کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
454756 | 695289 | 2013 | 10 صفحه PDF | دانلود رایگان |
• We implement a prototype for continuous authentication in proximity-based services.
• We also present a pseudo-anonymous scheme that overcomes some limitations.
• We analyse both schemes against different attacker models, comparing their strengths.
Continuous authentication is mainly associated with the use of biometrics to guarantee that a resource is being accessed by the same user throughout the usage period. Wireless devices can also serve as a supporting technology for continuous authentication or even as a complete alternative to biometrics when accessing proximity-based services.In this paper we present the implementation of a secure, non-invasive continuous authentication scheme supported by the use of Wearable Wireless Devices (WWD), which allow users to gain access to proximity-based services while preserving their privacy. Additionally we devise an improved scheme that circumvents some of the limitations of our implementation.
Journal: Computers & Security - Volume 39, Part B, November 2013, Pages 117–126