2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications 2012
DOI: 10.1109/trustcom.2012.198
|View full text |Cite
|
Sign up to set email alerts
|

Location-Based Authentication and Authorization Using Smart Phones

Abstract: Authentication and authorization are two of the most important security features for mobile transaction systems. Most commonly, these schemes depend on three factors: what you know (secret), what you have (token), and what you are (biometrics). In this paper, we propose a locationbased authentication and authorization scheme for mobile transactions using smart phones. The paper first describes the distinguished features and the architecture of our proposed solution. Second, the core of our design, including th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 51 publications
(16 citation statements)
references
References 10 publications
0
16
0
Order By: Relevance
“…This security advance gives a great defense against various types of attacks as brute force, man-in-the-middle, and keyboard hacking attacks (Y. G. Kim & Jun, 2011). The location services offered by mobile phones have also contributed in the authentication process (S.-H. Kim, Choi, Jin, & Lee, 2013;Zhang, Kondoro, & Muftic, 2012). It could provide the continuous identification and authentication and forces the remote threats to be connected to physical locations as claimed in (Choi & www.ccsenet.org/cis Computer and Information Science Vol.…”
Section: Token Based Authenticationmentioning
confidence: 99%
“…This security advance gives a great defense against various types of attacks as brute force, man-in-the-middle, and keyboard hacking attacks (Y. G. Kim & Jun, 2011). The location services offered by mobile phones have also contributed in the authentication process (S.-H. Kim, Choi, Jin, & Lee, 2013;Zhang, Kondoro, & Muftic, 2012). It could provide the continuous identification and authentication and forces the remote threats to be connected to physical locations as claimed in (Choi & www.ccsenet.org/cis Computer and Information Science Vol.…”
Section: Token Based Authenticationmentioning
confidence: 99%
“…For instance, the end user can be spared the inconvenience of having to present the device at a checkout station when leaving the store. Moreover, retail establishments can be spared need to install a barcode scanner at a particular location, which requires an investment in additional in-store infrastructure [9] .…”
Section: A Mobile Assisted Shoppingmentioning
confidence: 99%
“…Location-based access control is previously discussed and addressed in the context of authorization and authentication methods in [23], [24], [25] and [26].…”
Section: B Related Workmentioning
confidence: 99%
“…Industry and academia need to address the open issue of location spoofing alike. Previous works in this area [23], [34] base their strategy on multiple positioning techniques that will be cross evaluated or the approach of distance bounding where the device is located close to a location source, e.g., a Bluetooth beacon. As location spoofing can be done on various levels, i.e., hardware, OS and application level, solutions for reliable location verification need to be solid.…”
Section: Implications Challenges and Outlookmentioning
confidence: 99%