Article ID Journal Published Year Pages File Type
454756 Computers & Security 2013 10 Pages PDF
Abstract

•We implement a prototype for continuous authentication in proximity-based services.•We also present a pseudo-anonymous scheme that overcomes some limitations.•We analyse both schemes against different attacker models, comparing their strengths.

Continuous authentication is mainly associated with the use of biometrics to guarantee that a resource is being accessed by the same user throughout the usage period. Wireless devices can also serve as a supporting technology for continuous authentication or even as a complete alternative to biometrics when accessing proximity-based services.In this paper we present the implementation of a secure, non-invasive continuous authentication scheme supported by the use of Wearable Wireless Devices (WWD), which allow users to gain access to proximity-based services while preserving their privacy. Additionally we devise an improved scheme that circumvents some of the limitations of our implementation.

Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, , ,