A prototype implementation of continuous authentication for tactical applications

5Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recent advances in wireless and computing technology have led to accelerated efforts to equip soldiers at the tactical level with sophisticated handheld communications devices to share situational awareness data. An important consideration is how to secure these devices, and how to ensure that the users of the devices have not been compromised. This paper presents the details of prototyping activity we conducted in which two commercial biometric devices were integrated with a handheld communication device to perform continuous user authentication. We discuss the design of the prototype, its performance, and lessons learned that apply to future efforts at implementing continuous authentication in a military-focused setting.

Cite

CITATION STYLE

APA

Brown, J. D., Pase, W., McKenzie, C., Salmanian, M., & Tang, H. (2017). A prototype implementation of continuous authentication for tactical applications. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 184 LNICST, pp. 342–353). Springer Verlag. https://doi.org/10.1007/978-3-319-51204-4_28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free