Conventional access control mechanisms usually rely on the use of a single token for user authentication, and are generally vulnerable to relay attacks. In addition, these systems often suffer from usabil-ity issues. Since they are centrally managed, key management tends to be a rather slow and cumbersome process in this setting. In this paper, we propose a threshold-based location-aware ac-cess control mechanism. It combines the concepts of secret shar-ing and distance bounding protocols to tackle various security vul-nerabilities. Our proposed solution offers protection against any set of (t − 1) compromised user’s devices, with t being an ad-justable threshold number. It supports user-centered management, since users can alter the set of...
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional ...
Distance bounding protocols enable a device to establish an upper bound on the physical distance to ...
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional ...
© 2013, IGI Global. Designing a secure, resilient and user-friendly access control system is a chall...
Conventional access control mechanisms, relying on a single security token to authenticate remote us...
Distance-bounding protocols can o er protection against attacks on access control systems that requ...
Distance-bounding protocols can offer protection against attacks on access control systems that requ...
Abstract. Smartcard-based protocols represent an increasingly large share of the wireless authentica...
Authentication in conventional networks (like the Internet) is usually based upon something you know...
Ubiquitous computing is revolutionizing the way humans interact with machines and carry out everyday...
AbstractUbiquitous computing is revolutionizing the way humans interact with machines and carry out ...
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate whether the ...
Abstract. Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat agains...
© 2018 Association for Computing Machinery. Distance-bounding protocols allow a verifier to both aut...
Pervasive environments are dynamically changing environments with enormous amounts of information av...
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional ...
Distance bounding protocols enable a device to establish an upper bound on the physical distance to ...
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional ...
© 2013, IGI Global. Designing a secure, resilient and user-friendly access control system is a chall...
Conventional access control mechanisms, relying on a single security token to authenticate remote us...
Distance-bounding protocols can o er protection against attacks on access control systems that requ...
Distance-bounding protocols can offer protection against attacks on access control systems that requ...
Abstract. Smartcard-based protocols represent an increasingly large share of the wireless authentica...
Authentication in conventional networks (like the Internet) is usually based upon something you know...
Ubiquitous computing is revolutionizing the way humans interact with machines and carry out everyday...
AbstractUbiquitous computing is revolutionizing the way humans interact with machines and carry out ...
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate whether the ...
Abstract. Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat agains...
© 2018 Association for Computing Machinery. Distance-bounding protocols allow a verifier to both aut...
Pervasive environments are dynamically changing environments with enormous amounts of information av...
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional ...
Distance bounding protocols enable a device to establish an upper bound on the physical distance to ...
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional ...