Digital Memories Based Mobile User Authentication for IoT

被引:13
|
作者
Shone, Nathan [1 ]
Dobbins, Chelsea [1 ]
Hurst, William [1 ]
Shi, Qi [1 ]
机构
[1] Liverpool John Moores Univ, Dept Comp Sci, Liverpool, Merseyside, England
关键词
Digital memories; authentication; IoT; security;
D O I
10.1109/CIT/IUCC/DASC/PICOM.2015.270
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing number of devices within the IoT is raising concerns over the efficiency and exploitability of existing authentication methods. The weaknesses of such methods, in particular passwords, are well documented. Although alternative methods have been proposed, they often rely on users being able to accurately recall complex and often unmemorable information. With the profusion of separate online accounts, this can often be a difficult task. The emerging digital memories concept involves the creation of a repository of memories specific to individuals. We believe this abundance of personal data can be utilised as a form of authentication. In this paper, we propose our digital memories based two-factor authentication mechanism, and also present our promising evaluation results.
引用
收藏
页码:1797 / 1803
页数:7
相关论文
共 50 条
  • [1] A digital memories based user authentication scheme with privacy preservation
    Liu, JunLiang
    Lyu, Qiuyun
    Wang, Qiuhua
    Yu, Xiangxiang
    [J]. PLOS ONE, 2017, 12 (11):
  • [2] IoT-based process management: Mobile user guidance in the digital factory
    Schönig S.
    Jablonski S.
    Ermer A.
    [J]. Informatik-Spektrum, 2019, 42 (02) : 130 - 137
  • [3] Enabling Finger-Touch-Based Mobile User Authentication via Physical Vibrations on IoT Devices
    Yang, Xin
    Yang, Song
    Liu, Jian
    Wang, Chen
    Chen, Yingying
    Saxena, Nitesh
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (10) : 3565 - 3580
  • [4] Energy-Efficient Biometrics-Based Remote User Authentication for Mobile Multimedia IoT Application
    Lee, Sungju
    Sa, Jaewon
    Cho, Hyeonjoong
    Park, Daihee
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (12): : 6152 - 6168
  • [5] E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT
    Zeng, Xianjiao
    Xu, Guangquan
    Zheng, Xi
    Xiang, Yang
    Zhou, Wanlei
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02): : 1506 - 1519
  • [6] The House That Knows You: User Authentication Based on IoT Data
    Ongun, Talha
    Oprea, Alina
    Nita-Rotaru, Cristina
    Christodorescu, Mihai
    Salajegheh, Negin
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2255 - 2257
  • [7] Ear-Touch-Based Mobile User Authentication
    Khiarak, Jalil Nourmohammadi
    Mazaheri, Samaneh
    Tayebi, Rohollah Moosavi
    [J]. MATHEMATICS, 2024, 12 (05)
  • [8] Mobile Gesture-Based iPhone User Authentication
    Khare, Karan
    Moh, Teng-Sheng
    [J]. PROCEEDINGS 2015 IEEE INTERNATIONAL CONFERENCE ON BIG DATA, 2015, : 1615 - 1621
  • [9] An Improved User Authentication Protocol for IoT
    Cui, Jianming
    Zhang, Zuowen
    Li, Hengzhong
    Sui, Rongquan
    [J]. 2018 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC 2018), 2018, : 59 - 62
  • [10] User Behaviour-Based Mobile Authentication System
    Ali, Adnan Bin Amanat
    Ponnusamy, Vasaki
    Sangodiah, Anbuselvan
    [J]. ADVANCES IN COMPUTER COMMUNICATION AND COMPUTATIONAL SCIENCES, IC4S 2018, 2019, 924 : 461 - 472