BLE (Bluetooth Low Energy) beacons are being deployed in smart cities, especially to augment the shopping experience of customers in real outlets. Thus, humans as they walk in cities pass by different beacons and the sequence of beacons form a path. In this paper, we present how those augmented paths can authenticate a user in a secure way whereby the users can prove they have passed by a path, even with current unsecure beacons. We have built a prototype to validate this new authentication scheme with unsecure Estimote beacons. In addition, as an alternative to BLE, a similar system utilizing Wi-Fi to detect user proximity is reviewed as well
The attitude towards passwords has drastically changed over the past years. Although they protected ...
The new Bluetooth 4.0 low energy (Bluetooth Smart) specification provides developers a means to crea...
The proliferation of mobile devices and wireless technologies pave the ground to new scenarios that ...
Recently, door access control with Internet of Things has become increasingly popular in the field o...
While user authentication (e.g., via passwords and/or biometrics) is considered important, the need ...
Third-party location-based services are independent of wireless carriers and receive the user locati...
The ubiquity of Bluetooth-enabled smartphones and peripherals has brought tremendous convenience to ...
[[abstract]]The ubiquity of Bluetooth-enabled smartphones and peripherals has brought tremendous con...
Bluetooth Low Energy (BLE) beacons have been increasingly used in smart city applications, such as l...
Technology is expected to enhance life in a Smart City: everything is intelligent, digital, intercon...
Today, pairing of Bluetooth Low Energy (BLE) capable devices with user devices is neither secure nor...
The complex way radio waves propagate indoors, leads to the derivation of location using fingerprint...
Asset tracking using Bluetooth Low Energy (BLE) beacons has attracted much attention after the relea...
Bluetooth is an essential wireless standard for short-distance and low-power wireless networks. Heal...
Rooms and buildings in public and private institutions are usually secured with door access control,...
The attitude towards passwords has drastically changed over the past years. Although they protected ...
The new Bluetooth 4.0 low energy (Bluetooth Smart) specification provides developers a means to crea...
The proliferation of mobile devices and wireless technologies pave the ground to new scenarios that ...
Recently, door access control with Internet of Things has become increasingly popular in the field o...
While user authentication (e.g., via passwords and/or biometrics) is considered important, the need ...
Third-party location-based services are independent of wireless carriers and receive the user locati...
The ubiquity of Bluetooth-enabled smartphones and peripherals has brought tremendous convenience to ...
[[abstract]]The ubiquity of Bluetooth-enabled smartphones and peripherals has brought tremendous con...
Bluetooth Low Energy (BLE) beacons have been increasingly used in smart city applications, such as l...
Technology is expected to enhance life in a Smart City: everything is intelligent, digital, intercon...
Today, pairing of Bluetooth Low Energy (BLE) capable devices with user devices is neither secure nor...
The complex way radio waves propagate indoors, leads to the derivation of location using fingerprint...
Asset tracking using Bluetooth Low Energy (BLE) beacons has attracted much attention after the relea...
Bluetooth is an essential wireless standard for short-distance and low-power wireless networks. Heal...
Rooms and buildings in public and private institutions are usually secured with door access control,...
The attitude towards passwords has drastically changed over the past years. Although they protected ...
The new Bluetooth 4.0 low energy (Bluetooth Smart) specification provides developers a means to crea...
The proliferation of mobile devices and wireless technologies pave the ground to new scenarios that ...