, N., and Joshi, S., 2017) Some of the other issues are mentioned below:

In the United Arab, the system needs a continual update with the new individual data, and they’re not chea(Rosenzweig, 2004:3).
Insufficient knowledge of the functioning of IOT based biometrics causes possible risk for necessary data.

A single particular mistake and it accounts to the reaction in the chain causing deactivation.
The security breaches could open if there’s improper functioning of the particular device and also because of software misconduct (Subha, R., 2017).

Along with all these, data integrity is also one major factor, causing a problem in IOT. The ability to make sure of the data not being replicated or changed is the integrity of data. RFID tags used cannot be operated with a high level of intelligence, which raises the issue of its generated data being modified (Juels, 2006).

Big Data And Privacy Way Out

To prevent the disclosure of data, the management of big data is essential. The following solutions could be adapted as the way out of this severe problem:
Z-wave: ZenSys developed a wireless low-power communication protocol, which also supports collision avoidance. (Al-Fuqaha et al. (2015) and Gomez and Paradells (2010))
Bluetooth low-energy: IOT applications in the health system, home and public entertainments and other aspects have been supported due to the development of Bluetooth low-energy. (Frank et al., 2014)
Infrastructure protocols: It helps in communication infrastructure for the support of different IOT applications and services.

Security-enhancing techniques: Joining billion of devices lead to a significant challenge which is security. A combination of perceptual hashing techniques and zero-knowledge proof of knowledge protocols helps to solve this problem. (Pathak, P., Vyas, N., and Joshi, S., 2017)

Multicast domain name system: It sends a multicast message to all surrounding nodes and doesn’t stop even if there’s a failure in the infrastructure. (Al-Fuqaha et al., 2015)

Conclusion

The world is already developing. As the Internet is becoming people’s basic need, it’s time to make it more advanced and accurate. Now, even the basic regular toaster at home now has MCU that makes us choose the darkness of toast and on the top of that provides safety. And the refrigerator talks and creates a record of what’s kept inside it. Only, this process is not enough. HVAC, an energy-aware system helps in the energy consumption providing the report of what’s going on in the house. And just five years from now, cars will have more than fifty percent more electronics due to the development in electrification. Maybe later they will not even need a driver. Factories, transportation, school systems, stadium, and other public places are at a pace of changes. Changes are going on in almost every aspect. Connecting those smart devices to the web has started at least in a slow way. Internet of Things has been attached to millions of technologies like a wildfire, and it is unstoppable. In just a few decades from now, it will take over each aspect and help the advancement of the world.

 

References

 

Johnson, B. (2015) How the Internet of Things Works. howstuffworks [online]. pp. 1-7. [Accessed 26 December 2018].

Pathak, P., Vyas, N. and Joshi, S. (2017) Security Challenges for Communication on IoT & Big Data. International Journal of Advanced Research in Computer Science [online]. Volume 8 (No. 3), pp. 431-436. [Accessed 28 December 2018].

Sarhan, Q. I. (2018) Internet of things: a survey of challenges and issues. Int. J. Internet of Things and Cyber-Assurance [online]. Volume 1 (No. 1), pp. 40-75. [Accessed 29 December 2018].

Subha, R. (2017)sed 26 December 2018].
University of Leicester, Technologies of Control (2017) Biometrics [online]. England: University of Leicester. Available from: https://www.le.ac.uk/oerresources/criminology/msc/unit8/page_17.htm [Accessed 27 December 2018].

I am a Web Designer at Welcome Advertising and Marketing Pvt. Ltd. one of the leading advertising agency in Nepal. Previously, I worked as a web designer for ceotab.com. I am also a freelance content writer for a couple of websites. I am currently studying B.Sc. Computing (Hons.) at The British College, Nepal.

Start a discussion