The goal of this theme is to empower ICT systems and users with enhanced authentication and access control techniques, which fundamentally uproots most potential security risks due to the weak authentication at the physical layer of ICT systems. Conventional authentication techniques at higher layers of the communications network protocol, however, lead to a transparent signal transmission and receiving environment at the physical layer, which can result in serious security concerns, notably malicious interception, identity theft and spoofing attacks [8]. We will devise novel and effective authentication and identification techniques based on monitoring and analysis of device-, environment- and user-specific information at different layer of ICT systems. Major novelties and advantages of our proposed following studies include hardware attributes, communications environment indicators, and user biometrics for security enhancement, and reduced redundancy and reduced user involvement in the ICT user verification process.