The Location-based Authentication with The Active Infrastructure

被引:0
作者
Jaros, David [1 ]
Kuchta, Radek [1 ]
Vrba, Radimir [1 ]
机构
[1] Brno Univ Technol, FEEC, Dept Microelect, Brno, Czech Republic
来源
PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2011) | 2011年
关键词
Location-based authentication; active infrastructures; local authentication; remote authentication;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper introduces location-based authentication techniques that are especially addressed to use in buildings and the environment, which is not covered by GPS signal (Global Position System). An active infrastructure is used as a source of position information. Two techniques are proposed. The first technique performs a remote user's authentication where the user's terminal broadcasts identity message. The active infrastructure evaluates user's position and informs an authenticator. The other proposed technique performs local user's authentication. The authentication process is launched on the user's terminal. The user's terminal collects information from its actual neighborhood and evaluates position information.
引用
收藏
页码:228 / 230
页数:3
相关论文
共 4 条
  • [1] Denning D. E., 1996, Computer Fraud & Security, P12, DOI 10.1016/S1361-3723(97)82613-9
  • [2] Eun-Jun Yoon, 2009, 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC 2009), P398, DOI 10.1109/ICICIC.2009.80
  • [3] A novel service-oriented AAA architecture
    He, R
    Yuan, M
    Hu, JP
    Zhang, H
    Kan, ZG
    Ma, J
    [J]. PIMRC 2003: 14TH IEEE 2003 INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS PROCEEDINGS, VOLS 1-3 2003, 2003, : 2833 - 2837
  • [4] Lu CF, 2003, 37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, P573