Research Article
A Prototype Implementation of Continuous Authentication for Tactical Applications
264 downloads
@INPROCEEDINGS{10.1007/978-3-319-51204-4_28, author={J. Brown and William Pase and Chris McKenzie and Mazda Salmanian and Helen Tang}, title={A Prototype Implementation of Continuous Authentication for Tactical Applications}, proceedings={Ad Hoc Networks. 8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016, Revised Selected Papers}, proceedings_a={ADHOCNETS}, year={2017}, month={4}, keywords={Continuous authentication Mobile ad hoc networks Biometric authentication}, doi={10.1007/978-3-319-51204-4_28} }
- J. Brown
William Pase
Chris McKenzie
Mazda Salmanian
Helen Tang
Year: 2017
A Prototype Implementation of Continuous Authentication for Tactical Applications
ADHOCNETS
Springer
DOI: 10.1007/978-3-319-51204-4_28
Abstract
Recent advances in wireless and computing technology have led to accelerated efforts to equip soldiers at the tactical level with sophisticated handheld communications devices to share situational awareness data. An important consideration is how to secure these devices, and how to ensure that the users of the devices have not been compromised. This paper presents the details of prototyping activity we conducted in which two commercial biometric devices were integrated with a handheld communication device to perform continuous user authentication. We discuss the design of the prototype, its performance, and lessons learned that apply to future efforts at implementing continuous authentication in a military-focused setting.
Copyright © 2016–2024 ICST