Home // ICAS 2015, The Eleventh International Conference on Autonomic and Autonomous Systems // View article


Context-Aware Authentication for the Internet of Things

Authors:
Kashif Habib
Wolfgang Leister

Keywords: Context; context-awareness; Internet of Things; authentication; access control; security

Abstract:
Many traditional authentication and access control mechanisms do not use context-aware approach, i.e., those mechanisms do not incorporate context parameters while making authentication and authorisation decisions. The context unaware mechanisms can be inadequate for the Internet of Things due to its dynamic and heterogeneous environment. The context information can be used to reconfigure security mechanisms and adjust security parameters. The contextual information can be integrated into various security mechanisms such as authentication, access control, encryption, etc. The context-aware security is the dynamic adjustment of security policy based on the context. In this paper, we discuss the context-awareness techniques for authentication and access control mechanisms. We present the concepts of context, con-text- awareness, and context based security and highlight con-textual attributes that can be used to support and enhance authentication and access control mechanisms for the Internet of Things.

Pages: 134 to 139

Copyright: Copyright (c) IARIA, 2015

Publication date: May 24, 2015

Published in: conference

ISSN: 2308-3913

ISBN: 978-1-61208-405-3

Location: Rome, Italy

Dates: from May 24, 2015 to May 29, 2015