SlideShare a Scribd company logo
1 of 2
Download to read offline
Role of Biometrics in IoT - Bahaa Abdul Hadi
Biometrics in identification has become popular in every sector. IoT or Internet of Things
is an area where biometrics can play an important role. The IoT allows devices like
personal digital assistants, smartwatches, smartphones, and laptops to control other
devices. IoT can be used to make a smart home. It also has powerful applications in
agriculture, healthcare, and other fields.
Bahaa Abdul Hadi prompts that as the name suggests, IoT requires internet
connectivity. This exposes the devices to attack by hackers. Security is a key issue, and
it is important to have robust authentication systems. Biometrics offers a powerful and
effective way of securing IoT systems and devices.
Biometrics in IoT
Access to IoT devices need to be secured. Commonly, this is done using passwords or
keys. However, hackers can easily break into systems secured by passwords. Here is
where biometric would be extremely helpful in securing the system. It is virtually
impossible to spoof a biometric system.
Using biometrics is a fool-proof way of ensuring IoT security. Some of the biometric
methods that can be used for authentication are:
1. Fingerprint identification: The fingerprints of users are stored on the database.
They need to use a fingerprint scanner to gain access to the system.
2. Facial recognition: This feature is now available even on smartphones make it
easy to use. The features of the user’s face are stored on the database to create
a pattern. The system then looks for a pattern match to grant access.
3. Voice recognition: The use of voice assistants like Alexa and Siri have become
common. Voice recognition involves training the system to recognize the voice of
a user. It is a very convenient way of authentication.
It is even possible to use behavioral tracking to identify a person. The use of AI can
make it easy to recognize a user based on their behavior (eg: the way they type using
the keyboard).
Bahaa Abdul Hadi
It is estimated that by 2025, there would be more than 75 billion devices in the IoT
market. This makes it all the more important to ensure stringent security measures.
Biometric can help in securing IoT systems by offering a seamless method of
authentication.
Thank you for your interest in Bahaa Abdul Hadi blogs. For more information, please
visit www.bahaaabdulhadi.com.
Bahaa Abdul Hadi

More Related Content

Similar to Role of Biometrics in IoT - Bahaa Abdul Hadi.pdf

Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxvoversbyobersby
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxvrickens
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIVR Technology Group
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issuesijtsrd
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfVLink Inc
 
Personal data breaches and securing IoT devices· By Damon Culber.docx
Personal data breaches and securing IoT devices· By Damon Culber.docxPersonal data breaches and securing IoT devices· By Damon Culber.docx
Personal data breaches and securing IoT devices· By Damon Culber.docxherbertwilson5999
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
The How of Biometrics
The How of BiometricsThe How of Biometrics
The How of BiometricsPeachy Essay
 
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSecurity and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSysfore Technologies
 
practical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome thempractical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome themsaipriyadonthula
 
Applications of Iot.pptx
Applications of Iot.pptxApplications of Iot.pptx
Applications of Iot.pptxDhruv Kamal
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecurityCigniti Technologies Ltd
 
IoT and security
IoT and securityIoT and security
IoT and securityIET India
 
Biometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBiometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBahaa Abdulhadi
 
IoT identity management: a comprehensive guide to creating secure IoT device ...
IoT identity management: a comprehensive guide to creating secure IoT device ...IoT identity management: a comprehensive guide to creating secure IoT device ...
IoT identity management: a comprehensive guide to creating secure IoT device ...Neil Johnson
 

Similar to Role of Biometrics in IoT - Bahaa Abdul Hadi.pdf (20)

Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
IoT Trends
IoT Trends IoT Trends
IoT Trends
 
GHC-2014-Lavanya
GHC-2014-LavanyaGHC-2014-Lavanya
GHC-2014-Lavanya
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdf
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Personal data breaches and securing IoT devices· By Damon Culber.docx
Personal data breaches and securing IoT devices· By Damon Culber.docxPersonal data breaches and securing IoT devices· By Damon Culber.docx
Personal data breaches and securing IoT devices· By Damon Culber.docx
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
The How of Biometrics
The How of BiometricsThe How of Biometrics
The How of Biometrics
 
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSecurity and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
 
practical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome thempractical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome them
 
Applications of Iot.pptx
Applications of Iot.pptxApplications of Iot.pptx
Applications of Iot.pptx
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
IoT and security
IoT and securityIoT and security
IoT and security
 
Biometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBiometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen Authentication
 
IoT identity management: a comprehensive guide to creating secure IoT device ...
IoT identity management: a comprehensive guide to creating secure IoT device ...IoT identity management: a comprehensive guide to creating secure IoT device ...
IoT identity management: a comprehensive guide to creating secure IoT device ...
 

More from Bahaa Abdulhadi

Biometric Analytics for Border Control..
Biometric Analytics for Border Control..Biometric Analytics for Border Control..
Biometric Analytics for Border Control..Bahaa Abdulhadi
 
Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.Bahaa Abdulhadi
 
Biometric Analytics in Healthcare Domain
Biometric Analytics in Healthcare DomainBiometric Analytics in Healthcare Domain
Biometric Analytics in Healthcare DomainBahaa Abdulhadi
 
Implications of Biometric Data Analysis.
Implications of Biometric Data Analysis.Implications of Biometric Data Analysis.
Implications of Biometric Data Analysis.Bahaa Abdulhadi
 
Impact of Biometric Analytics in BSFI Vertical
Impact of Biometric Analytics in BSFI VerticalImpact of Biometric Analytics in BSFI Vertical
Impact of Biometric Analytics in BSFI VerticalBahaa Abdulhadi
 
Biometric Analytics & Workplace Security
Biometric Analytics & Workplace SecurityBiometric Analytics & Workplace Security
Biometric Analytics & Workplace SecurityBahaa Abdulhadi
 
Biometric Analytics: The Future of Security
Biometric Analytics: The Future of SecurityBiometric Analytics: The Future of Security
Biometric Analytics: The Future of SecurityBahaa Abdulhadi
 
Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?Bahaa Abdulhadi
 
Neural Biometrics for Healthcare
Neural Biometrics for HealthcareNeural Biometrics for Healthcare
Neural Biometrics for HealthcareBahaa Abdulhadi
 
Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?Bahaa Abdulhadi
 
The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram) The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram) Bahaa Abdulhadi
 
Next chapter in biometrics
Next chapter in biometrics Next chapter in biometrics
Next chapter in biometrics Bahaa Abdulhadi
 
The Future of Biometric Patterns
The Future of Biometric PatternsThe Future of Biometric Patterns
The Future of Biometric PatternsBahaa Abdulhadi
 
Facial Recognition Biometric Patterns
Facial Recognition Biometric PatternsFacial Recognition Biometric Patterns
Facial Recognition Biometric PatternsBahaa Abdulhadi
 
Biometric Patterns in Healthcare
Biometric Patterns in HealthcareBiometric Patterns in Healthcare
Biometric Patterns in HealthcareBahaa Abdulhadi
 
Biometric Patterns & Security
Biometric Patterns & SecurityBiometric Patterns & Security
Biometric Patterns & SecurityBahaa Abdulhadi
 
Privacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric PatternsPrivacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric PatternsBahaa Abdulhadi
 
Understanding Biometric Patterns
Understanding Biometric PatternsUnderstanding Biometric Patterns
Understanding Biometric PatternsBahaa Abdulhadi
 
Role of Biometrics in Law Enforcement
Role of Biometrics in Law EnforcementRole of Biometrics in Law Enforcement
Role of Biometrics in Law EnforcementBahaa Abdulhadi
 

More from Bahaa Abdulhadi (20)

Biometric Analytics for Border Control..
Biometric Analytics for Border Control..Biometric Analytics for Border Control..
Biometric Analytics for Border Control..
 
Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.
 
Biometric Analytics in Healthcare Domain
Biometric Analytics in Healthcare DomainBiometric Analytics in Healthcare Domain
Biometric Analytics in Healthcare Domain
 
Implications of Biometric Data Analysis.
Implications of Biometric Data Analysis.Implications of Biometric Data Analysis.
Implications of Biometric Data Analysis.
 
Impact of Biometric Analytics in BSFI Vertical
Impact of Biometric Analytics in BSFI VerticalImpact of Biometric Analytics in BSFI Vertical
Impact of Biometric Analytics in BSFI Vertical
 
Biometric Analytics & Workplace Security
Biometric Analytics & Workplace SecurityBiometric Analytics & Workplace Security
Biometric Analytics & Workplace Security
 
Biometric Analytics: The Future of Security
Biometric Analytics: The Future of SecurityBiometric Analytics: The Future of Security
Biometric Analytics: The Future of Security
 
Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?
 
Neural Biometrics for Healthcare
Neural Biometrics for HealthcareNeural Biometrics for Healthcare
Neural Biometrics for Healthcare
 
Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?
 
The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram) The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram)
 
Next chapter in biometrics
Next chapter in biometrics Next chapter in biometrics
Next chapter in biometrics
 
The Future of Biometric Patterns
The Future of Biometric PatternsThe Future of Biometric Patterns
The Future of Biometric Patterns
 
Facial Recognition Biometric Patterns
Facial Recognition Biometric PatternsFacial Recognition Biometric Patterns
Facial Recognition Biometric Patterns
 
Biometric Patterns in Healthcare
Biometric Patterns in HealthcareBiometric Patterns in Healthcare
Biometric Patterns in Healthcare
 
Biometric Patterns & Security
Biometric Patterns & SecurityBiometric Patterns & Security
Biometric Patterns & Security
 
Privacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric PatternsPrivacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric Patterns
 
Understanding Biometric Patterns
Understanding Biometric PatternsUnderstanding Biometric Patterns
Understanding Biometric Patterns
 
BAHADI - AUG06.pdf
BAHADI - AUG06.pdfBAHADI - AUG06.pdf
BAHADI - AUG06.pdf
 
Role of Biometrics in Law Enforcement
Role of Biometrics in Law EnforcementRole of Biometrics in Law Enforcement
Role of Biometrics in Law Enforcement
 

Recently uploaded

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

Role of Biometrics in IoT - Bahaa Abdul Hadi.pdf

  • 1. Role of Biometrics in IoT - Bahaa Abdul Hadi Biometrics in identification has become popular in every sector. IoT or Internet of Things is an area where biometrics can play an important role. The IoT allows devices like personal digital assistants, smartwatches, smartphones, and laptops to control other devices. IoT can be used to make a smart home. It also has powerful applications in agriculture, healthcare, and other fields. Bahaa Abdul Hadi prompts that as the name suggests, IoT requires internet connectivity. This exposes the devices to attack by hackers. Security is a key issue, and it is important to have robust authentication systems. Biometrics offers a powerful and effective way of securing IoT systems and devices. Biometrics in IoT Access to IoT devices need to be secured. Commonly, this is done using passwords or keys. However, hackers can easily break into systems secured by passwords. Here is where biometric would be extremely helpful in securing the system. It is virtually impossible to spoof a biometric system. Using biometrics is a fool-proof way of ensuring IoT security. Some of the biometric methods that can be used for authentication are: 1. Fingerprint identification: The fingerprints of users are stored on the database. They need to use a fingerprint scanner to gain access to the system. 2. Facial recognition: This feature is now available even on smartphones make it easy to use. The features of the user’s face are stored on the database to create a pattern. The system then looks for a pattern match to grant access. 3. Voice recognition: The use of voice assistants like Alexa and Siri have become common. Voice recognition involves training the system to recognize the voice of a user. It is a very convenient way of authentication. It is even possible to use behavioral tracking to identify a person. The use of AI can make it easy to recognize a user based on their behavior (eg: the way they type using the keyboard). Bahaa Abdul Hadi
  • 2. It is estimated that by 2025, there would be more than 75 billion devices in the IoT market. This makes it all the more important to ensure stringent security measures. Biometric can help in securing IoT systems by offering a seamless method of authentication. Thank you for your interest in Bahaa Abdul Hadi blogs. For more information, please visit www.bahaaabdulhadi.com. Bahaa Abdul Hadi