Download presentation
Presentation is loading. Please wait.
Published byRodney Nelson Modified over 8 years ago
1
Transparent Authentication for IoT-oriented Cloud Architecture Digital Content Lab – Information Security Group Department of Information Management National Dong Hwa University Project Leader: Yeh, Kuo-Hui ( 葉國暉 ) Team Members: Chuang, Yo-Hsuan ( 莊佑軒 ) Lin, Yu-Ting ( 林育艇 ) Lin, Ting-Huei ( 林庭暉 ) Ke, Guan-Ting ( 科冠廷 )
2
Introduction Few studies focus on the transparent authentication with biometric features in Body Area Networks The evolution of wearable IoT device has led the design of authentication into a new era –Personal bio-data, such as heartbeat, brain- weaves and body-temperature, can be used to support transparent authentication
3
Research Goal –An authentication scheme using adaptive biometric features, such as heart rate, body temperature, and personal preference pattern, for IoT-based cloud environments –Use transparent token concept to construct continuous authenticated sessions for IoT-like client devices
4
System Architecture Wristband Brainwave Detector Watch Shoe Sock Clothes Mobile Body Gateway BLE Body Area Networks Authentication Server WiFi/4G
5
Research Procedure Personal Bio-Data Collecting (Wearable Device) Individual Pattern Retrieving Multiple Authentication Tokens (Unique) IoT Applications
6
Preferred Tokens Brainwave Detector Foot Pressure Sensor Others...
7
Milestones 1/2 2016.01, Relevant researches investigation 2016.02-03, The understanding of secure body area networks, including BLE communication technology and it’s security mechanism 2016.04, The design of authentication scheme – personal specific bio-data pattern (from bio-sensors) identifying, testing and evaluation 2016.05, The design of authentication scheme – personal tracking data or human behavior identification as the authentication token
8
Milestones 2/2 2016.06, The design of authentication scheme – developing a new human interactive authentication with transparent tokens. 2016.07, The implementation of the proposed authentication scheme 2016.08-09, Continuously refine the proposed scheme, improve the system efficiency, and prepare the final report and a journal based manuscript
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.