Discreet verification of user identity in pervasive computing environments using a non-intrusive technique

被引:0
|
作者
Al-Karkhi, Ameera [1 ]
Al-Yasiri, Adil [2 ]
Linge, Nigel [2 ]
机构
[1] Ryerson Univ, Dept Elect & Comp Engn, Toronto, ON M5B 2K3, Canada
[2] Univ Salford, Sch Comp Sci & Engn, Salford M5 4WT, Lancs, England
关键词
Pervasive computing; Identity-management systems; Identity verification; Behaviour inference; NETWORK;
D O I
10.1016/j.compeleceng.2014.10.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new approach for verifying user identity in pervasive environments using a non-intrusive behaviour tracking technique that offers minimum interruption to the user's activities. The technique, termed Non-intrusive Identity Assertion System (NIAS), uses knowledge of how the user uses the environment's services to infer their identity. The technique monitors user behaviour through identifying certain types of activity without the need for detailed tracking of user behaviour, thus minimising intrusion on the user's normal activities. The technique was evaluated using a simulated environment to assess its reliability. Simulation results show that the technique can be applied in various situations such as strict and relaxed security settings by applying different security policies. They also show that the technique is particularly effective where the environment has a mixture of high and low security resources in which case reliability could exceed 99%. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:102 / 114
页数:13
相关论文
共 50 条
  • [1] Non-Intrusive User Identity Provisioning in the Internet of Things
    Al-Karkhi, Ameera
    Al-Yasiri, Adil
    Jaseemuddin, Muhammad
    [J]. MOBIWAC'14: PROCEEDINGS OF THE 12TH ACM INTERNATIONAL SYMPOSIUM ON MOBILITY MANAGEMENT AND WIRELESS ACCESS, 2014, : 82 - 90
  • [2] Carpus: A Non-Intrusive User Identification Technique for Interactive Surfaces
    Ramakers, Raf
    Vanacken, Davy
    Luyten, Kris
    Coninx, Karin
    Schoning, Johannes
    [J]. UIST'12: PROCEEDINGS OF THE 25TH ANNUAL ACM SYMPOSIUM ON USER INTERFACE SOFTWARE AND TECHNOLOGY, 2012, : 35 - 44
  • [3] A new non-intrusive technique for the construction of admissible stress fields in model verification
    Ladeveze, Pierre
    Chamoin, Ludovic
    Florentin, Eric
    [J]. COMPUTER METHODS IN APPLIED MECHANICS AND ENGINEERING, 2010, 199 (9-12) : 766 - 777
  • [4] Breathing-based Continuous Non-intrusive User Verification Leveraging Commodity WiFi
    Dai, Huan
    Jiang, Jingjing
    Ma, Jiaju
    Huang, He
    Liu, Hongbo
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2022, 24 (02) : 209 - 222
  • [5] Evaluation of Non-Intrusive Positioning for Public Environments
    Tsiamitros, Nikolaos
    Rumaney, Wasiq
    Prehofer, Christian
    Brunke, Juergen
    Wilz, Ingo
    Pipelidis, Georgios
    [J]. INTERNATIONAL CONFERENCE ON INDOOR POSITIONING AND INDOOR NAVIGATION (IPIN 2021), 2021,
  • [6] Non-intrusive load recognition using color encoding in edge computing
    Chen J.
    Wang X.
    Zhang X.
    [J]. Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument, 2020, 41 (09): : 12 - 19
  • [7] Understanding identity exposure in pervasive computing environments
    Zhu, Feng
    Carpenter, Sandra
    Kulkarni, Ajinkya
    [J]. PERVASIVE AND MOBILE COMPUTING, 2012, 8 (05) : 777 - 794
  • [8] Non-intrusive debug technique for embedded programming
    Moore, LJ
    Moya, AR
    [J]. ISSRE 2003: 14TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2003, : 375 - 380
  • [9] Non-Intrusive Technique for Pathological Voice Classification using Jitter And Shimmer
    Sripriya, N.
    Poornima, S.
    Shivaranjani, R.
    Thangaraju, Preethi
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND SIGNAL PROCESSING (ICCCSP), 2017, : 240 - 245
  • [10] End-user Configuration for Pervasive Computing Environments
    Tuttlies, Verena
    Schiele, Gregor
    Becker, Christian
    [J]. CISIS: 2009 INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, VOLS 1 AND 2, 2009, : 487 - 493