Challenges and Directions for Authentication in Pervasive Computing

07/11/2019
by   Artur Souza, et al.
0

We quickly approach a "pervasive future" where pervasive computing is the norm. In this scenario, humans are surrounded by a multitude of heterogeneous devices that assist them in almost every aspect of their daily routines. The realization of this future demands strong authentication guarantees to ensure that these devices are not abused and that their users are not endangered. However, providing authentication for these systems is a challenging task due to the high heterogeneity of pervasive computing applications. This heterogeneity makes it unfeasible to propose a single authentication solution for all of the pervasive computing applications. In this paper, we review several pervasive application scenarios and promising authentication methods for each. To do this, we first identify the key characteristics of each pervasive application scenario. Then, we review the strengths and weaknesses of prominent authentication methods from the literature. Finally, we identify which authentication methods are well suited for each application scenario based on the identified characteristics. Our goal is to provide promising directions to be explored for authentication in each of these scenarios.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/27/2018

Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues

This paper presents a comprehensive investigation of authentication sche...
research
02/15/2023

FIDO2 the Rescue? Platform vs. Roaming Authentication on Smartphones

Modern smartphones support FIDO2 passwordless authentication using eithe...
research
11/14/2022

Is FIDO2 Passwordless Authentication a Hype or for Real?: A Position Paper

Operating system and browser support that comes with the FIDO2 standard ...
research
09/26/2022

Characteristics and Main Threats about Multi-Factor Authentication: A Survey

This work reports that the Systematic Literature Review process is respo...
research
09/06/2021

IoT Security and Authentication schemes Based on Machine Learning: Review

With the latest developments in technology, extra and extra human beings...
research
12/17/2022

A Survey on Password Guessing

Text password has served as the most popular method for user authenticat...

Please sign up or login with your details

Forgot password? Click here to reset