BB23.P Spatial-based authorization and authentication

From its-wiki.no

Revision as of 18:12, 11 December 2017 by Josef.Noll (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
Title Spatial-based authorization and authentication
Page Title BB23.P Spatial-based authorization and authentication
Technology Line Security & Safety
Lead partner GUT
Leader Mateusz Rzymowski
Contributors VEMCO, GUT, PRE, TYCO, UCC
Related to Use Cases SCOTT:WP8, SCOTT:WP9, SCOTT:WP12, SCOTT:WP14, SCOTT:WP15, SCOTT:WP21
Description The set of tools for utilizing localization/spatial data (e.g. location, direction of the incoming signal, RF signal strength etc.) for object/users authentication and authorization. This block is composed of different localization methods and algorithms and related HW solutions. Moreover, dedicated software solution that utilize this information will be developed, as well as dedicated authentication and authorization mechanismsm. It means that the information about object physical location or the RF signal parameters that are used for its positioning will be used as an additional method to prove his identity and verify its credentials
Main output Software components: Localization methods and agorithms, authentication and authorization mechanisms. Hardware components: dedicated WSN sensors.
BB category Methodology (for SW/HW development), SW component, HW component
Baseline There are localization systems on the market but are dedicated mainly for object position estimation and the correlation between utilizing this information for its authorization and authentication is weak and provide wery simple functionality e.g. access control to certain areas that are physically separated. This block is aimed to show what kind of information from different localization methods can be utilized and how to serve as an additional, reliable authorization and authentication mechanism.
Current TRL 4 (access control, positioning solutions exists but their usage for authentication and authorization is limited and usually dedicated to one fitted scenario or laboratory environment)
Target TRL 6 (realization and implementation of SW nad HW components in test environment with real (or close to real) operation conditions)