Approaches and Issues in Location-Aware Continuous Authentication

Convergence of technologies enabling physical and information security makes it possible to combine the features of location-aware and continuous authentication in a single system. We discuss the design of a location-aware continuous authentication system and discuss different implementation approaches that would strike a balance between usability and security of such a system. Issues of location privacy arising from using such systems are also discussed.

[1]  Anil K. Jain,et al.  Soft Biometric Traits for Continuous User Authentication , 2010, IEEE Transactions on Information Forensics and Security.

[2]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[3]  Jakob E. Bardram,et al.  Context-Aware User Authentication - Supporting Proximity-Based Login in Pervasive Computing , 2003, UbiComp.

[4]  Abdulmotaleb El-Saddik,et al.  Haptic-Based Biometrics: A Feasibility Study , 2006, 2006 14th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems.

[5]  Elisa Bertino,et al.  Location-Aware Authentication and Access Control Concepts and Issues , 2009, 2009 International Conference on Advanced Information Networking and Applications.

[6]  Stanislav Kurkovsky,et al.  Continuous RFID-enabled authentication and its privacy implications , 2010, 2010 IEEE International Symposium on Technology and Society.

[7]  Victor Lee Biometrics and identity fraud , 2008 .

[8]  Seppo Puuronen,et al.  Using continuous user authentication to detect masqueraders , 2003, Inf. Manag. Comput. Secur..

[9]  Roberto Sassi,et al.  A fuzzy approach to multimodal biometric continuous authentication , 2008, Fuzzy Optim. Decis. Mak..

[10]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[11]  Indrakshi Ray,et al.  LRBAC: A Location-Aware Role-Based Access Control Model , 2006, ICISS.

[12]  S. Furnell,et al.  Public awareness and perceptions of biometrics , 2007 .

[13]  Lars Kulik,et al.  Location privacy and location-aware computing , 2006 .

[14]  Akhilesh Chandra,et al.  Modeling an intelligent continuous authentication system to protect financial information resources , 2006, Int. J. Account. Inf. Syst..

[15]  Sandeep Kumar,et al.  Continuous Verification Using Multimodal Biometrics , 2007, IEEE Trans. Pattern Anal. Mach. Intell..

[16]  Tim Parker Are We Protected? The Adequacy of Existing Legal Frameworks for Protecting Privacy in the Biometric Age , 2010, ICEB.

[17]  Dorothy E. Denning,et al.  Location-based authentication: Grounding cyberspace for better security , 1996 .

[18]  John Krumm,et al.  A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.

[19]  Ali Dehghantanha,et al.  A Review of Vulnerabilities in Identity Management Using Biometrics , 2010, 2010 Second International Conference on Future Networks.

[20]  David J. Danelski,et al.  Privacy and Freedom , 1968 .

[21]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[22]  Elisa Bertino,et al.  GEO-RBAC: a spatially aware RBAC , 2005, SACMAT '05.

[23]  Dimitrios Tzovaras,et al.  Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept , 2008, EURASIP J. Adv. Signal Process..

[24]  Graça Bressan,et al.  A Continuous Authentication System Based on User Behavior Analysis , 2010, 2010 International Conference on Availability, Reliability and Security.