DocumentCode :
2899686
Title :
Design and Evaluation of an Architecture for Ubiquitous User Authentication Based on Identity Management Systems
Author :
Barisch, Marc
Author_Institution :
Inst. of Commun. Networks & Comput. Eng., Univ. of Stuttgart, Stuttgart, Germany
fYear :
2011
fDate :
16-18 Nov. 2011
Firstpage :
863
Lastpage :
872
Abstract :
Nowadays, users consume digital services with their digital identities on a multitude of different devices, e.g. notebooks, smartphones or even TV sets. Hereby, users are faced with additional challenges, i.e., devices have different security levels and not all digital identities must be used on all devices. Identities used for home banking should not be used on an insecure device and business identities should only be used on business devices. Moreover, it should be possible to switch between devices in a seamless way without the need to reauthenticate again on each device. Therefore, we propose an architecture that integrates all user devices and exploits identity management systems for ubiquitous user authentication. The proposed architecture improves usability by reducing the number of manual authentication procedures, by relaying authentication to devices with appropriate input capabilities and by supporting the user in identity selection. Security is improved by the possibility to perform authentication on secure devices, the provisioning of short-lived tokens to in secure devices and the opportunity to perform multifactor authentication across devices. Our implementation is based on the Shibboleth IdM system and serves as proof-of-concept of our architecture. The conducted security evaluation confirms that our concept does not introduce additional security threats.
Keywords :
authorisation; computer network security; home banking; ubiquitous computing; Shibboleth IdM system; business devices; business identities; digital identity; digital services; home banking; identity management systems; identity selection; insecure device; multifactor authentication; reauthentication; ubiquitous user authentication architecture design; ubiquitous user authentication architecture evaluation; Authentication; Business; Context; Protocols; Smart phones; Usability; Digitial Identity; Identity Management; Session Management; Ubiquitos authentication; Virtual Device;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on
Conference_Location :
Changsha
Print_ISBN :
978-1-4577-2135-9
Type :
conf
DOI :
10.1109/TrustCom.2011.116
Filename :
6120909
Link To Document :
بازگشت