Revisiting Context-Based Authentication in loT

被引:11
|
作者
Miettinen, Markus [1 ]
Thien Duc Nguyen [1 ]
Sadeghi, Ahmad-Reza [1 ]
Asokan, N. [2 ]
机构
[1] Tech Univ Darmstadt, Darmstadt, Germany
[2] Aalto Univ, Espoo, Finland
关键词
D O I
10.1145/3195970.3196106
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The emergence of IoT poses new challenges towards solutions for authenticating numerous very heterogeneous IoT devices to their respective trust domains. Using passwords or pre -defined keys have drawbacks that limit their use in IoT scenarios. Recent works propose to use contextual information about ambient physical properties of devices' surroundings as a shared secret to mutually authenticate devices that are co -located, e.g., the same room. In this paper, we analyze these context -based authentication solutions with regard to their security and requirements on context quality. We quantify their achievable security based on empirical real -world data from context measurements in typical IoT environments.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Context-Based Adaptive and Responsive Authentication
    Lenzini, Gabriele
    Hulsebosch, Bob
    [J]. ERCIM NEWS, 2007, (71): : 34 - 35
  • [2] Multimodal Context-Based Continuous Authentication
    Aathreya, Saandeep
    Chaudhary, Meghna
    Neal, Tempestt
    Canavan, Shaun
    [J]. 2023 IEEE INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS, IJCB, 2023,
  • [3] Context-based authentication and transport of cultural assets
    Leonardo Mostarda
    Changyu Dong
    Naranker Dulay
    [J]. Personal and Ubiquitous Computing, 2010, 14 : 321 - 334
  • [4] Context-based authentication and transport of cultural assets
    Mostarda, Leonardo
    Dong, Changyu
    Dulay, Naranker
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2010, 14 (04) : 321 - 334
  • [5] Model for adaptable context-based biometric authentication for mobile devices
    Adam Wójtowicz
    Krzysztof Joachimiak
    [J]. Personal and Ubiquitous Computing, 2016, 20 : 195 - 207
  • [6] Model for adaptable context-based biometric authentication for mobile devices
    Wojtowicz, Adam
    Joachimiak, Krzysztof
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2016, 20 (02) : 195 - 207
  • [7] An inaudible voice attack to context-based device authentication in smart IoT systems
    Mao, Jian
    Zhu, Shishi
    Liu, Jianwei
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 104
  • [8] Using Physical Context-Based Authentication against External Attacks: Models and Protocols
    Melo, Wilson S., Jr.
    Machado, Raphael C. S.
    Carmo, Luiz F. R. C.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [9] Enhancing User Authentication: An Approach Utilizing Context-Based Fingerprinting With Random Forest Algorithm
    Al-Rumaim, Akram
    Pawar, Jyoti D.
    [J]. IEEE ACCESS, 2024, 12 : 110850 - 110861
  • [10] Trident: Context-based Reverse Authentication for Phishing AP Detection in Commodity WiFi Networks
    Zhao, Peng
    Bian, Kaigui
    Chen, Ping
    Zhao, Tong
    Duan, Yichun
    Yan, Wei
    [J]. 2016 IEEE 84TH VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2016,