[go: up one dir, main page]

AlQahtani et al., 2020 - Google Patents

0ei2fa: Zero effort indoor two factor authentication

AlQahtani et al., 2020

View PDF
Document ID
8682499767689203185
Author
AlQahtani A
Alamleh H
Gourd J
Mugasa H
Publication year
Publication venue
2020 14th International Conference on Innovations in Information Technology (IIT)

External Links

Snippet

Two-factor authentication (2FA) systems implement by verifying at least two factors. A factor is something a user knows (password, or phrase), something a user possesses (smart card, or smartphone), something a user is (fingerprint, or iris), something a user does (keystroke) …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/06Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/20Signalling of application services or auxiliary data signalling, i.e. transmitting data via a non-traffic channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W76/00Connection management, e.g. connection set-up, manipulation or release
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W52/00Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications

Similar Documents

Publication Publication Date Title
Zhang et al. Location-based authentication and authorization using smart phones
Chen et al. S2M: A lightweight acoustic fingerprints-based wireless device authentication protocol
EP3552418B1 (en) Wireless network authorization using a trusted authenticator
Xie et al. GeneWave: Fast authentication and key agreement on commodity mobile devices
US10992670B1 (en) Authenticating identities for establishing secure network tunnels
US8737965B2 (en) Wireless device monitoring systems and monitoring devices, and associated methods
US8175578B2 (en) Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture
US8392712B1 (en) System and method for provisioning a unique device credential
AlQahtani et al. 0EISUA: zero effort indoor secure user authentication
AlQahtani et al. Ts2fa: Trilateration system two factor authentication
AlQahtani et al. Bf2fa: Beacon frame two-factor authentication
AlQahtani et al. 0ei2fa: Zero effort indoor two factor authentication
GB2418819A (en) System which transmits security settings in authentication response message
US20180248892A1 (en) Location-Based Continuous Two-Factor Authentication
Hasan et al. Internet of things device authentication scheme using hardware serialization
Xiao et al. PHY-authentication protocol for spoofing detection in wireless networks
Zhou et al. Nauth: Secure face-to-face device authentication via nonlinearity
Ghose et al. ZITA: zero-interaction two-factor authentication using contact traces and in-band proximity verification
AlQahtani et al. Ci2fa: Continuous indoor two-factor authentication based on trilateration system
Mwinuka et al. FakeAP detector: an android-based client-side application for detecting Wi-Fi hotspot spoofing
Chen et al. Wireless device authentication using acoustic hardware fingerprints
Jia-Ning et al. Ambient audio authentication
Al-Attar et al. Smartphone-key: Hands-free two-factor authentication for voice-controlled devices using wi-fi location
Ji et al. A nonlinearity-based secure face-to-face device authentication for mobile devices
Brassil et al. Traffic signature-based mobile device location authentication