2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing 2011
DOI: 10.1109/euc.2011.2
|View full text |Cite
|
Sign up to set email alerts
|

A Context-Aware Recommendation System to Behavioral Based Authentication in Mobile and Pervasive Environments

Abstract: Mobile devices use traditional authentication processes, which are vulnerable and unsuitable for highly dynamic environments, such as ubiquitous and pervasive environments. Therefore, new approaches are necessary in such environments. These approaches must be (i) context-aware by considering environmental and operational characteristics, restrictions of devices and information provided by sensors within the pervasive space; and (ii) customizable for balancing the systems proactivity with the control that the u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(17 citation statements)
references
References 9 publications
0
17
0
Order By: Relevance
“…Moreover, the idea behind the behavior-based model is that the person's habits are a set of its attributes; therefore, each event (activity) has a correlation between two fundamental attributes: space and time. In addition, the architecture proposed in [39], utilizes the resources found in the smartphone devices, such as user calls, user schedule, GPS, device battery level, user applications, and sensors. A similar methodology has also been adopted in [45].…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, the idea behind the behavior-based model is that the person's habits are a set of its attributes; therefore, each event (activity) has a correlation between two fundamental attributes: space and time. In addition, the architecture proposed in [39], utilizes the resources found in the smartphone devices, such as user calls, user schedule, GPS, device battery level, user applications, and sensors. A similar methodology has also been adopted in [45].…”
Section: Related Workmentioning
confidence: 99%
“…These are vulnerable for highly dynamic environments, therefore in such environments need of new approaches to be implemented. These new approaches must be context aware of environment and customizable that a user wants to have over his systems [62]. Here user can be authenticated by using data captured by sensors at of the mobile device and the behavior of the user.…”
Section: N Context Based Authenticationmentioning
confidence: 99%
“…A user behavioral model is provided in [1], the corresponding research is based on the idea that the person is a creature of habit, therefore each event has a correlation between two fundamental attributes: space and time. The proposed architecture uses resources found in the mobile devices: User calls, user schedule, GPS, device battery level, user applications, and sensors.…”
Section: A Behavioral User Authentication/identificationmentioning
confidence: 99%
“…Generally, authentication and identification processes are increasing with the increase of services, causing the user, in general, to use short, easy, and repetitive passwords. These facts in addition to the possibility of stealing or losing the mobile, leads to security threats on the personal data [1]. More particularly, elderly and physically impaired users find difficulties by entering pin codes or screen patterns, or might be unable to do explicit authentication.…”
Section: Introductionmentioning
confidence: 96%