File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

OakleyIan

Oakley, Ian
Interactions Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.endPage 262 -
dc.citation.number 5 -
dc.citation.startPage 255 -
dc.citation.title IT-INFORMATION TECHNOLOGY -
dc.citation.volume 58 -
dc.contributor.author Bianchi, Andrea -
dc.contributor.author Oakley, Ian -
dc.date.accessioned 2023-12-21T23:09:20Z -
dc.date.available 2023-12-21T23:09:20Z -
dc.date.created 2018-04-17 -
dc.date.issued 2016-10 -
dc.description.abstract Wearables are a rapidly emerging device category with wide-reaching use scenarios. The novel form factors and broad potential of this technology pose new security challenges: devices are typically on and close to a user. Furthermore, while they possess limited input and output channels, they often feature rich sensing, computing and communication capabilities. Due to this novel context, this paper argues that researchers need to reconsider the functional, technical and social aspects of authenticating, or securely establishing a user's identity, for wearable devices. This paper contributes to ongoing work on this topic by reviewing wearable authentication schemes according to the traditional classification of authentication via tokens, passwords or biometrics. The goal of this review is to provide an illustrated overview of key advances in the area over the past decade that covers a variety of form factors (wristbands, glasses, jewelry, etc) and modes of operation (single or multi-factor authentication, on one or multiple devices). Finally, we tie the review together by identifying four key themes that will drive future research: the raise of implicit authentication that requires no dedicated user action; the use of wearable devices for authentication in conjunction with other systems; the potential and richness of current available technology and tools for wearable devices and; the importance and challenges of maintaining privacy and security in wearable contexts. -
dc.identifier.bibliographicCitation IT-INFORMATION TECHNOLOGY, v.58, no.5, pp.255 - 262 -
dc.identifier.doi 10.1515/itit-2016-0010 -
dc.identifier.issn 1611-2776 -
dc.identifier.scopusid 2-s2.0-85036470723 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/23984 -
dc.identifier.url https://www.degruyter.com/view/j/itit.ahead-of-print/itit-2016-0010/itit-2016-0010.xml -
dc.language 영어 -
dc.publisher GENTHINER STRASSE 13, BERLIN, GERMANY, D-10785 -
dc.title Wearable authentication: Trends and opportunities -
dc.type Article -
dc.description.isOpenAccess FALSE -
dc.description.journalRegisteredClass scopus -
dc.description.journalRegisteredClass foreign -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.