Continuous Authentication and Authorization for the Internet of Things. Shahzad, M. & Singh, M., P. IEEE Internet Computing, 21(2):86-90, 3, 2017.
Continuous Authentication and Authorization for the Internet of Things [link]Website  abstract   bibtex   
With the dawn of the Internet of Things, small but smart devices have become ubiquitous. Although these devices carry a lot of compute power and enable several interesting applications, they lack conventional interfaces such as keyboards, mice, and touchscreens. As a result, such devices can't authenticate and authorize users in familiar ways. Furthermore, unlike for conventional settings, a one-time authentication at the start of a session usually isn't appropriate for the IoT, because the application scenarios are dynamic and a user might not retain physical control or even awareness of IoT devices quite as readily as with traditional computers. Thus, users need to be continuously authenticated and authorized. Fortunately, the IoT offers interesting potential solutions for meeting these requirements. This article discusses some challenges and opportunities in developing continuous authentication and authorization approaches for the IoT while also presenting a case study of a Wi-Fi-based human authentication system called WiFiU.
@article{
 title = {Continuous Authentication and Authorization for the Internet of Things},
 type = {article},
 year = {2017},
 identifiers = {[object Object]},
 keywords = {authentication,continuous-authentication,csi,iot,iotsec,ubicomp,wi-fi},
 pages = {86-90},
 volume = {21},
 websites = {http://dx.doi.org/10.1109/mic.2017.33},
 month = {3},
 id = {eb5f7bfb-5a26-36c1-9d15-f007d1f02f55},
 created = {2018-07-12T21:32:46.028Z},
 file_attached = {false},
 profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
 group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
 last_modified = {2018-07-12T21:32:46.028Z},
 read = {false},
 starred = {false},
 authored = {false},
 confirmed = {true},
 hidden = {false},
 citation_key = {shahzad:continuous},
 source_type = {article},
 notes = {Not really about IoT, though it does have some relevance; they point out that many IoT devices will not have conventional interfaces and thus no way to identify or authenticate the device's user. They provide a little overview of the need for continuous authentication. The rest of the paper is an overview of their work using CSI to detect persons walking in a space, measuring the person's gait, and developing a behavioral-biometric gait-based identification system. It's thus more about identification than authentication, per se. Its accuracy is weak.},
 private_publication = {false},
 abstract = {With the dawn of the Internet of Things, small but smart devices have become ubiquitous. Although these devices carry a lot of compute power and enable several interesting applications, they lack conventional interfaces such as keyboards, mice, and touchscreens. As a result, such devices can't authenticate and authorize users in familiar ways. Furthermore, unlike for conventional settings, a one-time authentication at the start of a session usually isn't appropriate for the IoT, because the application scenarios are dynamic and a user might not retain physical control or even awareness of IoT devices quite as readily as with traditional computers. Thus, users need to be continuously authenticated and authorized. Fortunately, the IoT offers interesting potential solutions for meeting these requirements. This article discusses some challenges and opportunities in developing continuous authentication and authorization approaches for the IoT while also presenting a case study of a Wi-Fi-based human authentication system called WiFiU.},
 bibtype = {article},
 author = {Shahzad, Muhammad and Singh, Munindar P},
 journal = {IEEE Internet Computing},
 number = {2}
}

Downloads: 0