One-Step Two-Factor Authentication with Wearable Bio-Sensors
نویسنده
چکیده
Two-step verification does not imply two-factor authentication. Conversely, two-factor authentication may not require two-step verification. With ubiquitous bio-sensors, we can strive for one-step two-factor authentication for wearable computing applications.
منابع مشابه
Gait-based Authentication using Trouser Front-Pocket Sensors
Recently, to reduce the inconvenience caused by authentication operations in portable terminals, various authentication methods based on behavior characteristics have been studied. Gait-based authentication is one of them. This authentication method identifies individuals based on walking motions measured by wearable sensors such as acceleration sensors. This study aims to improve the authentic...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملWACA: Wearable-Assisted Continuous Authentication
One-time login process in conventional authentication systems does not guarantee that the identified user is the actual user throughout the session. However, it is necessary to re-verify the user identity periodically throughout a login session without reducing the user convenience. Continuous authentication can address this issue. However, existing methods are either not reliable or not usable...
متن کاملارائه طرح احراز اصالت سبک با قابلیت گمنامی و اعتماد در اینترنت اشیا
The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases, the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...
متن کاملPerformance and security analysis of Gait-based user authentication
Verifying the identity of a user, usually referred to as user authentication, before granting access to the services or objects is a very important step in many applications. People pass through some sorts of authentication process in their daily life. For example, to prove having access to the computer the user is required to know a password. Similarly, to be able to activate a mobile phone th...
متن کامل