Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

Digital Memories Based Mobile User Authentication for IoT

Shone, N, Dobbins, C, Hurst, W and Shi, Q (2015) Digital Memories Based Mobile User Authentication for IoT. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM) . pp. 1796-1802. (13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC’15), 26th - 28th October 2015, Liverpool, UK).

This is the latest version of this item.

PID3882995.pdf - Accepted Version

Download (960kB) | Preview


The increasing number of devices within the IoT is raising concerns over the efficiency and exploitability of existing authentication methods. The weaknesses of such methods, in particular passwords, are well documented. Although alternative methods have been proposed, they often rely on users being able to accurately recall complex and often unmemorable information. With the profusion of separate online accounts, this can often be a difficult task. The emerging digital memories concept involves the creation of a repository of memories specific to individuals. We believe this abundance of personal data can be utilised as a form of authentication. In this paper, we propose our digital memories based two-factor authentication mechanism, and also present our promising evaluation results.
Keywords—Digital memories, authentication, IoT, security

Item Type: Conference or Workshop Item (Paper)
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Computer Science & Mathematics
Publisher: IEEE
Date Deposited: 13 Jan 2016 12:23
Last Modified: 13 Apr 2022 15:14
URI: https://researchonline.ljmu.ac.uk/id/eprint/2584

Available Versions of this Item

View Item View Item