Persistent Authentication in Smart Environments

Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

Standard

Persistent Authentication in Smart Environments. / Hansen, Mads Syska; Kirschmeyer, Martin; Jensen, Christian D.

Proceedings of the 2nd International Workshop on Combining Context with Trust, Security and Privacy (CAT 08). Technical University of Aachen, 2008. p. 31-44.

Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

Harvard

Hansen, MS, Kirschmeyer, M & Jensen, CD 2008, Persistent Authentication in Smart Environments. in Proceedings of the 2nd International Workshop on Combining Context with Trust, Security and Privacy (CAT 08). Technical University of Aachen, pp. 31-44.

APA

Hansen, M. S., Kirschmeyer, M., & Jensen, C. D. (2008). Persistent Authentication in Smart Environments. In Proceedings of the 2nd International Workshop on Combining Context with Trust, Security and Privacy (CAT 08). (pp. 31-44). Technical University of Aachen.

CBE

Hansen MS, Kirschmeyer M, Jensen CD. 2008. Persistent Authentication in Smart Environments. In Proceedings of the 2nd International Workshop on Combining Context with Trust, Security and Privacy (CAT 08). Technical University of Aachen. pp. 31-44.

MLA

Hansen, Mads Syska, Martin Kirschmeyer, and Christian D. Jensen "Persistent Authentication in Smart Environments". Proceedings of the 2nd International Workshop on Combining Context with Trust, Security and Privacy (CAT 08). Technical University of Aachen. 2008. 31-44.

Vancouver

Hansen MS, Kirschmeyer M, Jensen CD. Persistent Authentication in Smart Environments. In Proceedings of the 2nd International Workshop on Combining Context with Trust, Security and Privacy (CAT 08). Technical University of Aachen. 2008. p. 31-44.

Author

Hansen, Mads Syska; Kirschmeyer, Martin; Jensen, Christian D. / Persistent Authentication in Smart Environments.

Proceedings of the 2nd International Workshop on Combining Context with Trust, Security and Privacy (CAT 08). Technical University of Aachen, 2008. p. 31-44.

Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2008

Bibtex

@inbook{d156d8e0fc22496ebe28dde5676f0fc7,
title = "Persistent Authentication in Smart Environments",
author = "Hansen, {Mads Syska} and Martin Kirschmeyer and Jensen, {Christian D.}",
year = "2008",
pages = "31--44",
booktitle = "Proceedings of the 2nd International Workshop on Combining Context with Trust, Security and Privacy (CAT 08)",
publisher = "Technical University of Aachen",

}

RIS

TY - GEN

T1 - Persistent Authentication in Smart Environments

AU - Hansen,Mads Syska

AU - Kirschmeyer,Martin

AU - Jensen,Christian D.

PY - 2008

Y1 - 2008

N2 - Inhabitants in smart environments are often authenticated when they enter the smart environment, e.g., through biometrics or smart-/swipe-card systems. It may sometimes be necessary to re-authenticate when an inhabitant wishes to enter a restricted area or access ambient services or location based information, e.g., it is common to have swipe card terminals placed next to doors to restricted areas. This means that all access to protected resources must have individual means of authenticating users, which makes the access control system more expensive and less flexible, because access controls will not be installed unless it is absolutely necessary. The cost of installing and maintaining an authentication infrastructure and the inconvenience of repeatedly authenticating toward different location based service providers mean that new models of authentication are needed in smart environments. This paper defines a persistent authentication model for a smart environment, which tracks inhabitants in the smart environment from the point of authentication to the protected resource, thus rendering authentication persistent by correlating the initial authentication event with the access control request. We present a proof-of-concept implementation of the proposed mechanism, which employs camera based tracking with a single stationary 3D camera that uses the "time of flight" principle. A preliminary evaluation of the proposed mechanism indicates that persistent authentication is technically possible with the proposed hardware. The proposed model is sufficiently general to allow the addition of more cameras or supplemental tracking technologies, which will improve the robustness and scalability of the proposed mechanism.

AB - Inhabitants in smart environments are often authenticated when they enter the smart environment, e.g., through biometrics or smart-/swipe-card systems. It may sometimes be necessary to re-authenticate when an inhabitant wishes to enter a restricted area or access ambient services or location based information, e.g., it is common to have swipe card terminals placed next to doors to restricted areas. This means that all access to protected resources must have individual means of authenticating users, which makes the access control system more expensive and less flexible, because access controls will not be installed unless it is absolutely necessary. The cost of installing and maintaining an authentication infrastructure and the inconvenience of repeatedly authenticating toward different location based service providers mean that new models of authentication are needed in smart environments. This paper defines a persistent authentication model for a smart environment, which tracks inhabitants in the smart environment from the point of authentication to the protected resource, thus rendering authentication persistent by correlating the initial authentication event with the access control request. We present a proof-of-concept implementation of the proposed mechanism, which employs camera based tracking with a single stationary 3D camera that uses the "time of flight" principle. A preliminary evaluation of the proposed mechanism indicates that persistent authentication is technically possible with the proposed hardware. The proposed model is sufficiently general to allow the addition of more cameras or supplemental tracking technologies, which will improve the robustness and scalability of the proposed mechanism.

M3 - Article in proceedings

SP - 31

EP - 44

BT - Proceedings of the 2nd International Workshop on Combining Context with Trust, Security and Privacy (CAT 08)

PB - Technical University of Aachen

ER -