Affiliation:
1. Cryptography and Cognitive Informatics Laboratory, AGH University of Science and Technology, 30-059 Krakow, Poland
Abstract
The IoT is a specific type of network with its own communication challenges. There are a multitude of low-power devices monitoring the environment. Thus, the need for authentication may be addressed by many available sensors but should be performed on the fly and use the personal characteristics of the device’s owner. Thus, a review and a study of the available authentication methods were performed for use in such a context, and as a result, a preliminary algorithm was proposed as a solution. The algorithm utilizes a variety of independent factors, including the user’s personal characteristics, knowledge, the context in which the authentication is taking place, and the use of steganography, to authenticate users in the dispersed environment. This algorithm encodes all of these factors into a single data vector, which is then used to verify the user’s identity or as a digital signature. Using this personalized context-aware protocol, it is possible to increase the reliability of authentication, given the emphasis on usability in low-computing-power but highly sensor-infused environments and devices. Although more testing is needed to optimize it as an industry solution, personalized protocols seem to have a future in the IoT world.
Funder
Polish Ministry of Education and Science assigned to AGH University of Science and Technology
“Excellence initiative—research university” of AGH University of Science and Technology
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference22 articles.
1. Menezes, A.J., Vanstone, S.A., and van Oorschot, P.C. (1996). Handbook of Applied Cryptography, CRC Press, Inc.. [1st ed.].
2. Hadnagy, C. (2018). Social Engineering: The Science of Human Hacking, Wiley Publishing. [2nd ed.].
3. A roadmap for security challenges in the Internet of Things;Sfar;Digit. Commun. Netw.,2018
4. Multiple classifiers in biometrics. Part 2: Trends and challenges;Fierrez;Inf. Fus.,2018
5. Traore, I., and Ahmed, E.A. (2012). Continuous Authentication Using Biometrics, IGI Global. [1st ed.].
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献