Home // ICAS 2015, The Eleventh International Conference on Autonomic and Autonomous Systems // View article
Context-Aware Authentication for the Internet of Things
Authors:
Kashif Habib
Wolfgang Leister
Keywords: Context; context-awareness; Internet of Things; authentication; access control; security
Abstract:
Many traditional authentication and access control mechanisms do not use context-aware approach, i.e., those mechanisms do not incorporate context parameters while making authentication and authorisation decisions. The context unaware mechanisms can be inadequate for the Internet of Things due to its dynamic and heterogeneous environment. The context information can be used to reconfigure security mechanisms and adjust security parameters. The contextual information can be integrated into various security mechanisms such as authentication, access control, encryption, etc. The context-aware security is the dynamic adjustment of security policy based on the context. In this paper, we discuss the context-awareness techniques for authentication and access control mechanisms. We present the concepts of context, con-text- awareness, and context based security and highlight con-textual attributes that can be used to support and enhance authentication and access control mechanisms for the Internet of Things.
Pages: 134 to 139
Copyright: Copyright (c) IARIA, 2015
Publication date: May 24, 2015
Published in: conference
ISSN: 2308-3913
ISBN: 978-1-61208-405-3
Location: Rome, Italy
Dates: from May 24, 2015 to May 29, 2015