Wearable Security Services
نویسندگان
چکیده
Active spaces and smart rooms are quickly gaining popularity in both the research arena, and in commercial projects. Active spaces are physical spaces populated with massive numbers of specialized embedded computing devices that increase human productivity by enabling users to interact seamlessly with the surrounding environment. Security for active spaces is necessary. In such settings, it is essential to have lightweight, mobile and convenient security services for users that enable them to prove their identities and interact securely with the smart devices that populate the surrounding environment. We propose embedding the security services in a basic wearable device that is already being worn and used by many people on daily basis, the wristwatch. We describe our implementation of these wearable security services, and show how the system is used in our active space test-bed.
منابع مشابه
The Effect of Radio Waves on the Quality and Safety of Wearable Sensors in Healthcare
The industrial Internet of Things (IoT) is aiming to interconnect humans, machines, materials, processes and services in a network. Wireless Sensor Network (WSN) comprises the less power consuming, light weight and effective Sensor Nodes (SNs) for higher network performance. Radio Frequency Identification (RFID) and sensor networks are both wireless technologies that provide limitless future po...
متن کاملAn Enhanced Multi-Layered Security Framework for Context-Aware Mobile Web Services
People seeking medical attention go in search of medical centers and specialists. For them time is vital as they search for resources, the information should be available with minimum latency. With the advent of wearable computing and ubiquitous computing Context -Aware Web services can be available with much ease, it enables users to retrieve information with relation to their context. While p...
متن کاملSecurity Challenges and Selected Legal Aspects for Wearable Computing
This paper discusses information security challenges encountered during the wearIT@work project and selected legal aspects of wearable computing. Wearable computing will offer interesting opportunities to improve and reengineer work processes in organizations, but can at the same introduce alignment problems as users in organizations may adopt the new technology before organizations are prepare...
متن کاملFrictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities
Authentication and authorization are critical security layers to protect a wide range of online systems, services and content. However, the increased prevalence of wearable and mobile devices, the expectations of a frictionless experience and the diverse user environments will challenge the way users are authenticated. Consumers demand secure and privacy-aware access from any device, whenever a...
متن کاملA privacy-aware continuous authentication scheme for proximity-based access control
Continuous authentication is mainly associated with the use of biometrics to guarantee that a resource is being accessed by the same user throughout the usage period. Wireless devices can also serve as a supporting technology for continuous authentication or even as a complete alternative to biometrics when accessing proximity-based services. In this paper we present the implementation of a sec...
متن کامل