Abstract
We propose a Zero-stop Authentication model, which models the process of actively authenticating users in an environment populated with various mobile and embedded devices. In such an environment, since users are mobile, an authentication mechanism that does not disturb the user movement, and that decreases the user burden is needed. The model determines the timing constraint needed to realize “zero-stop” property from the speed of the users, size of the sensing area, and the overhead of sensing and authentication process. We also present a Zerostop Authentication system to realize the model, and demonstrate the prototype implementation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Weiser, M.: The computer for the twenty-century. 265 (1991) 94–104 Scientific American.
Want, R., Hopper, A., Falcao, V., Gibbons, J.: The active badge location system. Technical Report 92.1, ORL, 24a Trumpington Street, Cambridge CB2 1QA (1992)
Harter, A., Hopper, A., Steggles, P., Ward, A., Webster, P.: The anatomy of a context-aware application. In: International Conference on Mobile Computing and Networking. (1999) 59–68
Okabe, H., K. Takemura, Ogata, S., Yamashita, T.: Compact vehicle sensor using a retroreflective optical scanner. In: IEEE Conference of Intelligent Transportation Systems. (1997) 201–205
ETTM On The Web: Electoronic toll collection system (2002) http://www.ettm.com/.
ITS America: Intelligent transportation system (2002) http://www.itsa.org/standards.
Dertouzos, M.L.: Control robotics: The procedural control of physical processes. In: Proceedings of the IFIP Congress. (1974) 807–813
Conway, R.W., Maxwell, M.L., Miller, L.W.: Theory of scheduling (1967) Addison-Wesley.
ETTM On The Web: Automatic vehicle identification (2002) http://www.ettm.com/avi.htm.
Corner, M., Noble, B.: Zero-interaction authentication. In: International Conference on Mobile Computing and Networking. (2002)
Cerqueira, R., Hess, C., Roman, M., Campbell, R.: Gaia: A development infrastructure for acctive spaces. In: Workshop on Middleware for Mobile Computing, Atlanta, USA (2001)
Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.: A flexible, privacy-preserving authentication framework for ubiquitous computing environments. In: International Workshop on Smart Appliances and Wearable Computing (IWSAWC 2002), Vienna, Austria (2002) 771–776
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Matsumiya, K., Aoki, S., Murase, M., Tokuda, H. (2003). Active Authentication for Pervasive Computing Environments. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds) Software Security — Theories and Systems. ISSS 2002. Lecture Notes in Computer Science, vol 2609. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36532-X_3
Download citation
DOI: https://doi.org/10.1007/3-540-36532-X_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00708-1
Online ISBN: 978-3-540-36532-7
eBook Packages: Springer Book Archive