2019
DOI: 10.3390/asi2010004
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of a Contextual-Based Continuous Authentication Framework for Smart Homes

Abstract: There has been a rapid increase in the number of Internet of Things (IoT) devices in the last few years, providing a wide range of services such as camera feeds, light controls, and door locks for remote access. Access to IoT devices, whether within the same environment or remotely via the Internet, requires proper security mechanisms in order to avoid disclosing any secure information or access privileges. Authentication, on which other security classes are built, is the most important part of IoT security. W… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 29 publications
(16 citation statements)
references
References 40 publications
0
16
0
Order By: Relevance
“…According to the user's authentication policy, he/she will attain the authorization policy to access devices and locations. Another framework for smart homes is presented by Ashibani et al [18]. It provides continuous authentication based on contextual information.…”
Section: B Continuous Authenticationmentioning
confidence: 99%
See 2 more Smart Citations
“…According to the user's authentication policy, he/she will attain the authorization policy to access devices and locations. Another framework for smart homes is presented by Ashibani et al [18]. It provides continuous authentication based on contextual information.…”
Section: B Continuous Authenticationmentioning
confidence: 99%
“…Several authors proposed continuous authentication, and mainly focused on authenticating user-to-device (U2D), e.g., [15], [16], [17], [18], etc. Therefore, this research focuses on continuous authentication between devices referred to as device-to-device (D2D), where devices deal with and communicate with each other in the IoT environment.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…a PIN or password) and will be used at and beyond the login stage on the mobile device. This approach can be integrated as a second layer of authentication and identification in an implemented framework [36]. In this framework, a central controller hub, namely a smart home server that functions as the network controller, is responsible for user registration, authentication, and identification as well as feature collection and extraction.…”
Section: Proposed Modelmentioning
confidence: 99%
“…User profiles are then dynamically updated over time, thus guaranteeing the adaptability of the entire procedure. Another continuous authentication framework was detailed in [35], integrating contextual information for user authentication in smart homes. The framework proposed by the authors models behavioral profiles based on how users behave or what they do.…”
Section: Related Workmentioning
confidence: 99%