AlQahtani et al., 2021 - Google Patents
Ci2fa: Continuous indoor two-factor authentication based on trilateration systemAlQahtani et al., 2021
View PDF- Document ID
- 83786064233893692
- Author
- AlQahtani A
- Alamleh H
- Gourd J
- Publication year
- Publication venue
- 2021 International Conference on COMmunication Systems & NETworkS (COMSNETS)
External Links
Snippet
Beacon frame is a type of management frame that is transmitted periodically by Wi-Fi Access Points (APs) for the purpose of establishing connections; also, it announces the existence of a network, allowing devices to find and identify the network and subsequently to request …
- 238000000034 method 0 abstract description 10
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/08—Mobility data transfer
- H04W8/10—Mobility data transfer between location register and external networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/20—Selecting an access point
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W76/00—Connection management, e.g. connection set-up, manipulation or release
- H04W76/02—Connection set-up
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W60/00—Registration, e.g. affiliation to network; De-registration, e.g. terminating affiliation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W92/00—Interfaces specially adapted for wireless communication networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W68/00—Notification of users, e.g. alerting for incoming communication or change of service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W36/00—Hand-off or reselection arrangements
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | Location-based authentication and authorization using smart phones | |
US10992670B1 (en) | Authenticating identities for establishing secure network tunnels | |
US9529985B2 (en) | Global authentication service using a global user identifier | |
Chen et al. | Lightweight and provably secure user authentication with anonymity for the global mobility network | |
US9692603B2 (en) | Biometric PKI authentication | |
AlQahtani et al. | Bf2fa: Beacon frame two-factor authentication | |
US20060117104A1 (en) | Setting information distribution apparatus, method, program, and medium, authentication setting transfer apparatus, method, program, and medium, and setting information reception program | |
Aman et al. | A lightweight protocol for secure data provenance in the Internet of Things using wireless fingerprints | |
AlQahtani et al. | 0EISUA: zero effort indoor secure user authentication | |
US20160277395A1 (en) | A computer implemented method, communications system and computer programs products for securing operations in authentication and authorization systems using biometric information | |
US11271922B2 (en) | Method for authenticating a user and corresponding device, first and second servers and system | |
AlQahtani et al. | Ci2fa: Continuous indoor two-factor authentication based on trilateration system | |
US11848926B2 (en) | Network authentication | |
US20180248892A1 (en) | Location-Based Continuous Two-Factor Authentication | |
US9503442B1 (en) | Credential-based application programming interface keys | |
Hasan et al. | Internet of things device authentication scheme using hardware serialization | |
AlQahtani et al. | Ts2fa: Trilateration system two factor authentication | |
AlQahtani et al. | 0ei2fa: Zero effort indoor two factor authentication | |
Manurung | Designing of user authentication based on multi-factor authentication on wireless networks | |
Ghose et al. | ZITA: zero-interaction two-factor authentication using contact traces and in-band proximity verification | |
Kumar et al. | A robust and secure user authentication scheme based on multifactor and multi‐gateway in IoT enabled sensor networks | |
Ajit et al. | Formal Verification of 5G EAP-AKA protocol | |
Kreutz et al. | Auth4app: Protocols for identification and authentication using mobile applications | |
Ji et al. | A nonlinearity-based secure face-to-face device authentication for mobile devices | |
Lee et al. | An efficient authentication protocol for mobile communications |