Asserting User Identity in Pervasive Computing Environments Using a Non-Intrusive Technique

نویسندگان

  • A. Al-Karkhi
  • A. Al-Yasiri
چکیده

Pervasive computing environments are exciting new vision of the new computing era due to the recent wide advances in wireless communication and digital electronics. These environments are small smart worlds that have many advantages such as the continuous and distributed interaction with people using a variety of wireless devices (such as mobile phones and PDAs), which are ubiquitous but provide useful services. In Pervasive Environments, it is important to establish the identity of a user interacting with that environment, in order to provide the user with the required services by the environment. The user identity information is used by the system in such environments to retrieve a variety of context information, which is necessary for providing the required services. Due to the characteristics of pervasive computing environments there is a challenge in asserting the user’s identity. In such environments, it would be impractical for users to prove their identities (through authentication) every time they cross or move among various networks. This research aims to provide an approach for verifying the user identity when interacting within a smart environment. In doing so, we aim to develop a new non-intrusive and adaptable technique for asserting the user identity. The proposed system called NonIntrusive Assertion System (NIAS) would be aware of the user’s intention and behaviour while attempting to verify their identity and maintaining confidence on the identity of the user. NIAS will have the ability to detect user's events by monitoring user’s who carry an identification device such as a smart tag. The system then uses these events in order to infer the user’s behaviour, from which the user identity can be asserted. The system should be able to cope with various situations, such as user’s losing their smart tags or people impersonating others. By implementing this system, we can tackle the intrusive nature of the periodic (repeated) users' authentication process and minimize the risk of false identities in pervasive computing environments.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Discreet verification of user identity in pervasive computing environments using a non-intrusive technique

This paper presents a new approach for verifying user identity in pervasive environments using a non-intrusive behaviour tracking technique that offers minimum interruption to the user’s activities. The technique, termed Non-intrusive Identity Assertion System (NIAS), uses knowledge of how the user uses the environment’s services to infer their identity. The technique monitors user behaviour th...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

Context-Driven Prevention of Unintended Identity Disclosure

In this paper we discuss the problem of privacy and information disclosure in ubiquitous and pervasive computing environments. We describe a framework that uses context information to selectively disclose personal information to service providers while keeping the humancomputer interaction non-intrusive. For each interaction with a service provider, our framework will take previously disclosed ...

متن کامل

Privacy, Trust and Identity in Pervasive Computing: A Review of Technical Challenges and Future Research Directions

Developments in pervasive computing introduced a new world of computing where networked processors embedded and distributed in everyday objects communicating with each other over wireless links. Computers in such environments work in the background while establishing connections among them dynamically and hence will be less visible and intrusive. Such a vision raises questions about how to mana...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010