Active Authentication for pervasive computing environments

被引:0
|
作者
Matsumiya, K [1 ]
Aoki, S [1 ]
Murase, M [1 ]
Tokuda, H [1 ]
机构
[1] Keio Univ, Grad Sch Media & Governance, Tokyo 108, Japan
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a Zero-stop Authentication model, which models the process of actively authenticating users in an environment populated with various mobile and embedded devices. In such an environment, since users are mobile, an authentication mechanism that does not disturb the user movement, and that decreases the user burden is needed. The model determines the timing constraint needed to realize "zero-stop" property from the speed of the users, size of the sensing area, and the overhead of sensing and authentication process. We also present a Zero-stop Authentication system to realize the model, and demonstrate the prototype implementation.
引用
收藏
页码:28 / 41
页数:14
相关论文
共 50 条
  • [1] Practical deniable authentication for pervasive computing environments
    Li, Fagen
    Hong, Jiaojiao
    Omala, Anyembe Andrew
    [J]. WIRELESS NETWORKS, 2018, 24 (01) : 139 - 149
  • [2] Practical deniable authentication for pervasive computing environments
    Fagen Li
    Jiaojiao Hong
    Anyembe Andrew Omala
    [J]. Wireless Networks, 2018, 24 : 139 - 149
  • [3] Private entity authentication for pervasive computing environments
    Zhu, Feng
    Mutka, Matt W.
    Ni, Lionel M.
    [J]. International Journal of Network Security, 2012, 14 (02) : 86 - 100
  • [4] The master key: A private authentication approach for pervasive computing environments
    Zhu, Feng
    Mutka, Matt W.
    Ni, Lionel M.
    [J]. PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 212 - +
  • [5] Authentication for pervasive computing
    Creese, S
    Goldsmith, M
    Roscoe, B
    Zakiuddin, I
    [J]. SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 116 - 129
  • [6] Fair authentication in pervasive computing
    Li, Jun
    Christianson, Bruce
    Loomes, Martin
    [J]. SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 132 - 143
  • [7] An authentication protocol for pervasive computing
    Li, SQ
    Zhou, JY
    Li, XX
    Chen, KF
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, 2005, 3758 : 553 - 563
  • [8] A PRIVACY-PRESERVING AUTHENTICATION SCHEME USING BIOMETRICS FOR PERVASIVE COMPUTING ENVIRONMENTS
    Yao Lin Kong Xiangwei Wu Guowei Fan Qingna Lin Chi(School of Electronics & Information Engineering
    [J]. Journal of Electronics(China), 2010, 27 (01) : 68 - 78
  • [9] A novel privacy preserving authentication and access control scheme for pervasive computing environments
    Ren, Kui
    Lou, Wenjing
    Kim, Kwangjo
    Deng, Robert
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2006, 55 (04) : 1373 - 1384
  • [10] Hierarchical trustworthy authentication for pervasive computing
    Xiao, Hannan
    Malcolm, James A.
    Christianson, Bruce
    Zhang, Ying
    [J]. 2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 87 - +