Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
454756 | Computers & Security | 2013 | 10 Pages |
•We implement a prototype for continuous authentication in proximity-based services.•We also present a pseudo-anonymous scheme that overcomes some limitations.•We analyse both schemes against different attacker models, comparing their strengths.
Continuous authentication is mainly associated with the use of biometrics to guarantee that a resource is being accessed by the same user throughout the usage period. Wireless devices can also serve as a supporting technology for continuous authentication or even as a complete alternative to biometrics when accessing proximity-based services.In this paper we present the implementation of a secure, non-invasive continuous authentication scheme supported by the use of Wearable Wireless Devices (WWD), which allow users to gain access to proximity-based services while preserving their privacy. Additionally we devise an improved scheme that circumvents some of the limitations of our implementation.