The Risks Of Using Biometrics For Authentication And How To Mitigate Them

The Risks Of Using Biometrics For Authentication And How To Mitigate Them

What Are Biometrics?

Biometrics refer to unique physical or behavioral characteristics used to verify an individual’s identity. Some common examples of biometrics include:

  • Fingerprints – The patterns of ridges and valleys on the fingertips are unique to each individual. Fingerprint scanners capture these patterns to match against a database for authentication.

  • Facial recognition – Facial features like the distance between eyes or the shape of the chin provide distinguishing patterns that can be matched to images in a database.

  • Iris recognition – The colored ring around the pupil contains complex patterns that are distinct for each person. Iris scanners use infrared light to capture the detail of the iris.

  • Voice recognition – The tone and frequency of an individual’s voice can be analyzed and compared to a voice signature on file.

  • Behavioral biometrics – Things like keystroke patterns, gait, and gestures can also provide identification data based on unique physical behaviors.

Biometric authentication offers some benefits over traditional passwords or PINs, primarily ease of use and the ability to connect verification directly to a person rather than something they possess or remember. However, biometrics also come with some inherent risks.

Risks of Using Biometrics

While biometrics offer strong assurance that the right person is accessing a device or account, there are some risks to consider:

Permanence

Biometric credentials like fingerprints and iris scans are permanent parts of a person. Unlike a password, they cannot be changed if compromised. Once biometric data is leaked, it could potentially be used to access systems indefinitely.

Data Leakage

If biometric databases are hacked, extremely sensitive personal data is exposed. Things like fingerprints contain way more information than a password. The impact of biometric data being leaked is significant.

Spoofing Attacks

Criminals can spoof many types of biometrics using such methods as recreating fingerprints from photos or building 3D models of faces. Recent advances in deep learning have made spoofing even more viable. Biometrics can potentially be tricked in ways that passwords can’t.

False Rejections

Biometrics are prone to “false rejections” where they fail to recognize authorized users. This can be due to changes in the biometric over time, debris obstructing a scan, or environmental factors. Excessive false rejections impair usability.

Accessibility Limitations

Certain populations may not be able to provide particular biometrics. Individuals lacking fingers cannot provide fingerprints. Recognition systems relying on facial scans discriminate against those wearing face coverings for religious reasons. Biometrics raise potential accessibility issues.

Mitigating the Risks of Biometrics

Here are some ways to help mitigate the risks outlined above when implementing biometric systems:

Use Multifactor Authentication

Require a second factor beyond biometrics for critical systems, such as a one-time password generated by an authenticator app or token. This prevents biometrics alone from providing access.

Allow Alternate Biometrics

Support multiple biometric options and allow users to enroll more than one. Provide alternatives in case individuals have issues with false rejections or inability to provide a particular biometric.

Implement Liveness Detection

Liveness detection looks for signs of an actual live person providing the biometric, making spoofing more difficult. Things like blink detection, pulse measurements, and challenge-response tests help confirm “liveness”.

Encrypt Biometric Data

Use robust encryption when storing biometric data, credentials, and templates. Make sure to encrypt communication channels and follow cybersecurity best practices to help deter data breaches.

Regularly Rotate and Update Templates

Rotate through different biometric templates over time, retaining previous templates to maintain accessibility. When templates are updated, previous templates cannot be abused even if compromised.

Carefully Control Database Access

Tightly limit and audit access to biometric databases. Provide access only to essential personnel and systems and log all access. Use the principle of least privilege.

Biometrics provide convenient and secure authentication in many cases but also incur some risks. Following best practices like the ones outlined above can help maximize the usability and security of biometric systems. Careful implementation allows organizations to benefit from biometrics while minimizing potential downsides.

Facebook
Pinterest
Twitter
LinkedIn

Newsletter

Signup our newsletter to get update information, news, insight or promotions.

Latest Post