Automated biometric authentication systems help to alleviate the problems associated with existing methods of user authentication. Biometrics can improve convenience or security, or ideally both. However, security weak points will exist or will be introduced in any biometric installation, unintended by the designers of the system. These weak points will be discovered during operation of a system when the system is attacked, and the system will be attacked most successfully at the security weak points.
KeywordsAuthentication Protocol Replay Attack Impersonation Attack Authentication System Biometric System
Unable to display preview. Download preview PDF.