The Community for Technology Leaders
Green Image
Issue No. 06 - November/December (2017 vol. 4)
ISSN: 2325-6095
pp: 16-20
Aniello Castiglione , University of Salerno and University of Naples “Federico II”
Kim-Kwan Raymond Choo , University of Texas at San Antonio
Michele Nappi , University of Salerno
Stefano Ricciardi , University of Molise
Edge computing can potentially play a crucial role in enabling user authentication and monitoring through context-aware biometrics in military/battlefield applications. For example, in Internet of Military Things (IoMT) or Internet of Battlefield Things (IoBT), an increasing number of ubiquitous sensing and computing devices worn by military personnel and embedded within military equipment (combat suit, instrumented helmets, weapon systems, etc.) are capable of acquiring a variety of static and dynamic biometrics (e.g., face, iris, periocular, fingerprints, heart-rate, gait, gestures, and facial expressions). Such devices may also be capable of collecting operational context data. These data collectively can be used to perform context-adaptive authentication in-the-wild and continuous monitoring of soldier's psychophysical condition in a dedicated edge computing architecture.
Biometrics (access control), Cloud computing, Context-aware services, Computer architecture, Conferences, Authentication
718 ms
(Ver 3.3 (11022016))