Skip to main content

Context-Aware Authentication Framework

  • Conference paper

Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST,volume 35)

Abstract

We present an extensible context-aware authentication framework which can adapt to the contextual information available in a smart environment. Having confidence in a user’s identity and other contextual information is critical to the successful adoption of future mobile, context-aware services. This authentication framework can provide a standard base for the development of context-aware services, particularly while the user is mobile. Our implementation of the framework enhances usability during authentication by replacing the need for users to remember and enter their password with the act of a simple gesture. We discuss our architecture, implementation and policies and illustrate how they support usable authentication, using lightweight tagging and simple context from a smart environment.

General Terms

  • Barcode Management System
  • relational database
  • access policies

Keywords

  • Barcode
  • context-aware computing
  • Wi-Fi signatures
  • locationbased authentication
  • mobile computing
  • soft sensors
  • authentication

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-642-12607-9_3
  • Chapter length: 16 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   109.00
Price excludes VAT (USA)
  • ISBN: 978-3-642-12607-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   139.00
Price excludes VAT (USA)

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.: Cerberus: A Context-Aware Security Scheme for Smart Spaces. In: IEEE PerCom 2003 (2003)

    Google Scholar 

  2. Covington, M.J., Fogla, P., Zhan, Z., Ahamad, M.: A context-aware security architecture for emerging applications. In: Proceedings of 18th Annual Computer Security Applications Conference (2002)

    Google Scholar 

  3. Rohs, M., Gfeller, B.: Using Camera-Equipped Mobile phones for interacting with real World. In: Published in Advances in Pervasive Computing, Austrian Computing Soc (OCG), pp. 265–271 (2004)

    Google Scholar 

  4. Dey, A.K., Abowd, G.D.: The Context Toolkit: Aiding the Development of Context-Enabled Applications. Presented in the Workshop on Software Engineering for Wearable and Pervasive Computing, Limerick, Ireland, June 6 (2000)

    Google Scholar 

  5. Dey, A.K., Abowd, G.D., Salber, D.: A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications. Published in Human-Computer Interaction Journal 16(2-4), 97–166 (2001)

    CrossRef  Google Scholar 

  6. Griss, M., Letsinger, R., Cowan, D., Sayers, C., VanHilst, M., Kessle, R.: CoolAgent: Intelligent Digital Assistants for Mobile Professionals - Phase 1, Retrospective HP Laboratories report HPL-2002-55(R1) (July 2002)

    Google Scholar 

  7. Lin, T., Zhang, J., Griss, M.: Enhancement of Wi-Fi Indoor Locationing, Carnegie Mellon Silicon Valley, CyLab Mobility Research Center technical report MRC-TR-2009-04 (March 2009)

    Google Scholar 

  8. McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-Believing: Using Camera Phones for Human-Verifiable Authentiction. International Journal of Security and Networks Special Issue on Secure Spontaneous Interaction 4(1-2), 43–56 (2009)

    CrossRef  Google Scholar 

  9. Meng, J., Yang, Y.: Application of Mobile 2D Barcode in China, Published in Wireless Communications, Networking and Mobile Computing. In: Presented in WiCOM 2008, 4th International Conference, October 12-14, pp. 1–4 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Goel, D., Kher, E., Joag, S., Mujumdar, V., Griss, M., Dey, A.K. (2010). Context-Aware Authentication Framework. In: Phan, T., Montanari, R., Zerfos, P. (eds) Mobile Computing, Applications, and Services. MobiCASE 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 35. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12607-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12607-9_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12606-2

  • Online ISBN: 978-3-642-12607-9

  • eBook Packages: Computer ScienceComputer Science (R0)