Context-aware systems and adaptive user authentication

Kimmo Halunen, Antti Evesti

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    2 Citations (Scopus)

    Abstract

    In this paper we discuss the possibilities of context-aware systems in providing more secure user authentication. We describe some approaches in using context information in adaptive security systems, especially in adaptive user authentication. In addition, we discuss some recent results in applying the context itself as an authentication factor. Recent advances in cryptographic protocol design and adaptive, context-aware systems enable the linking of the context information to the cryptographic keys and authentication. Furthermore, new protocols make adaptive user authentication easier as it is possible to combine several different factors in a single protocol. We give some examples of this and discuss the further potential of these methods.
    Original languageEnglish
    Title of host publicationEvolving Ambient Intelligence
    Subtitle of host publicationAmI 2013 Workshops
    EditorsMichael J. O’Grady, Hamed Vahdat-Nejad, Klaus-Hendrik Wolf, Mauro Dragone, Juan Ye, Carsten Röcker, Gregory O'Hare
    Place of PublicationCham
    PublisherSpringer
    Pages240-251
    ISBN (Print)978-3-319-04405-7, 978-3-319-04406-4
    DOIs
    Publication statusPublished - 2013
    MoE publication typeA4 Article in a conference publication
    EventAmI 2013 Workshops - Dublin, Ireland
    Duration: 3 Dec 20135 Dec 2013

    Publication series

    SeriesCommunications in Computer and Information Science
    Volume413
    ISSN1865-0929

    Conference

    ConferenceAmI 2013 Workshops
    Country/TerritoryIreland
    CityDublin
    Period3/12/135/12/13

    Keywords

    • context-aware systems
    • adaptive systems
    • user authentication

    Fingerprint

    Dive into the research topics of 'Context-aware systems and adaptive user authentication'. Together they form a unique fingerprint.

    Cite this