Sensor Aided Authentication

The sharing of sensor data globally becomes possible by the development of wireless sensor network, cloud computing, and other related technologies. These new trends can also benefit information security. In this paper, the sensor data is involved in the authentication procedure which is one main component of security systems. Sensor aided password is proposed. In addition, the architecture for sensor aided authentication corresponding to the simple authentication scenario is also designed. Sensor data aided password generation and utilization bring convenience to users without weakening the password strength.

[1]  M. Angela Sasse,et al.  Are Passfaces More Usable Than Passwords? A Field Trial Investigation , 2000, BCS HCI.

[2]  Nasir D. Memon,et al.  Authentication using graphical passwords: effects of tolerance and image choice , 2005, SOUPS '05.

[3]  Jintao Li,et al.  PCSM: A Context Sharing Model in Peer-to-Peer Ubiquitous Computing Environment , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[4]  Michael K. Reiter,et al.  Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.

[5]  Wen J. Li,et al.  FRASCS: A Framework Supporting Context Sharing , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[6]  R.V. Yampolskiy Analyzing User Password Selection Behavior for Reduction of Password Space , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[7]  Zhong Xin,et al.  Key Problems Research For E-commerce Databases Integration System , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[8]  Susan Wiedenbeck,et al.  Authentication Using Graphical Passwords: Basic Results , 2005 .

[9]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[10]  Roman V. Yampolskiy Secure Network Authentication with PassText , 2007, Fourth International Conference on Information Technology (ITNG'07).