Abstract
One of the most critical issues in modern society is the possibility of efficient users’ authentication in all the systems and items creating the IoT. There is a need to determine persons’ rights and privileges to use devices they operate in their daily routines. This work aims to explore the most promising research avenues that could prove the user identity based on their behavior, personal characteristics, or history, preferably on-the-fly. There is already a wide range of techniques used, from simple biometrics, through the patterns describing the keystroke and cadence of a given individual during any performed operation. All those methods are considered for their usefulness in more contactless or decentralized systems in a systematic review. That will form a factual research basis for a further avenue of personalized cryptographic protocols. These would not determine what a person has or knows, but more likely – who such a person is and what makes them unique. The issue of false positives and negatives should also balance the tight line between strict metrics of peoples’ behavior and privacy issues.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Sfar, A.R., Natalizio, E., Challal, Y., Chtourou, Z.: A roadmap for security challenges in the Internet of Things. Digit. Commun. Netw. 4(2), 118–137 (2018)
Loukil, F., Ghedira, C., Aïcha-Nabila, B., Boukadi, K., Maamar, Z.: Privacy-aware in the IoT applications: a systematic literature review. In: International Conference on Cooperative Information Systems (CoopIS) 2017. Proceedings, Part I. LNCS, vol. 10573, pp. 552–569 (2017)
Menezes A., Van Oorschot P., Vanstone S.: Handbook of Applied Cryptography, CRC, New York (1997)
Liang, Y., Samtani, S., Guo, B., Yu, Z.: Behavioral biometrics for continuous authentication in the Internet-of-Things era: an artificial intelligence perspective. IEEE Internet Things J. 7(9), 9128–9143 (2020)
Traore, I., Ahmed, E.A.: Continuous Authentication Using Biometrics: Data, Models, and Metrics, 1st edn. IGI Global, Harrisburg (2011)
Srihari, S., Srinivasan, H., Fang, G.: Discriminability of fingerprints of twins. J. Forensic Ident. 58, 2008–109 (2008)
Mazumdar, J.: Retina based biometric authentication system: a review. Int. J. Adv. Res. Comput. Sci. 9, 711–718 (2018). https://doi.org/10.26483/ijarcs.v9i1.5322
Galbally, J., Gomez-Barrero, M.: A review of iris anti-spoofing, pp. 1–6 (2016). https://doi.org/10.1109/iwbf.2016.7449676
Hadnagy, C.: Social Engineering: The Science of Human Hacking (2018)
Bojinov, H., Sanchez, D., Reber, P., Boneh, D., Lincoln P.: Neuroscience meets cryptography: designing crypto primitives secure against rubber hose attacks. In: Security Symposium, USENIX, pp. 129–141 (2012)
Gupta, P., Gao, D.: Fighting coercion attacks in key generation using skin conductance. In: USENIX Security Symposium (2010)
Panasiuk, P., Saeed, K.: A modified algorithm for user identification by his typing on the keyboard. In: Choraś, R.S. (ed.) Image Processing and Communications Challenges 2. Advances in Intelligent and Soft Computing, vol 84. Springer, Berlin, Heidelberg (2010)
Ogiela, M.R., Ogiela, L.: Cognitive keys in personalized cryptography. In: The 31st IEEE International Conference on Advanced Information Networking and Applications (AINA 2017), Taipei, Taiwan, 27–29 March 2017, pp. 1050–1054 (2017). https://doi.org/10.1109/aina.2017.164
Riener, A.: Sitting postures and electrocardiograms: a method for continuous and non-disruptive driver authentication. In: Continuous Authentication Using Biometrics: Data, Models, and Metrics, pp. 137–168 (2011)
Ogiela, M.R., Ogiela, L.: Cognitive cryptography techniques for intelligent information management. Int. J. Inf. Manage. 40, 21–27 (2018)
Ogiela, L.: Cryptographic techniques of strategic data splitting and secure information management. Perv. Mob. Comput. 29, 130–141 (2016)
Acknowledgments
This work has been supported by the AGH University of Science and Technology Research Grant No 16.16.120.773. This work has been supported by the AGH Doctoral School Grant No 10.16.120.7999.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Bułat, R., Ogiela, M.R. (2021). Comparison of Personal Security Protocols. In: Barolli, L., Woungang, I., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2021. Lecture Notes in Networks and Systems, vol 226. Springer, Cham. https://doi.org/10.1007/978-3-030-75075-6_55
Download citation
DOI: https://doi.org/10.1007/978-3-030-75075-6_55
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-75074-9
Online ISBN: 978-3-030-75075-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)