skip to main content
10.1145/3018896.3018926acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccConference Proceedingsconference-collections
research-article

Identification framework for smart environments in the era of cloud-IoT

Published: 22 March 2017 Publication History

Abstract

Identify verification1 is a frequent task required before any interaction. However, every interaction requires a different identity profile and a different verification protocol. Consequently, we propose IdProF, a secure context-sensitive seamless multi-modal identity provisioning framework for Cloud- and IoT-based environments. IdProF generates a virtual user profile on demand, then creates a customized identity proxy to handle the identity verification for the required interaction. We believe, IdProF reduces the risks for identity theft/loss, as it does not depend only on unique identifiers, but it takes into consideration the dynamics of the users' behaviors as well as their access and usage patterns.

References

[1]
R. Roman, P. Najera and J. Lopez, "Securing the Internet of Things," Computer, Vol. 44, No. 9, 2011, pp. 51--58.
[2]
Gubbi, J., et al., Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 2013.
[3]
F. Al-Turjman, "Cognition in Information-Centric Sensor Networks for IoT Applications: An Overview", Annals of Telecommunications Journal, pp. 1--16, 2016.
[4]
F. Mattern, C. Flörkemeier: From the Internet of Computers to the Internet of Things. Informatik-Spektrum, 2010, 33(2).
[5]
L. Atzori, A. Iera and G. Morabito: The Internet of Things: A Survey, Elsevier Computer Networks, 2010.
[6]
Saha, D. and A. Mukherjee, "Pervasive Computing: A Paradigm for the 21st Century". Computer, 2003, 36(3): 25--31.
[7]
F. Al-Turjman, "Cognitive Routing Protocol for Disaster-inspired Internet of Things", Future Generation Computer Systems, 2017.
[8]
M. Z. Hasan, et. al., "Optimized Multi-Constrained Quality-of-Service Multipath Routing Approach for Multimedia Sensor Networks", IEEE Sensors Journal, 2017.
[9]
Gamboa, H., and Fred, A., A behavioral biometric system based on human-computer interaction, Proc. SPIE 5404, Biometric Technology for Human Identification. 2004.
[10]
M. Biglarbegian and F. Al-Turjman, "Path Planning for Data Collectors in Precision Agriculture WSNs", In Proc. of the International Wireless Communications and Mobile Computing Conference (IWCMC), Nicosia, Cyprus, 2014, pp. 483 -- 487.
[11]
Radha, V. and D.H. Reddy, A Survey on Single Sign-On Techniques. Procedia Technology. 2012. 4(0): p. 134--139.
[12]
F. Al-Turjman and H. Hassanein, "Enhanced data delivery framework for dynamic Information-Centric Networks (ICNs)", In Proc. of the IEEE Local Computer Networks, Sydney, Australia, 2013, pp. 831--838.
[13]
G. Singh, and F. Al-Turjman, "A Data Delivery Framework for Cognitive Information-Centric Sensor Networks in Smart Outdoor Monitoring", Computer Communications, vol. 74, no. 1, pp. 38--51, 2016.
[14]
G. Singh, and F. Al-Turjman, "Learning Data Delivery Paths in QoI-Aware Information-Centric Sensor Networks", IEEE Internet of Things, vol. 3, no. 4, pp. 572 -- 580, August, 2016.
[15]
F. Al-Turjman, H. Hassanein, and M. Ibnkahla, "Optimized Relay Repositioning for Wireless Sensor Networks Applied in Environmental Applications", In Proc. of the IEEE Inter. Wireless Communications and Mobile Computing conf., Istanbul, Turkey, 2011, pp. 1860--1864
[16]
M. Z. Hasan, et. al., "A Survey on Multipath Routing Protocols for QoS Assurances in Real-Time Multimedia Wireless Sensor Networks", IEEE Communications Surveys and Tutorials, 2017.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICC '17: Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing
March 2017
1349 pages
ISBN:9781450347747
DOI:10.1145/3018896
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 March 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. data offloading
  2. identity provisioning
  3. virtual user profile

Qualifiers

  • Research-article

Conference

ICC '17

Acceptance Rates

ICC '17 Paper Acceptance Rate 213 of 590 submissions, 36%;
Overall Acceptance Rate 213 of 590 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media