Reliable personal identity authentication has become an important issue in a number of wireless contexts including mobile commerce, access control, and user interface (UI) control. Traditional authentication approaches such as PIN codes or password queries are facing serious security-related problems. Biometrics-based authentication techniques make use of either physiological or behavioural traits that are able to differentiate between an authorized person and a fraudulent impostor. In this paper, both biometric technology and wireless setting-based constraints that determine the feasibility and the performance of the authentication feature are specified. The most well-known biometric approaches are briefly reviewed and their feasibility for wireless use is appraised. Furthermore, a number of quantitative and qualitative parameters for evaluation are also presented. Biometric technologies are continuously advancing toward commercial implementation in wireless devices. When carefully designed and implemented, the advantage of biometric authentication arises mainly from increased convenience and coexistent improved security.
[1]
Sharath Pankanti,et al.
Evaluation techniques for biometrics-based authentication systems (FRR)
,
2000,
Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.
[2]
John Daugman,et al.
High Confidence Visual Recognition of Persons by a Test of Statistical Independence
,
1993,
IEEE Trans. Pattern Anal. Mach. Intell..
[3]
J. L. Wayman,et al.
Best practices in testing and reporting performance of biometric devices.
,
2002
.
[4]
Satoshi Hoshino,et al.
Impact of artificial "gummy" fingers on fingerprint systems
,
2002,
IS&T/SPIE Electronic Imaging.
[5]
Sharath Pankanti,et al.
On the similarity of identical twin fingerprints
,
2002,
Pattern Recognit..
[6]
Nalini K. Ratha,et al.
Biometric perils and patches
,
2002,
Pattern Recognit..