Abstract
We aim at creating ease in authentication process through non-password-based authentication scheme for the Dementia patients. The chronic neuro-degenerative disease leaves the patients with memory recall/loss issues. With ever growing rich list of assistive technologies, that bring ease in patient’s daily life i.e. remote Electrocardiography and peripheral capillary oxygen saturation monitoring, remote blood glucose level monitoring applications etc. These assistive technologies are ubiquitous, seamless, immersed in the background, often remotely monitored, and the most intimate applications that run very close to the patient’s physiology. In this paper, we investigate the existing technologies and discover the trends to build Yet Another Authentication Method (YAAM). The YAAM is going to extract a distinctive image from a patient’s viewfinder and securely transform it into authentication token that are supported by the Geo-location, relative proximity of surrounding smart objects etc. that we call security-context. The authentication tokens are only generated on the fly when token context is right for the image stream captured by the wearable camera. The results presented in this paper not only present the pros and cons of the existing alternative authentication technologies, they also aide in the development of the YAAM prototype.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hlywa, M., Biddle, R., Patrick, S.A.: Facing the facts about image type in recognition-based graphical passwords. In: ACSAC 2011, pp. 149–158 (2011)
Kim, S.h., Kim, K.: A Simple Modeling Method for Mobile Password Schemes and Its Analysis, pp. 5–7 (2011)
Gao, H., Ma, L., Qiu, J., Liu, X.: Exploration of a Hand-Based Graphical Password Scheme pp. 143–150 (2011)
Bicakci, K., Oorschot, P.: A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation. In: NSPW 2011, pp. 25–36 (2011)
Zakaria, N., Griffiths, D., Brostoff, S., Yan, J.: Shoulder surfing defense for recall-based graphical passwords. In: SOUPS 2011, p. 6 (2011)
Hayashi, E., Hong, J., Christin, N.: Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes. In: CHI 2011, pp. 2055–2064 (2011)
Khot, R., Srinathan, K., Kumaraguru, P.: MARASIM—a novel jigsaw based authentication scheme using tagging. In: CHI 2011, pp. 2605–2614 (2011)
Balasundaram, S.R.: Securing Tests in E-Learning Environment, pp. 2–5 (2011)
Yeole, A.S.: Proposal for Novel 3D Password for Providing Authentication in Critical Web Applications (Icwet), pp. 663–666 (2011)
Kim, S., Kim, J., Kim, S., Cho, H.: A new shoulder-surfing resistant password for mobile environments. In: ICUIMC 2011, pp. 27–37 (2011)
Spitzer, J., Singh, C., Schweitzer, D.: A security class project in graphical passwords. In: JoCSC 2010, pp. 7–13 (2010)
Stobert, E., Forget, A., Chiasson, S., Oorschot, P., Biddle, R.: Exploring usability effects of increasing security in click-based graphical passwords. In: ACSAC 2010, pp 79–88 (2010)
Dunphy, P., Heiner, A., Asokan, N.: A closer look at recognition- based graphical passwords on mobile devices. In: SPOUS 2010, pp. 3–13 (2010)
Gao, H., Ren, Z., Chang, X., Liu, X., Aickelin, U.: The effect of baroque music on the PassPoints graphical password. In: CIVR 2010, pp. 129–134 (2010)
Forget, A., Chiasson, S., Biddle, R.: Input precision for gaze-based graphical passwords. In: CHI EA 2010, pp. 4279–4284 (2010)
Kim, D., Dunphy, P., Briggs, P., Hook, J., Nicholson, J., Nicholson, J., Olivier, P.: Multi-Touch Authentication on Tabletops, pp. 1093–1102 (2010)
Forget, A., Chiasson, S., Biddle, R.: Shoulder-Surfing Resistance with Eye-Gaze Entry in Cued-Recall Graphical Passwords, pp. 1107–1110 (2010)
Stobert, E.: Usability and strength in click-based graphical passwords. In: CHI EA 2010, pp. 4303–4308 (2010)
Renaud, K., Angeli, A.: Visual passwords-cure-all or snake-oil. Commun. ACM 52(12), 135 (2009)
Chiasson, S., Forget, A., Stobert, E., Oorschot, P., Biddle, R.: Multiple password interference in text passwords and click-based graphical passwords. In: CCS 2009, pp. 500–511 (2009)
Renaud, K., Maguire, J.: Armchair Authentication, pp. 388–397 (2009)
Boit, A.: A Random Cursor Matrix to Hide Graphical Password Input, p. 60558 (2009)
Luca, A., Denzel, M., Hussmann, H.: Look into my eyes—can you guess my password. In: SOUPS 2009, pp 7–12 (2009)
Everitt, K.M., Bragin, T., Fogarty, J., Kohno, T.: A comprehensive study of frequency, interference, and training of multiple graphical passwords. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems (CHI 2009), pp. 889–898 (2009)
Misbahuddin, M.: A user friendly password authenticated key agreement for multi server environment. In: ICAC 2003, pp. 113–119 (2009)
Srikanth, V.: Think-an image based CAPTCHA mechanism (testifying human based on intelligence and knowledge). In: Proceedings of ICAC3 2009, pp. 421–424 (2009)
Farmand, S.: An analytical study of 4-way recognition based sequence reproduction scheme in graphical password. UTM Thesis DB (2010)
Ray, P.: Ray’s scheme: graphical password based hybrid authentication system for smart hand held devices. In: JoIEA 2012, vol. 2, no. 2, pp. 1–11 (2012)
Oorschot, P.: System security, platform security and usability. In: STC 2010, pp. 1–2 (2010)
Zhang, Y., Monrose, F., Reiter, M.: The security of modern password expiration: an algorithmic framework and empirical analysis. In: CCC 2010, pp. 176–186 (2010)
Shay, R., Komanduri, S., Kelley, P., Leon, P., Mazurek, M., Bauer, L., Christin, N., Cranor, L.: Encountering stronger password requirements-user attitudes and behaviors. In: SOUPS 2010, pp. 20–40 (2010)
Group, M.I.: Towards understanding ATM security a field study of real world ATM use. In: SOUPS 2010, pp. 16–26 (2010)
Flor, D.: Where do security policies come from. In: SOUPS 2010, pp. 10–24 (2010)
Beznosov, K., Inglesant, P., Lobo, J., Reeder, R., Zurko, M.: Usability meets access control-challenges and research opportunities. In: SACMAT 2009, pp. 73–74 (2009)
Silva, C.: A generic library for GUI reasoning and testing. In: SAC’19, pp. 121–128 (2009)
Avison, D., Fitzgerald, G.: Information Systems Development, Techniques and Tools International Edition. McGraw Hill, New York (2006)
Chapman, J.R., System development methodology. In: SIGCPR 2007, pp. 56–67 (2007)
Wakefield, T., Yeates, D.: System Analysis and Design, 2nd edn. Prentice Hall, Maldon (1994)
Maddison, R., Baker, G.: Feature Analysis of Five Information System Methodologies, pp. 277–306. Elsevier Science Publishers B.V., North Holland Press, Amsterdam (1984)
Boehm, B., Hansen, W.: Spiral Development, Experience Principles and Refinements (No. CMU/SEI-2000-SR-008). Carnegie Mellon Univ Pittsburgh Pa Software Engineering INST (2000)
Paetsch, F., Eberlein, A., Maurer, F.: Requirements engineering and agile software development. In: Enabling Technologies, Proceeding WET ICEI 2003, pp. 308–313 (2003)
Berger, H.: Agile development in a bureaucratic arena—a case study experience. JoIMgt 27(6), 386–396 (2007)
Ramsin, R., Taromirad, M.: CEFAM: comprehensive evaluation framework for agile methodologies. In: WISER 2004, pp. 37–44 (2008)
DSDM Consortium: DSDM and Changing Business Processes, Bringing People, Process and Technology Together (2006). Accessed 04 July 2017
Abrahamsson, P., Warsta, J, Siponen, J., Ronkainen, M.: New directions on agile methods: a comparative analysis. In: ICSE 2003, pp. 244–254 (2003)
Hawryszkiewycz, I.: Introduction to System Analysis and Design, 4th edn. Prentice Hall, Maldon (1998)
Burd, S., Jackson, R., Satzinger, J.: System Analysis and Design in a Changing World, Course Technology (2000)
Bennett, S., Skeleton, J., Lunn, K.: Shaum’s Outlines UML, 2nd edn, International Edition, McGraw Hill Education, New York (2005)
Gustafson, D.: Schaum’s Outline of Theory and Problems of Software Engineering. McGraw Hill, New York (2002)
Klein, D.: Foiling the cracker: a survey of, and improvements to password security. In: Proceedings of the USENIX UNIX Security Workshop, Portland, pp. 5–14 (1990)
Wiedenbeck, S., Waters, J., Birget, J., Brodskiy, J., Memon, A.: PassPoints: design and longitudinal evaluation of a graphical password system. IJoHCS 63(1–2), 102–127 (2005)
Ku, W., Tsaur, M.: A remote user authentication scheme using strong graphical passwords. In: LCN 2005, pp. 351–357 (2005)
Blonder, G.: Graphical Passwords, United States patent 5559961 (1996)
Eljetlawi, A., Ithnin, N.: Graphical password: comprehensive study of the usability features of the recognition base graphical password methods. In: ICCIT 2008, pp. 1137–1143 (2008)
Lai, H.L.: Cued recall graphical password system resistant to shoulder surfing. MS Thesis at Universiti Teknologi Malaysia (2013)
Eluard, M., Maetz, Y., Alessio, D.: Action-based graphical password: “Click-a-Secret”. In: ICCE 2011, pp. 265–266 (2011)
Gao, H., Ren, Z., Chang, X., Liu, X., Aickelin, U.: A new graphical password scheme resistant to shoulder-surfing. In: ICC 2010, pp. 194–199 (2010)
Wang, L., Chang, X., Ren, Z., Gao, H., Liu, X., Aickelin, U.: Against spyware using CAPTCHA in graphical password scheme. In: AINA 2010, pp. 760–767 (2010)
Martinez-Diaz, M., Fierrez, J., Martin-Diaz, C., Ortega-Garcia, J.: DooDB: a graphical password database containing doodles and pseudo-signatures. In: ICFHR 2010, pp. 339–344 (2010)
Zheng, Z., Liu, X., Yin, L., Liu, Z.: A stroke-based textual password authentication scheme. In: Education Technology and Computer Science, ETCS 2009, pp. 90–95 (2009)
Gao, H., Liu, X., Wang, S., Liu, H., Dai, R.: Design and analysis of a graphical password scheme, In: ICICIC 2009, pp. 675–678 (2009)
Alsulaiman, F.A., El Saddik, A.: Three-dimensional password for more secure authentication. IEEE Trans. Instrum. Meas. 57(9), 1929–1938 (2008)
Lin, P.L., Weng, L.T., Huang, P.W.: Graphical passwords using images with random tracks of geometric shapes. In: CISP 2008, pp. 27–31 (2008)
Gao, H., Guo, X., Chen, X., Wang, L., Liu, X.: Yagp: yet another graphical password strategy. In: ACSAC 2008, pp. 121–129 (2008)
Farmand, S., Bin Zakaria, O.: Improving graphical password resistant to shoulder-surfing using 4-way recognition-based sequence reproduction (RBSR4). In: ICIME 2010, pp. 644–650 (2010)
Pering, T., Sundar, M., Light, J., Want, R.: Photographic authentication through untrusted terminals. Pervasive Comput. 2, 30–36 (2003)
Yokota, K., Yonekura, T.: A proposal of COMPASS (community portrait authentication system). In: ICC 2005, pp. 367–389 (2005)
Chaudhry, J.: Self-Healing Systems and Wireless Networks Management, pp. 155–170. CRC Press, Boca Raton (2013)
Padma, P., Srinivasan, S.: A survey on biometric based authentication in cloud computing. In: ICICT (2016)
Ozan, E.: Password-free authentication for social networks. In: CCWC 2017 (2017)
Islam, S.M.S., Bennamoun, M., Owens, R., Davies, R.: A review of recent advances in 3D ear and expression invariant face biometrics. ACM Comput. Surv. 14, 1–34 (2012)
Chaudhry, J., Park, S.: AHSEN autonomic healing-based self management engine for network management in hybrid networks. In: GPC2007, pp. 193–203 (2007)
Chaudhry, J., Tariq, U., Amin, A., Rittenhouse, R.: Dealing with sinkhole attacks in wireless sensor networks. In: ASTL 2013 (2013)
Chaudhry, J., Chaudhry, S, Rittenhouse, R.: Phishing attacks and defenses. In: IJSA 2016 (2016)
Chaudhry, J., Qidwai, U., Rittenhouse, R., Lee, M.: Vulnerabilities and verification of cryptographic protocols and their future in wireless body area networks. ICET 2012, pp. 1–5 (2012)
Qidwai, U., Chaudhry, J., Shakir, M.: Ubiquitous monitoring system for critical cardiac abnormalities. In: EMBS 2012 (2012)
Movassaghi, M., Abolhasan, M., Lipman, J., Smith, D., Jamalipour, A.: Wireless body area networks: a survey. Commun. Surv. Tutor. 16, 1658–1686 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Chaudhry, J., Farmand, S., Islam, S.M.S., Islam, M.R., Hannay, P., Valli, C. (2018). Discovering Trends for the Development of Novel Authentication Applications for Dementia Patients. In: Abawajy, J., Choo, KK., Islam, R. (eds) International Conference on Applications and Techniques in Cyber Security and Intelligence. ATCI 2017. Advances in Intelligent Systems and Computing, vol 580. Edizioni della Normale, Cham. https://doi.org/10.1007/978-3-319-67071-3_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-67071-3_29
Published:
Publisher Name: Edizioni della Normale, Cham
Print ISBN: 978-3-319-67070-6
Online ISBN: 978-3-319-67071-3
eBook Packages: EngineeringEngineering (R0)