3,710 research outputs found

    Challenges of Multi-Factor Authentication for Securing Advanced IoT (A-IoT) Applications

    Full text link
    The unprecedented proliferation of smart devices together with novel communication, computing, and control technologies have paved the way for the Advanced Internet of Things~(A-IoT). This development involves new categories of capable devices, such as high-end wearables, smart vehicles, and consumer drones aiming to enable efficient and collaborative utilization within the Smart City paradigm. While massive deployments of these objects may enrich people's lives, unauthorized access to the said equipment is potentially dangerous. Hence, highly-secure human authentication mechanisms have to be designed. At the same time, human beings desire comfortable interaction with their owned devices on a daily basis, thus demanding the authentication procedures to be seamless and user-friendly, mindful of the contemporary urban dynamics. In response to these unique challenges, this work advocates for the adoption of multi-factor authentication for A-IoT, such that multiple heterogeneous methods - both well-established and emerging - are combined intelligently to grant or deny access reliably. We thus discuss the pros and cons of various solutions as well as introduce tools to combine the authentication factors, with an emphasis on challenging Smart City environments. We finally outline the open questions to shape future research efforts in this emerging field.Comment: 7 pages, 4 figures, 2 tables. The work has been accepted for publication in IEEE Network, 2019. Copyright may be transferred without notice, after which this version may no longer be accessibl

    Conceivable security risks and authentication techniques for smart devices

    Get PDF
    With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques

    Identification of Biometric-Based Continuous user Authentication and Intrusion Detection System for Cluster Based Manet

    Get PDF
    Mobile ad hoc is an infrastructure less dynamic network used in many applications; it has been targets of various attacks and makes security problems. This work aims to provide an enhanced level of security by using the prevention based and detection based approaches such as authentication and intrusion detection. The multi-model biometric technology is used for continuous authentication and intrusion detection in high security cluster based MANET. In this paper, an attempt has been made to combine continuous authentication and intrusion detection. In this proposed scheme, Dempster-Shafer theory is used for data fusion because more than one device needs to be chosen and their observation can be used to increase observation accuracy

    Analysis and Improvement in Tracking & Security of Wireless Body Sensor Network with the help of Quantum Cryptography: - A Retrospective View on Literature Survey

    Get PDF
    The wireless nature of the network and the wide variety of sensors offer numerous new, practical and innovative applications to improve health care and the Quality of Life. Using a WBSN, the patient experiences a greater physical mobility and is no longer compelled to stay in the hospital. In this paper, we also present an idea to improve healthcare systems in India with the help of telecommunication and information technology by using wearable and implantable body sensor nodes which does not affect the mobility of the patients with extra security and advance feature. A WBSN should ensure the accurate sensing, tracking of the signal from the body, carry out low-level processing of the sensor signal and wirelessly transmit the processed signal to a local processing unit. In the proposed system, WBSNs, a sparse network of sensors are deployed either directly on the human body, inside the body or embedded in everyday clothes, to record and transmit health data. Body Sensors record and transmit data to a Body Central Unit which aggregates data sent by all Body Sensors and relays the aggregation to a hospital monitoring station from where healthcare professionals can remotely monitor the health parameters of patients or other individuals. This will help the authorized care giver easily diagnose the problem and make available the quick treatment to patient. The security of these devices is very important factor to make secure the personal data of any patient. Thus no other unauthorized person can get information about the patient disease etc which help to protect privacy of user and data. The primary objective of this proposed work is to propose effective security and tracking technique for sensor body wireless network with the help of new and effective technique Quantum Cryptography which provides extra security from all type of dangerous attacks and threats

    A comprehensive survey of wireless body area networks on PHY, MAC, and network layers solutions

    Get PDF
    Recent advances in microelectronics and integrated circuits, system-on-chip design, wireless communication and intelligent low-power sensors have allowed the realization of a Wireless Body Area Network (WBAN). A WBAN is a collection of low-power, miniaturized, invasive/non-invasive lightweight wireless sensor nodes that monitor the human body functions and the surrounding environment. In addition, it supports a number of innovative and interesting applications such as ubiquitous healthcare, entertainment, interactive gaming, and military applications. In this paper, the fundamental mechanisms of WBAN including architecture and topology, wireless implant communication, low-power Medium Access Control (MAC) and routing protocols are reviewed. A comprehensive study of the proposed technologies for WBAN at Physical (PHY), MAC, and Network layers is presented and many useful solutions are discussed for each layer. Finally, numerous WBAN applications are highlighted

    Smart vest for respiratory rate monitoring of COPD patients based on non-contact capacitive sensing

    Get PDF
    In this paper, a first approach to the design of a portable device for non-contact monitoring of respiratory rate by capacitive sensing is presented. The sensing system is integrated into a smart vest for an untethered, low-cost and comfortable breathing monitoring of Chronic Obstructive Pulmonary Disease (COPD) patients during the rest period between respiratory rehabilitation exercises at home. To provide an extensible solution to the remote monitoring using this sensor and other devices, the design and preliminary development of an e-Health platform based on the Internet of Medical Things (IoMT) paradigm is also presented. In order to validate the proposed solution, two quasi-experimental studies have been developed, comparing the estimations with respect to the golden standard. In a first study with healthy subjects, the mean value of the respiratory rate error, the standard deviation of the error and the correlation coefficient were 0.01 breaths per minute (bpm), 0.97 bpm and 0.995 (p < 0.00001), respectively. In a second study with COPD patients, the values were -0.14 bpm, 0.28 bpm and 0.9988 (p < 0.0000001), respectively. The results for the rest period show the technical and functional feasibility of the prototype and serve as a preliminary validation of the device for respiratory rate monitoring of patients with COPD.Ministerio de Ciencia e Innovación PI15/00306Ministerio de Ciencia e Innovación DTS15/00195Junta de Andalucía PI-0010-2013Junta de Andalucía PI-0041-2014Junta de Andalucía PIN-0394-201

    Weathering the Nest: Privacy Implications of Home Monitoring for the Aging American Population

    Get PDF
    The research in this paper will seek to ascertain the extent of personal data entry and collection required to enjoy at least the minimal promised benefits of distributed intelligence and monitoring in the home. Particular attention will be given to the abilities and sensitivities of the population most likely to need these devices, notably the elderly and disabled. The paper will then evaluate whether existing legal limitations on the collection, maintenance, and use of such data are applicable to devices currently in use in the home environment and whether such regulations effectively protect privacy. Finally, given appropriate policy parameters, the paper will offer proposals to effectuate reasonable and practical privacy-protective solutions for developers and consumers
    • …
    corecore