Wearable Security Services

نویسندگان

  • Jalal Al-Muhtadi
  • M. Dennis Mickunas
  • Roy H. Campbell
چکیده

Active spaces and smart rooms are quickly gaining popularity in both the research arena, and in commercial projects. Active spaces are physical spaces populated with massive numbers of specialized embedded computing devices that increase human productivity by enabling users to interact seamlessly with the surrounding environment. Security for active spaces is necessary. In such settings, it is essential to have lightweight, mobile and convenient security services for users that enable them to prove their identities and interact securely with the smart devices that populate the surrounding environment. We propose embedding the security services in a basic wearable device that is already being worn and used by many people on daily basis, the wristwatch. We describe our implementation of these wearable security services, and show how the system is used in our active space test-bed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Effect of Radio Waves on the Quality and Safety of Wearable Sensors in Healthcare

The industrial Internet of Things (IoT) is aiming to interconnect humans, machines, materials, processes and services in a network. Wireless Sensor Network (WSN) comprises the less power consuming, light weight and effective Sensor Nodes (SNs) for higher network performance. Radio Frequency Identification (RFID) and sensor networks are both wireless technologies that provide limitless future po...

متن کامل

An Enhanced Multi-Layered Security Framework for Context-Aware Mobile Web Services

People seeking medical attention go in search of medical centers and specialists. For them time is vital as they search for resources, the information should be available with minimum latency. With the advent of wearable computing and ubiquitous computing Context -Aware Web services can be available with much ease, it enables users to retrieve information with relation to their context. While p...

متن کامل

Security Challenges and Selected Legal Aspects for Wearable Computing

This paper discusses information security challenges encountered during the wearIT@work project and selected legal aspects of wearable computing. Wearable computing will offer interesting opportunities to improve and reengineer work processes in organizations, but can at the same introduce alignment problems as users in organizations may adopt the new technology before organizations are prepare...

متن کامل

Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities

Authentication and authorization are critical security layers to protect a wide range of online systems, services and content. However, the increased prevalence of wearable and mobile devices, the expectations of a frictionless experience and the diverse user environments will challenge the way users are authenticated. Consumers demand secure and privacy-aware access from any device, whenever a...

متن کامل

A privacy-aware continuous authentication scheme for proximity-based access control

Continuous authentication is mainly associated with the use of biometrics to guarantee that a resource is being accessed by the same user throughout the usage period. Wireless devices can also serve as a supporting technology for continuous authentication or even as a complete alternative to biometrics when accessing proximity-based services. In this paper we present the implementation of a sec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001