Authentication Device - Explore the Science & Experts | ideXlab

Scan Science and Technology

Contact Leading Edge Experts & Companies

Authentication Device

The Experts below are selected from a list of 282 Experts worldwide ranked by ideXlab platform

Helen Tang – 1st expert on this subject based on the ideXlab platform

  • Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks
    IEEE Transactions on Vehicular Technology, 2011
    Co-Authors: Shengrong Bu, Peter Mason, Richard F. Yu, Helen Tang

    Abstract:

    Multimodal biometric technology provides potential solutions for continuous user-to-Device Authentication in high-security mobile ad hoc networks (MANETs). This paper studies distributed combined Authentication and intrusion detection with data fusion in such MANETs. Multimodal biometrics are deployed to work with intrusion detection systems (IDSs) to alleviate the shortcomings of unimodal biometric systems. Since each Device in the network has measurement and estimation limitations, more than one Device needs to be chosen, and observations can be fused to increase observation accuracy using Dempster-Shafer theory for data fusion. The system decides whether user Authentication (or IDS input) is required and which biosensors (or IDSs) should be chosen, depending on the security posture. The decisions are made in a fully distributed manner by each Authentication Device and IDS. Simulation results are presented to show the effectiveness of the proposed scheme.

  • Distributed combined Authentication and intrusion detection with data fusion in high security mobile ad-hoc networks
    2010 – MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 2010
    Co-Authors: Shengrong Bu, Richard F. Yu, Liu X. Peter, Helen Tang, Peter Mason

    Abstract:

    This paper studies distributed, combined Authentication and intrusion detection with data fusion in mobile ad-hoc networks (MANETs). Multimodal biometrics are deployed to work with intrusion detection systems (IDSs) to alleviate the shortcomings of unimodal biometric systems. Since each Device in the network has measurement and estimation errors, more than one Device needs to be chosen, and observations can be fused to increase observation accuracy using Dempster-Shafer theory for data fusion. The system decides whether or not user Authentication (or IDS input) is required, and which biosensors (or IDSs) should be chosen depending on the security posture. The decisions are made in a fully distributed manner by each Authentication Device and each IDS. Simulation results are presented to show the effectiveness of the proposed scheme.

Dan Boneh – 2nd expert on this subject based on the ideXlab platform

  • HotMobile – Mobile token-based Authentication on a budget
    Proceedings of the 12th Workshop on Mobile Computing Systems and Applications – HotMobile '11, 2011
    Co-Authors: Hristo Bojinov, Dan Boneh

    Abstract:

    We propose a light-weight, cheap Authentication Device for unlocking a user’s smartphone. The Device can be carried on a key chain and automatically unlocks the smartphone whenever its owner wants to use it. Our goal is to build a Device that works with existing smartphones, requires no recharging or maintenance, and is always available. We propose two approaches: one based on magnetic fields detected by the smartphone’s compass and the other based on an acoustic transmitter that generates a signal picked up by the handset’s microphone. We experiment with both approaches and report on their effectiveness. These Devices may find applications beyond smartphones, such as unlocking laptops, cars, and homes. These designs show that contactless Authentication can offer a convenient and secure alternative to PIN-based unlocking.

  • Mobile token-based Authentication on a budget
    Proceedings of the 12th Workshop on Mobile Computing Systems and Applications – HotMobile '11, 2011
    Co-Authors: Hristo Bojinov, Dan Boneh

    Abstract:

    We propose a light-weight, cheap Authentication Device for unlocking a user’s smartphone. The Device can be carried on a key chain and automatically unlocks the smartphone whenever its owner wants to use it. Our goal is to build a Device that works with existing smartphones, requires no recharging or maintenance, and is always available. We propose two approaches: one based on magnetic fields detected by the smartphone’s compass and the other based on an acoustic transmitter that generates a signal picked up by the handset’s microphone. We experiment with both approaches and report on their effectiveness. These Devices may find applications beyond smartphones, such as unlocking laptops, cars, and homes. These designs show that contactless Authentication can offer a convenient and secure alternative to PIN-based unlocking.

Shengrong Bu – 3rd expert on this subject based on the ideXlab platform

  • Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks
    IEEE Transactions on Vehicular Technology, 2011
    Co-Authors: Shengrong Bu, Peter Mason, Richard F. Yu, Helen Tang

    Abstract:

    Multimodal biometric technology provides potential solutions for continuous user-to-Device Authentication in high-security mobile ad hoc networks (MANETs). This paper studies distributed combined Authentication and intrusion detection with data fusion in such MANETs. Multimodal biometrics are deployed to work with intrusion detection systems (IDSs) to alleviate the shortcomings of unimodal biometric systems. Since each Device in the network has measurement and estimation limitations, more than one Device needs to be chosen, and observations can be fused to increase observation accuracy using Dempster-Shafer theory for data fusion. The system decides whether user Authentication (or IDS input) is required and which biosensors (or IDSs) should be chosen, depending on the security posture. The decisions are made in a fully distributed manner by each Authentication Device and IDS. Simulation results are presented to show the effectiveness of the proposed scheme.

  • Distributed combined Authentication and intrusion detection with data fusion in high security mobile ad-hoc networks
    2010 – MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 2010
    Co-Authors: Shengrong Bu, Richard F. Yu, Liu X. Peter, Helen Tang, Peter Mason

    Abstract:

    This paper studies distributed, combined Authentication and intrusion detection with data fusion in mobile ad-hoc networks (MANETs). Multimodal biometrics are deployed to work with intrusion detection systems (IDSs) to alleviate the shortcomings of unimodal biometric systems. Since each Device in the network has measurement and estimation errors, more than one Device needs to be chosen, and observations can be fused to increase observation accuracy using Dempster-Shafer theory for data fusion. The system decides whether or not user Authentication (or IDS input) is required, and which biosensors (or IDSs) should be chosen depending on the security posture. The decisions are made in a fully distributed manner by each Authentication Device and each IDS. Simulation results are presented to show the effectiveness of the proposed scheme.