2019
DOI: 10.3390/s19122832
|View full text |Cite
|
Sign up to set email alerts
|

PALOT: Profiling and Authenticating Users Leveraging Internet of Things

Abstract: Continuous authentication was introduced to propose novel mechanisms to validate users’ identity and address the problems and limitations exposed by traditional techniques. However, this methodology poses several challenges that remain unsolved. In this paper, we present a novel framework, PALOT, that leverages IoT to provide context-aware, continuous and non-intrusive authentication and authorization services. To this end, we propose a formal information system model based on ontologies, representing the main… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0
8

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(24 citation statements)
references
References 41 publications
0
16
0
8
Order By: Relevance
“…It uses Markov models, ontologies, and semantic rules to authenticate users without requiring any additional device. However, the approach is heavily dependent on the deployment context [29].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…It uses Markov models, ontologies, and semantic rules to authenticate users without requiring any additional device. However, the approach is heavily dependent on the deployment context [29].…”
Section: Related Workmentioning
confidence: 99%
“…The main benefit is related to usability, as the user do not need to carry intrusive devices or remember complex secrets. Such solution must recognize users' behavioral patterns to validate their identity [29] and may strengthen the authentication process at the time of access request and throughout the session, without requiring additional user intervention [48].…”
Section: Assumptions and Hypothesesmentioning
confidence: 99%
“…IoT security requirements that need to be fulfilled for any AA systems are the following: Lightweightness: The first and foremost requirement is that the AA schemes must be required to be lightweight for IoT, such that, regardless of energy constraints, they work well for several IoT nodes [ 26 , 27 , 28 ]. Privacy Profiling and Tracking: Combining an identification with a specific person is a vulnerability, which may escalate to privacy profiling and tracking [ 29 ]. Therefore, one of the critical problems is the dis-allowance of IoT operation, and the security system must be responsible for protecting the clients’ privacy.…”
Section: Taxonomy Of Ml-based Aa For Iotmentioning
confidence: 99%
“…Privacy Profiling and Tracking: Combining an identification with a specific person is a vulnerability, which may escalate to privacy profiling and tracking [ 29 ]. Therefore, one of the critical problems is the dis-allowance of IoT operation, and the security system must be responsible for protecting the clients’ privacy.…”
Section: Taxonomy Of Ml-based Aa For Iotmentioning
confidence: 99%
“…The Internet of Things (IoT) technology offers low cost and effective solutions for the development of smart cities due to its high applicability in an uncountable number of scenarios [2,3]. In particular, the intelligent IoT devices can continuously collaborate in various sectors of a smart city scenario, exchanging a constant flow of information to offer quality services to citizens as an ultimate goal [4,5]. We refer to the IoT devices as intelligent, in the sense that they are able to autonomously communicate, requiring little or no human intervention [6].…”
Section: Introductionmentioning
confidence: 99%