Ad Hoc Networks. 8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016, Revised Selected Papers

Research Article

A Prototype Implementation of Continuous Authentication for Tactical Applications

Download
236 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-51204-4_28,
        author={J. Brown and William Pase and Chris McKenzie and Mazda Salmanian and Helen Tang},
        title={A Prototype Implementation of Continuous Authentication for Tactical Applications},
        proceedings={Ad Hoc Networks. 8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016, Revised Selected Papers},
        proceedings_a={ADHOCNETS},
        year={2017},
        month={4},
        keywords={Continuous authentication Mobile ad hoc networks Biometric authentication},
        doi={10.1007/978-3-319-51204-4_28}
    }
    
  • J. Brown
    William Pase
    Chris McKenzie
    Mazda Salmanian
    Helen Tang
    Year: 2017
    A Prototype Implementation of Continuous Authentication for Tactical Applications
    ADHOCNETS
    Springer
    DOI: 10.1007/978-3-319-51204-4_28
J. Brown1,*, William Pase2,*, Chris McKenzie3,*, Mazda Salmanian1,*, Helen Tang1,*
  • 1: Defence Research and Development Canada
  • 2: Armacode Inc.
  • 3: MIC
*Contact email: david.brown@drdc-rddc.gc.ca, bill@armacode.com, chris@mckenzieic.com, mazda.salmanian@drdc-rddc.gc.ca, helen.tang@drdc-rddc.gc.ca

Abstract

Recent advances in wireless and computing technology have led to accelerated efforts to equip soldiers at the tactical level with sophisticated handheld communications devices to share situational awareness data. An important consideration is how to secure these devices, and how to ensure that the users of the devices have not been compromised. This paper presents the details of prototyping activity we conducted in which two commercial biometric devices were integrated with a handheld communication device to perform continuous user authentication. We discuss the design of the prototype, its performance, and lessons learned that apply to future efforts at implementing continuous authentication in a military-focused setting.