Design and Evaluation of an Authentication Framework for Wearable Devices

被引:6
作者
Alharbi, Abdullah [1 ]
Alharbi, Talal [2 ]
机构
[1] King Saud Univ, Community Coll, Dept Comp Sci, Riyadh 11437, Saudi Arabia
[2] Majmaah Univ, Coll Comp & Informat Sci, Dept Informat Technol, Al Majmaah 11952, Saudi Arabia
关键词
Wearable devices; authentication framework; usability; cybersecurity; intelligent transportation systems; MOBILE;
D O I
10.1109/ACCESS.2020.2990861
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The demand for wearable technology devices has changed in recent years, due to the fact that wearable devices (WDs) make our lives easier and more comfortable than ever before. WDs are often seen as an extension to mobile devices such as smartphones even thought the size, shape and physical specifications, i.e., the form factors are completely different. The core features of WDs are always accessible and available to users while sole input devices, e.g. keyboard does not exist. In this case, the traditional authentication methods in which users type in passwords on the system can not apply to authenticate WDs. Therefore, this paper introduces an Authentication Framework for Wearable Devices (AFWD) that basically includes an authentication model designed for WDs, capable of creating reliable and secure authentication techniques. Subjective and objective assessment of the AFWD showed that it provides usability, deployability, and security and that people are willing to use it if available. Such a framework is crucial for Intelligent Transportation Systems (ITS) as it provides reliability and trustworthiness of the data transmitted via WDs.
引用
收藏
页码:80369 / 80381
页数:13
相关论文
共 19 条
[1]  
Ashby C, 2011, I IEEE EMBS C NEUR E, P442, DOI 10.1109/NER.2011.5910581
[2]   Linking usability to software architecture patterns through general scenarios [J].
Bass, L ;
John, BE .
JOURNAL OF SYSTEMS AND SOFTWARE, 2003, 66 (03) :187-197
[3]   The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes [J].
Bonneau, Joseph ;
Herley, Cormac ;
van Oorschot, Paul C. ;
Stajano, Frank .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :553-567
[4]  
Clarke N, 2009, INT FED INFO PROC, V297, P1
[5]   A framework for continuous, transparent mobile device authentication [J].
Crawford, Heather ;
Renaud, Karen ;
Storer, Tim .
COMPUTERS & SECURITY, 2013, 39 :127-136
[6]  
Das R., 2014, BIOMETRIC TECHNOLOGY
[7]  
Enamamu Timibloudi S., 2017, P IEEE INT C COMP NE, P1
[8]  
Falaki Hossein., 2010, Diversity in smartphone usage, P179, DOI DOI 10.1145/1814433.1814453
[9]   Gait Recognition Using Wearable Motion Recording Sensors [J].
Gafurov, Davrondzhon ;
Snekkenes, Einar .
EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2009,
[10]  
Greene Kristen K., 2014, Human Aspects of Information Security, Privacy, and Trust. Second International Conference, HAS 2014, Held as Part of HCI International 2014. Proceedings: LNCS 8533, P160, DOI 10.1007/978-3-319-07620-1_15