Zero-Stop Authentication: Sensor-Based Real-Time Authentication System

Kenia Matsumiya, Soko Aoki, Masana Murase, Hideyuki Tokuda

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

This paper proposes "Zero-stop Authentication" system, which requires no intentional interactions between users and authentication applications. Our Zero-stop Authentication model simplifies the current complicated authentication process by automating detection of users and objects. Our challenge is to eliminate the necessity for users to wait for a moment to be authenticated without reducing security level of authentication. To accomplish such real time user authentication in a physical environment, user mobility needs to be modelled. This paper models and formulates the user mobility and time constraints as "1/N × 1/M model", considering user speed, sensor coverage areas, communication time between the sensors and the server, and processing time consumed by an authentication process. We also prototyped a library application based on 1/N × I/M model, and installed it into Smart Furniture [1] which is an experimental platform to examine feasibility of our model.

Original languageEnglish
Pages (from-to)296-311
Number of pages16
JournalLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2968
Publication statusPublished - 2004

Fingerprint

Computer Systems
Authentication
Real-time
Sensor
Sensors
Zero
Interior Design and Furnishings
Libraries
User Authentication
User Model
Model
Simplify
Coverage
Eliminate
Server
Moment
Servers
Interaction
Communication
Processing

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Zero-Stop Authentication : Sensor-Based Real-Time Authentication System. / Matsumiya, Kenia; Aoki, Soko; Murase, Masana; Tokuda, Hideyuki.

In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 2968, 2004, p. 296-311.

Research output: Contribution to journalArticle

@article{69123734f72a4e4f990597f9e83eafd8,
title = "Zero-Stop Authentication: Sensor-Based Real-Time Authentication System",
abstract = "This paper proposes {"}Zero-stop Authentication{"} system, which requires no intentional interactions between users and authentication applications. Our Zero-stop Authentication model simplifies the current complicated authentication process by automating detection of users and objects. Our challenge is to eliminate the necessity for users to wait for a moment to be authenticated without reducing security level of authentication. To accomplish such real time user authentication in a physical environment, user mobility needs to be modelled. This paper models and formulates the user mobility and time constraints as {"}1/N × 1/M model{"}, considering user speed, sensor coverage areas, communication time between the sensors and the server, and processing time consumed by an authentication process. We also prototyped a library application based on 1/N × I/M model, and installed it into Smart Furniture [1] which is an experimental platform to examine feasibility of our model.",
author = "Kenia Matsumiya and Soko Aoki and Masana Murase and Hideyuki Tokuda",
year = "2004",
language = "English",
volume = "2968",
pages = "296--311",
journal = "Lecture Notes in Computer Science",
issn = "0302-9743",
publisher = "Springer Verlag",

}

TY - JOUR

T1 - Zero-Stop Authentication

T2 - Sensor-Based Real-Time Authentication System

AU - Matsumiya, Kenia

AU - Aoki, Soko

AU - Murase, Masana

AU - Tokuda, Hideyuki

PY - 2004

Y1 - 2004

N2 - This paper proposes "Zero-stop Authentication" system, which requires no intentional interactions between users and authentication applications. Our Zero-stop Authentication model simplifies the current complicated authentication process by automating detection of users and objects. Our challenge is to eliminate the necessity for users to wait for a moment to be authenticated without reducing security level of authentication. To accomplish such real time user authentication in a physical environment, user mobility needs to be modelled. This paper models and formulates the user mobility and time constraints as "1/N × 1/M model", considering user speed, sensor coverage areas, communication time between the sensors and the server, and processing time consumed by an authentication process. We also prototyped a library application based on 1/N × I/M model, and installed it into Smart Furniture [1] which is an experimental platform to examine feasibility of our model.

AB - This paper proposes "Zero-stop Authentication" system, which requires no intentional interactions between users and authentication applications. Our Zero-stop Authentication model simplifies the current complicated authentication process by automating detection of users and objects. Our challenge is to eliminate the necessity for users to wait for a moment to be authenticated without reducing security level of authentication. To accomplish such real time user authentication in a physical environment, user mobility needs to be modelled. This paper models and formulates the user mobility and time constraints as "1/N × 1/M model", considering user speed, sensor coverage areas, communication time between the sensors and the server, and processing time consumed by an authentication process. We also prototyped a library application based on 1/N × I/M model, and installed it into Smart Furniture [1] which is an experimental platform to examine feasibility of our model.

UR - http://www.scopus.com/inward/record.url?scp=35048839307&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=35048839307&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:35048839307

VL - 2968

SP - 296

EP - 311

JO - Lecture Notes in Computer Science

JF - Lecture Notes in Computer Science

SN - 0302-9743

ER -