Blended Identity: Pervasive IdM for Continuous Authentication
نویسندگان
چکیده
منابع مشابه
Authentication for Pervasive Computing
Key management is fundamental to communications security, and for security in pervasive computing sound key management is particularly difficult. However, sound key management itself depends critically on sound authentication. In this paper we review current notions of entity authentication and discuss why we believe these notions are unsuitable for the pervasive domain. We then present our vie...
متن کاملContinuous Identity Authentication Using Multi-modal Physiological Sensors
The research proposed is for the construction and evaluation of an automated biometric system using a set of different unobtrusive physiological sensors (i.e., eye tracking & biosensors) that continuously authenticate the identity of the user. The system is designed to provide an added layer of security beyond point-of-entry identification methods and can be used in high and moderate security a...
متن کاملPrivate Entity Authentication for Pervasive Computing Environments
Entity authentication becomes ubiquitously necessary in pervasive computing environments. We provide taxonomy of entity authentication between keys and locks. Based on the discussion, we propose a novel authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital keys for entity authentication. The Master Key initi...
متن کاملZero Common-Knowledge Authentication for Pervasive Networks
Ad-hoc networks and even more intrinsic pervasive networks face huge security lacks. In the most general case entities need to build up a well-defined security association without any pre-established secret or common security infrastructure. Under these circumstances it turns out that without unrealistic assumptions authentication of previously unknown parties is not achievable. However, for a ...
متن کاملTriggering IDM Authentication Methods based on Device Capabilities Information
Identity management systems are a reality today in the Internet. Single sign-on (SSO) systems allow users to authenticate once in the system and interact with different services providers without the need for creating new accounts. However, most identity management systems only support a simple authentication mechanism, which most of the cases is based on login and password, with its well known...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Security & Privacy
سال: 2015
ISSN: 1540-7993
DOI: 10.1109/msp.2015.62