2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering 2014
DOI: 10.1109/mobilecloud.2014.46
|View full text |Cite
|
Sign up to set email alerts
|

Cloudlets Authentication in NFC-Based Mobile Computing

Abstract: The availability of NFC capabilities on smartphones has facilitated the development of a large number of related applications. Some of these applications may be resourceintensive tasks; and Cloudlets-based mobile computing are a good candidate to offload computation while being free of WAN delays, jitter, congestion, and failures. In this context, new use cases dedicated to NFC applications based on cloudlets are presented and a security protocol is proposed to authenticate the cloudlets by the mobile devices.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 10 publications
(16 reference statements)
0
15
0
Order By: Relevance
“…For example, in the context of federated mobile cloud computing, Shouhuai et al [80] introduced the concept of situational authentication, which is based on notions such as "whom you are with", "where you are", and "what time is it". Other authors, such as Bouzefrane [81], use Near Field Communication (NFC) to verify that a mobile device is offloading tasks to an authorized local cloudlet. Note that the notion of location-based authentication has been already studied in several other fields (e.g.…”
Section: Identity and Authenticationmentioning
confidence: 99%
“…For example, in the context of federated mobile cloud computing, Shouhuai et al [80] introduced the concept of situational authentication, which is based on notions such as "whom you are with", "where you are", and "what time is it". Other authors, such as Bouzefrane [81], use Near Field Communication (NFC) to verify that a mobile device is offloading tasks to an authorized local cloudlet. Note that the notion of location-based authentication has been already studied in several other fields (e.g.…”
Section: Identity and Authenticationmentioning
confidence: 99%
“…The connected devices shares only limited public information that enables them to exchange authenticated key protocol. Similarly, NFC also enables a secure authentication method in a cloudlet scenario [15]. NFC applications based on cloudlets enables authentication by NFC capable end devices.…”
Section: Identification and Authenticationmentioning
confidence: 99%
“…Bouzefrane et.al [7] implemented an NFC based technique for the cloudlet authentication. This authentication mechanism guarantees the data integrity between the cloudlet and the mobile.…”
Section: Related Workmentioning
confidence: 99%