Digital memories based mobile user authentication for IoT

Nathan Shone, Chelsea Dobbins, William Hurst, Qi Shi

Research output: Chapter in Book/Report/Conference proceedingConference paperAcademicpeer-review

17 Citations (Scopus)

Abstract

The increasing number of devices within the IoT is raising concerns over the efficiency and exploitability of existing authentication methods. The weaknesses of such methods, in particular passwords, are well documented. Although alternative methods have been proposed, they often rely on users being able to accurately recall complex and often unmemorable information. With the profusion of separate online accounts, this can often be a difficult task. The emerging digital memories concept involves the creation of a repository of memories specific to individuals. We believe this abundance of personal data can be utilised as a form of authentication. In this paper, we propose our digital memories based two-factor authentication mechanism, and also present our promising evaluation results.

Original languageEnglish
Title of host publicationProceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015
EditorsLuigi Atzori, Xiaolong Jin, Stephen Jarvis, Lei Liu, Ramon Aguero Calvo, Jia Hu, Geyong Min, Nektarios Georgalas, Yulei Wu
PublisherIEEE
Pages1796-1802
Number of pages7
ISBN (Electronic)9781509001545
DOIs
Publication statusPublished - 22 Dec 2015
Externally publishedYes
Event15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015 - Liverpool, United Kingdom
Duration: 26 Oct 201528 Oct 2015

Publication series

NameProceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015

Conference/symposium

Conference/symposium15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015
Country/TerritoryUnited Kingdom
CityLiverpool
Period26/10/1528/10/15

Keywords

  • Authentication
  • Digital memories
  • IoT
  • Security

Fingerprint

Dive into the research topics of 'Digital memories based mobile user authentication for IoT'. Together they form a unique fingerprint.

Cite this