[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

AlQahtani et al., 2021 - Google Patents

Ci2fa: Continuous indoor two-factor authentication based on trilateration system

AlQahtani et al., 2021

View PDF
Document ID
83786064233893692
Author
AlQahtani A
Alamleh H
Gourd J
Publication year
Publication venue
2021 International Conference on COMmunication Systems & NETworkS (COMSNETS)

External Links

Snippet

Beacon frame is a type of management frame that is transmitted periodically by Wi-Fi Access Points (APs) for the purpose of establishing connections; also, it announces the existence of a network, allowing devices to find and identify the network and subsequently to request …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/10Mobility data transfer between location register and external networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W76/00Connection management, e.g. connection set-up, manipulation or release
    • H04W76/02Connection set-up
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W60/00Registration, e.g. affiliation to network; De-registration, e.g. terminating affiliation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W68/00Notification of users, e.g. alerting for incoming communication or change of service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W36/00Hand-off or reselection arrangements

Similar Documents

Publication Publication Date Title
Zhang et al. Location-based authentication and authorization using smart phones
US10992670B1 (en) Authenticating identities for establishing secure network tunnels
US9529985B2 (en) Global authentication service using a global user identifier
Chen et al. Lightweight and provably secure user authentication with anonymity for the global mobility network
US9692603B2 (en) Biometric PKI authentication
AlQahtani et al. Bf2fa: Beacon frame two-factor authentication
US20060117104A1 (en) Setting information distribution apparatus, method, program, and medium, authentication setting transfer apparatus, method, program, and medium, and setting information reception program
Aman et al. A lightweight protocol for secure data provenance in the Internet of Things using wireless fingerprints
AlQahtani et al. 0EISUA: zero effort indoor secure user authentication
US20160277395A1 (en) A computer implemented method, communications system and computer programs products for securing operations in authentication and authorization systems using biometric information
US11271922B2 (en) Method for authenticating a user and corresponding device, first and second servers and system
AlQahtani et al. Ci2fa: Continuous indoor two-factor authentication based on trilateration system
US11848926B2 (en) Network authentication
US20180248892A1 (en) Location-Based Continuous Two-Factor Authentication
US9503442B1 (en) Credential-based application programming interface keys
Hasan et al. Internet of things device authentication scheme using hardware serialization
AlQahtani et al. Ts2fa: Trilateration system two factor authentication
AlQahtani et al. 0ei2fa: Zero effort indoor two factor authentication
Manurung Designing of user authentication based on multi-factor authentication on wireless networks
Ghose et al. ZITA: zero-interaction two-factor authentication using contact traces and in-band proximity verification
Kumar et al. A robust and secure user authentication scheme based on multifactor and multi‐gateway in IoT enabled sensor networks
Ajit et al. Formal Verification of 5G EAP-AKA protocol
Kreutz et al. Auth4app: Protocols for identification and authentication using mobile applications
Ji et al. A nonlinearity-based secure face-to-face device authentication for mobile devices
Lee et al. An efficient authentication protocol for mobile communications