Presentation is loading. Please wait.

Presentation is loading. Please wait.

Transparent Authentication for IoT-oriented Cloud Architecture Digital Content Lab – Information Security Group Department of Information Management National.

Similar presentations


Presentation on theme: "Transparent Authentication for IoT-oriented Cloud Architecture Digital Content Lab – Information Security Group Department of Information Management National."— Presentation transcript:

1 Transparent Authentication for IoT-oriented Cloud Architecture Digital Content Lab – Information Security Group Department of Information Management National Dong Hwa University Project Leader: Yeh, Kuo-Hui ( 葉國暉 ) Team Members: Chuang, Yo-Hsuan ( 莊佑軒 ) Lin, Yu-Ting ( 林育艇 ) Lin, Ting-Huei ( 林庭暉 ) Ke, Guan-Ting ( 科冠廷 )

2 Introduction Few studies focus on the transparent authentication with biometric features in Body Area Networks The evolution of wearable IoT device has led the design of authentication into a new era –Personal bio-data, such as heartbeat, brain- weaves and body-temperature, can be used to support transparent authentication

3 Research Goal –An authentication scheme using adaptive biometric features, such as heart rate, body temperature, and personal preference pattern, for IoT-based cloud environments –Use transparent token concept to construct continuous authenticated sessions for IoT-like client devices

4 System Architecture Wristband Brainwave Detector Watch Shoe Sock Clothes Mobile Body Gateway BLE Body Area Networks Authentication Server WiFi/4G

5 Research Procedure Personal Bio-Data Collecting (Wearable Device) Individual Pattern Retrieving Multiple Authentication Tokens (Unique) IoT Applications

6 Preferred Tokens Brainwave Detector Foot Pressure Sensor Others...

7 Milestones 1/2 2016.01, Relevant researches investigation 2016.02-03, The understanding of secure body area networks, including BLE communication technology and it’s security mechanism 2016.04, The design of authentication scheme – personal specific bio-data pattern (from bio-sensors) identifying, testing and evaluation 2016.05, The design of authentication scheme – personal tracking data or human behavior identification as the authentication token

8 Milestones 2/2 2016.06, The design of authentication scheme – developing a new human interactive authentication with transparent tokens. 2016.07, The implementation of the proposed authentication scheme 2016.08-09, Continuously refine the proposed scheme, improve the system efficiency, and prepare the final report and a journal based manuscript


Download ppt "Transparent Authentication for IoT-oriented Cloud Architecture Digital Content Lab – Information Security Group Department of Information Management National."

Similar presentations


Ads by Google