Redirigiendo al acceso original de articulo en 15 segundos...
Inicio  /  Applied System Innovation  /  Vol: 2 Par: 1 (2019)  /  Artículo
ARTÍCULO
TITULO

Design and Implementation of a Contextual-Based Continuous Authentication Framework for Smart Homes

Yosef Ashibani    
Dylan Kauling and Qusay H. Mahmoud    

Resumen

There has been a rapid increase in the number of Internet of Things (IoT) devices in the last few years, providing a wide range of services such as camera feeds, light controls, and door locks for remote access. Access to IoT devices, whether within the same environment or remotely via the Internet, requires proper security mechanisms in order to avoid disclosing any secure information or access privileges. Authentication, on which other security classes are built, is the most important part of IoT security. Without ensuring that the authorized party is who it claims to be, other security factors would be useless. Additionally, with the increased mobility of IoT devices, traditional authentication mechanisms, such as a username and password, are less effective. Numerous security challenges in the IoT domain have resulted in the proposal of many different approaches to authentication. Many of these methods require either carrying an authentication token, such as a smartcard, or restricting access to a particular physical location. Considering that most IoT devices contain a wide array of sensors, a large amount of contextual information can be provided. Thus, real-time security mechanisms can protect user access by, for example, utilizing contextual information to validate requests. A variety of contextual information can be retrieved to strengthen the authentication process, both at the time of access request and throughout the entire access session, without requiring user interaction, which avoids the risk of being discovered by attackers of these features. In this paper, we introduce a continuous authentication framework that integrates contextual information for user authentication in smart homes. The implementation and evaluation show that the framework can protect smart devices against unauthorized access from both anonymous and known users, either, locally or remotely, in a flexible manner and without requiring additional user intervention.

 Artículos similares

       
 
Liangtian Wang, Jie Zhou, Yuexin Chang and Hao Xu    
In recent years, electrochemical descaling technology has gained widespread attention due to its environmental friendliness and ease of operation. However, its single-pass removal efficiency could be higher, severely limiting its practical application. T... ver más
Revista: Water

 
Lucas Schmidt Goecks, Anderson Felipe Habekost, Antonio Maria Coruzzolo and Miguel Afonso Sellitto    
Digital transformations in manufacturing systems confer advantages for enhancing competitiveness and ensuring the survival of companies by reducing operating costs, improving quality, and fostering innovation, falling within the overarching umbrella of I... ver más

 
WoonSeong Jeong, ByungChan Kong and Sang-Guk Yum    
The demand for compact housing is on the rise, driven by the need for floor plans that accommodate stakeholders? preferences. However, clients frequently struggle to convey their spatial needs to professionals, such as architects, due to a lack of means ... ver más
Revista: Applied Sciences

 
João Paulo Oliveira Marum, H. Conrad Cunningham, J. Adam Jones and Yi Liu    
Two recent studies addressed the problem of reducing transitional turbulence in applications developed in C# on .NET. The first study investigated this problem in desktop and Web GUI applications and the second in virtual and augmented reality applicatio... ver más
Revista: Algorithms

 
Yohanes Yohanie Fridelin Panduman, Nobuo Funabiki, Evianita Dewi Fajrianti, Shihao Fang and Sritrusta Sukaridhoto    
In this paper, we have developed the SEMAR (Smart Environmental Monitoring and Analytics in Real-Time) IoT application server platform for fast deployments of IoT application systems. It provides various integration capabilities for the collection, displ... ver más
Revista: Information