Secure, Usable Biometric Authentication Systems

Biometrics are physiological features that allow individuals to be identified. Popular biometrics include fingerprints, faces, and irises. A common use of biometric systems is to authenticate users desiring access to a system or resource. Universal Access can be promoted with biometrics. Biometrics provide a secure way to access information technology, although the use of biometrics presents challenges and opportunities unique to other authentication methods (such as passwords and tokens). Biometric systems are also vulnerable to poor usability. Such systems must be engineered with wide user accessibility and acceptability in mind, but also need to provide robust security. This paper considers the application of biometrics in Universal Access systems with regards to usability and security.

[1]  Kathy Buckner,et al.  Culture & biometrics: regional differences in the perception of biometric authentication technologies , 2009, AI & SOCIETY.

[2]  Sari Greene Security Policies and Procedures: Principles and Practices (Prentice Hall Security Series) , 2005 .

[3]  Gisela Susanne Bahr,et al.  Cyber Risks to Secure and Private Universal Access , 2011, HCI.

[4]  Constantine Stephanidis,et al.  The Universal Access Handbook , 2009 .

[5]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[6]  M. Angela Sasse,et al.  Are Passfaces More Usable Than Passwords? A Field Trial Investigation , 2000, BCS HCI.

[7]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.

[8]  Joachim Meyer,et al.  Towards Information Technology Security for Universal Access , 2011, HCI.

[9]  Arun Ross,et al.  An introduction to biometrics , 2008, ICPR 2008.

[10]  Lorrie Faith Cranor,et al.  Guest Editors' Introduction: Secure or Usable? , 2004, IEEE Secur. Priv..

[11]  Luis A. Hernández Gómez,et al.  Usability evaluation of multi-modal biometric verification systems , 2006, Interact. Comput..

[12]  Constantine Stephanidis Design for all and eInclusion , 2011 .

[13]  Simson L. Garfinkel,et al.  Design principles and patterns for computer systems that are simultaneously secure and usable , 2005 .

[14]  Andrew S. Patrick,et al.  Usability and Acceptability of Biometric Security Systems , 2004, Financial Cryptography.

[15]  Jean-Marc Robert,et al.  Security and usability: the case of the user authentication methods , 2006, IHM '06.

[16]  A. W. Roscoe,et al.  Security and Usability: Analysis and Evaluation , 2010, 2010 International Conference on Availability, Reliability and Security.

[17]  Sacha Brostoff,et al.  Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .

[18]  Ben Shneiderman,et al.  Universal usability , 2000, Commun. ACM.

[19]  Oscar Mauricio Serrano Jaimes,et al.  EVALUACION DE LA USABILIDAD EN SITIOS WEB, BASADA EN EL ESTANDAR ISO 9241-11 (International Standard (1998) Ergonomic requirements For office work with visual display terminals (VDTs)-Parts II: Guidance on usability , 2012 .

[20]  Rami Qahwaji,et al.  Users' Acceptance of Secure Biometrics Authentication System: Reliability and Validate of an Extended UTAUT Model , 2010, NDT.

[21]  Constantine Stephanidis,et al.  Universal Access in Human-Computer Interaction , 2011 .

[22]  Martina Angela Sasse Computer Security: Anatomy of a Usability Disaster, and a Plan for Recovery , 2003 .

[23]  Naveen Kumar PASSWORD IN PRACTICE: AN USABILITY SURVEY , 2011 .

[24]  Sari Stern Greene Security Policies and Procedures: Principles and Practices , 2005 .