Visible to the public Context Aware Ubiquitous Biometrics in Edge of Military Things

TitleContext Aware Ubiquitous Biometrics in Edge of Military Things
Publication TypeJournal Article
Year of Publication2017
AuthorsCastiglione, A., Choo, K. Raymond, Nappi, M., Ricciardi, S.
JournalIEEE Cloud Computing
Volume4
Pagination16–20
ISSN2325-6095
Keywordsauthentication, battlefield-level biometric monitoring, biometrics (access control), cloud computing, Computer architecture, computing devices, Conferences, context aware biometrics, context aware ubiquitous biometrics, context-adaptive authentication, Context-aware services, dedicated edge computing architecture, distributed processing, dynamic biometrics, edge of military things, human factors, Internet of battlefield things, Internet of military Things, internet of military/battlefield things, Internet of Things, iobt, IoMT, message authentication, military computing, military equipment, military personnel, military-battlefield applications, operational context data collection, pubcrawl, resilience, Resiliency, Scalability, soldier psychophysical condition continuous monitoring, static biometrics, ubiquitous computing, ubiquitous sensing
Abstract

Edge computing can potentially play a crucial role in enabling user authentication and monitoring through context-aware biometrics in military/battlefield applications. For example, in Internet of Military Things (IoMT) or Internet of Battlefield Things (IoBT),an increasing number of ubiquitous sensing and computing devices worn by military personnel and embedded within military equipment (combat suit, instrumented helmets, weapon systems, etc.) are capable of acquiring a variety of static and dynamic biometrics (e.g., face, iris, periocular, fingerprints, heart-rate, gait, gestures, and facial expressions). Such devices may also be capable of collecting operational context data. These data collectively can be used to perform context-adaptive authentication in-the-wild and continuous monitoring of soldier's psychophysical condition in a dedicated edge computing architecture.

URLhttps://ieeexplore.ieee.org/document/8260821
DOI10.1109/MCC.2018.1081072
Citation Keycastiglione_context_2017