Abstract
The sharing of sensor data globally becomes possible by the development of wireless sensor network, cloud computing, and other related technologies. These new trends can also benefit information security. In this paper, the sensor data is involved in the authentication procedure which is one main component of security systems. Sensor aided password is proposed. In addition, the architecture for sensor aided authentication corresponding to the simple authentication scenario is also designed. Sensor data aided password generation and utilization bring convenience to users without weakening the password strength.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Top 5 Web Trends of 2009: Internet of Things, http://www.readwriteweb.com/archives/top_5_web_trends_of_2009_internet_of_things.php
Pachube, http://www.Pachube.com
Gershenfeld, N., Krikorian, R., Cohen, D.: The Internet of Things, pp. 76–81. Scientific American (2004)
Ye, J., Li, J., Zhu, Z., Gu, X., Shi, H.: PCSM: A Context Sharing Model in Peer-to-Peer Ubiquitous Computing Environment. In: 2007 International Conference on Convergence Information Technology, pp. 1868–1873. IEEE Press, New York (2007)
Lai, T., Li, W., Liang, H., Zhou, X.: FRASCS: A Framework Supporting Context Sharing. In: The 9th International Conference for Young Computer Scientists, ICYCS 2008, pp. 919–924. IEEE Press, New York (2008)
Yampolskiy, R.V.: Analyzing User Password Selection Behavior for Reduction of Password Space. In: Proceedings 2006 40th Annual IEEE International Carnahan Conferences Security Technology, pp. 109–115 (2006)
Yampolskiy, R.V.: Secure Network Authentication with PassText. In: 4th International Conference on Information Technology: New Generations (ITNG 2007), pp. 831–836. IEEE Press, New York (2007)
Monrose, F., Reiter, M.K., Wetzel, S.: Password Hardening based on Keystroke Dynamics. International Journal of Information Security 1(2), 69–83 (2001)
BioPassword, http://www.biopassword.com
Brostoff, S., Sasse, M.A.: Are Passfaces More Usable Than Passwords? A Field Trial Investigation. In: Proceedings of CHI 2000, People and Computers XIV, pp. 405–424 (2000)
Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: Authentication using graphical passwords: Basic Results. In: Proc. Human-Computer Interaction International 2005 (2005) (in press)
Take your business to a higher level with SUN. Get a free guide on getting started with cloud computing. Technical report, SUN microsystems (2009)
Jain, A., Bolle, R., Pankanti, S.: Biometrics: Personal Identification in Networked Society. Kluwer, Dordrecht (1999)
Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology 14(1), 4–20 (2004)
MATLAB function "BWAREA", http://www.mathworks.com/access/helpdesk/help/toolbox/images/bwarea.html
Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 2nd edn. Prentice Hall, Englewood Cliffs (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Huang, X., Jiang, Y., Gao, X., Fu, R., Zhang, T. (2010). Sensor Aided Authentication. In: Bandyopadhyay, S.K., Adi, W., Kim, Th., Xiao, Y. (eds) Information Security and Assurance. ISA 2010. Communications in Computer and Information Science, vol 76. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13365-7_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-13365-7_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13364-0
Online ISBN: 978-3-642-13365-7
eBook Packages: Computer ScienceComputer Science (R0)