Transparent authentication scheme with adaptive biometrie features for IoT networks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

With the comprehensive evolution of information communication technologies on mobile sensing objects, versatile ubiquitous networks embedded with specific-purpose sensors and intelligent wearable devices have promptly been developed and deployed, called the Internet of Things (IoT). On account of the popularity of IoT, the security issues have been promptly focused due to potential threats from IoT architectures. In consideration of the heterogeneous network property of IoT, in this paper we propose an authentication system which applies machine learning techniques to extract user bio-features as authentication tokens and transparently performs continual or real-time entity verification in the back-ground without the user's notices.

Original languageEnglish
Title of host publication2016 IEEE 5th Global Conference on Consumer Electronics, GCCE 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509023332
DOIs
StatePublished - 27 12 2016
Externally publishedYes
Event5th IEEE Global Conference on Consumer Electronics, GCCE 2016 - Kyoto, Japan
Duration: 11 10 201614 10 2016

Publication series

Name2016 IEEE 5th Global Conference on Consumer Electronics, GCCE 2016

Conference

Conference5th IEEE Global Conference on Consumer Electronics, GCCE 2016
Country/TerritoryJapan
CityKyoto
Period11/10/1614/10/16

Bibliographical note

Publisher Copyright:
© 2016 IEEE.

Keywords

  • Internet of Things (IoT)
  • machine learning
  • security
  • support vector machine
  • transparent authentication

Fingerprint

Dive into the research topics of 'Transparent authentication scheme with adaptive biometrie features for IoT networks'. Together they form a unique fingerprint.

Cite this