Affiliation:
1. KAIST, Department of Industrial Design, Daejeon, Republic of Korea Korea (Republic of)
2. Department of Human and System Engineering, UNIST, Ulsan, Republic of Korea Korea (Republic of)
Abstract
Abstract
Wearables are a rapidly emerging device category with wide-reaching use scenarios. The novel form factors and broad
potential of this technology pose new security challenges: devices are typically on and close to
a user. Furthermore, while they possess limited input and output channels, they often feature rich sensing, computing and
communication capabilities. Due to this novel context, this paper argues that researchers need to reconsider the
functional, technical and social aspects of authenticating, or securely establishing a user's identity, for wearable
devices. This paper contributes to ongoing work on this topic by reviewing wearable authentication schemes according to
the traditional classification of authentication via tokens, passwords or biometrics. The goal of this review is to
provide an illustrated overview of key advances in the area over the past decade that covers a variety of form factors
(wristbands, glasses, jewelry, etc) and modes of operation (single or multi-factor authentication, on one or multiple
devices). Finally, we tie the review together by identifying four key themes that will drive future research: the raise of
implicit authentication that requires no dedicated user action; the use of wearable devices for authentication in
conjunction with other systems; the potential and richness of current available technology and tools for wearable devices
and; the importance and challenges of maintaining privacy and security in wearable contexts.
Reference1 articles.
1. Continuous RFID - enabled authentication : Privacy implications IEEE Technology and Society pp;Kurkovsky;Magazine,2011
Cited by
31 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献