Discovering trends for the development of novel authentication applications for dementia patients

Document Type

Conference Proceeding

Publication Title

International conference on applications and techniques in cyber security and intelligence: Applications and techniques in cyber security and intelligence

Publisher

Springer International Publishing AG / Edizioni della Normale, Cham

School

School of Science

RAS ID

26105

Comments

Chaudhry, J., Farmand, S., Islam, S. M. S., Islam, M. R., Hannay, P., & Valli, C. (2018). Discovering trends for the development of novel authentication applications for dementia patients. In International Conference on Applications and Techniques in Cyber Security and Intelligence: Applications and Techniques in Cyber Security and Intelligence (pp. 220-237). Edizioni della Normale, Cham. Available here

Abstract

We aim at creating ease in authentication process through non-password-based authentication scheme for the Dementia patients. The chronic neuro-degenerative disease leaves the patients with memory recall/loss issues. With ever growing rich list of assistive technologies, that bring ease in patient’s daily life i.e. remote Electrocardiography and peripheral capillary oxygen saturation monitoring, remote blood glucose level monitoring applications etc. These assistive technologies are ubiquitous, seamless, immersed in the background, often remotely monitored, and the most intimate applications that run very close to the patient’s physiology. In this paper, we investigate the existing technologies and discover the trends to build Yet Another Authentication Method (YAAM). The YAAM is going to extract a distinctive image from a patient’s viewfinder and securely transform it into authentication token that are supported by the Geo-location, relative proximity of surrounding smart objects etc. that we call security-context. The authentication tokens are only generated on the fly when token context is right for the image stream captured by the wearable camera. The results presented in this paper not only present the pros and cons of the existing alternative authentication technologies, they also aide in the development of the YAAM prototype.

DOI

10.1007/978-3-319-67071-3_29

Access Rights

subscription content

Share

 
COinS