Proceedings of the 12th ACM International Symposium on Mobility Management and Wireless Access 2014
DOI: 10.1145/2642668.2642675
|View full text |Cite
|
Sign up to set email alerts
|

Non-intrusive user identity provisioning in the internet of things

Abstract: The Internet of Things (IoT) represents an evolutionary vision and a new era of such smart environments that encompass all identifiable things in a dynamic and interacting network of networks. Each user has wide interactions with a huge number of entities. It would be impractical to require users to confirm themselves every time they cross various network boundaries, as the frequent verification process would disrupt the users' normal activities and degrades the overall performance. This paper presents a servi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…The cause of this adaptation, on the other hand, varies a lot from one work to another. Previous works as [98], for example, take the time and location of the user into one university to make the authentication operation adapt based on the safety level required of the place and time. On the other hand, [102] uses the trust relationship of the device's owner to decrease the safety level of the authentication operation to friends when visiting his home.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…The cause of this adaptation, on the other hand, varies a lot from one work to another. Previous works as [98], for example, take the time and location of the user into one university to make the authentication operation adapt based on the safety level required of the place and time. On the other hand, [102] uses the trust relationship of the device's owner to decrease the safety level of the authentication operation to friends when visiting his home.…”
Section: Discussionmentioning
confidence: 99%
“…On the other hand, [102] uses the trust relationship of the device's owner to decrease the safety level of the authentication operation to friends when visiting his home. However, as pointed out by the own author of [98], most of the current contextual information is very simple and has some major flaws. The work of [98] concludes that it takes some time to learn the user mobility pattern inside the university to make the authentication mechanism adequate.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations