Discovering trends for the development of novel authentication applications for dementia patients

Junaid Chaudhry, Samaneh Farmand, Syed M.S. Islam, Md Rafiqul Islam, Peter Hannay, Craig Valli

Research output: Book chapter/Published conference paperConference paper

1 Citation (Scopus)

Abstract

We aim at creating ease in authentication process through non-password-based authentication scheme for the Dementia patients. The chronic neuro-degenerative disease leaves the patients with memory recall/loss issues. With ever growing rich list of assistive technologies, that bring ease in patient’s daily life i.e. remote Electrocardiography and peripheral capillary oxygen saturation monitoring, remote blood glucose level monitoring applications etc. These assistive technologies are ubiquitous, seamless, immersed in the background, often remotely monitored, and the most intimate applications that run very close to the patient’s physiology. In this paper, we investigate the existing technologies and discover the trends to build Yet Another Authentication Method (YAAM). The YAAM is going to extract a distinctive image from a patient’s viewfinder and securely transform it into authentication token that are supported by the Geo-location, relative proximity of surrounding smart objects etc. that we call security-context. The authentication tokens are only generated on the fly when token context is right for the image stream captured by the wearable camera. The results presented in this paper not only present the pros and cons of the existing alternative authentication technologies, they also aide in the development of the YAAM prototype.
Original languageEnglish
Title of host publicationProceedings of the International Conference on Applications and Techniques in Cyber Security and Intelligence
EditorsJemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam
PublisherSpringer-Verlag London Ltd.
Pages220-237
Number of pages18
Volume580
ISBN (Electronic)9783319670713
ISBN (Print)9783319670706
DOIs
Publication statusPublished - 01 Jan 2018
EventInternational Conference on Applications and Techniques in Cyber Security and Intelligence: ATCSI 2017 - Zhejiang Business Technology Institute, Ningbo, China
Duration: 16 Jun 201718 Jun 2017
http://aibd.us/ (Conference website)
https://www.springer.com/us/book/9783319670706 (Conference proceedings)

Publication series

NameAdvances in Intelligent Systems and Computing
Volume580
ISSN (Print)2194-5357

Conference

ConferenceInternational Conference on Applications and Techniques in Cyber Security and Intelligence
CountryChina
CityNingbo
Period16/06/1718/06/17
OtherThe 2017 International Conference on Applications and Techniques in Cyber Intelligence (ATCI), building on the previous successes in Guangzhou, China (2016), Dallas, USA (2015), Beijing, China (2014), and Sydney, Australia (2013), is proud to be in the 5th consecutive conference year. Previously, the event is known as the International Workshop on Applications and Techniques in Cyber Security (ATCS 2016), held in conjunction with the International Conference on Security and Privacy in Communication Networks (SecureComm).

The 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence focuses on all aspects on techniques and applications in cyber and electronics security and intelligence research. The purpose of ATCI 2017 is to provide a forum for presentation and discussion of innovative ideas, cutting edge research results, and novel techniques, methods and applications on all aspects of cyber and electronics security and intelligence.
Internet address

Fingerprint Dive into the research topics of 'Discovering trends for the development of novel authentication applications for dementia patients'. Together they form a unique fingerprint.

  • Cite this

    Chaudhry, J., Farmand, S., Islam, S. M. S., Islam, M. R., Hannay, P., & Valli, C. (2018). Discovering trends for the development of novel authentication applications for dementia patients. In J. Abawajy, K-K. R. Choo, & R. Islam (Eds.), Proceedings of the International Conference on Applications and Techniques in Cyber Security and Intelligence (Vol. 580, pp. 220-237). (Advances in Intelligent Systems and Computing; Vol. 580). Springer-Verlag London Ltd.. https://doi.org/10.1007/978-3-319-67071-3_29