[show abstract][hide abstract] ABSTRACT: Mobile devices using traditional authentication processes are vulnerable and inadequate. New approaches must be considered for solving this problem: environmental characteristics, device limitations and information obtained from sensors. This paper presents a recommendation system approach for information systems based on user behavior and information context in which the users are located. The recommendation system has been defined and deployed through filtering processes (content-based, collaborative and hybrid). The behavior is defined by the events and the actions that comprise the user activities. The experimental results indicate: (i) a more dynamic and autonomic mechanism for authenticating users in a pervasive mobile environment, and (ii) an efficiency improvement in detecting anomalies on authentication by using a similarity model and space-time permutation.
Proceedings of the 9th ACM International Workshop on Mobility Management & Wireless Access, MOBIWAC 2011, October 31- November 4, 2011, Miami Beach, FL, USA; 01/2011
[show abstract][hide abstract] ABSTRACT: Mobile devices use traditional authentication processes, which are vulnerable and unsuitable for highly dynamic environments, such as ubiquitous and pervasive environments. Therefore, new approaches are necessary in such environments. These approaches must be (i) context-aware by considering environmental and operational characteristics, restrictions of devices and information provided by sensors within the pervasive space, and (ii) customizable for balancing the systems proactivity with the control that the user wants to have over his systems. In this paper, it is presented an approach that provides a recommendation system based on the user behavior and the pervasive space where he belongs. The user behavior is defined by the actions and events that compose the activity that is being performed. The experimental results indicate (a) a dynamic and autonomic mechanism, which is more suitable for authenticating users in mobile and pervasive environments, and (b) significant efficiency to detect authentication anomalies by using a similarity model and a spatio-temporal permutation model.
IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, EUC 2011, Melbourne, Australia, October 24-26, 2011; 01/2011
[show abstract][hide abstract] ABSTRACT: Mobile devices are becoming mandatory equipment in modern life. However, the available interfaces are usually not suitable for accepting data input in a friendly and reliable fashion. Accordingly, a context- based approach can represent a useful alternative for circumventing threats in a mobile computing scenario. In this paper, we present a proposal based on context-aware authentication, considering an individual's behavior through a spatio-temporal context. This approach presents a more dynamic and reliable policy for authenticating users.