DocumentCode
568508
Title
Location-Based Authentication and Authorization Using Smart Phones
Author
Zhang, Feng ; Kondoro, Aron ; Muftic, Sead
Author_Institution
Sch. of Inf. & Commun. Technol., R. Inst. of Technol. (KTH), Stockholm, Sweden
fYear
2012
fDate
25-27 June 2012
Firstpage
1285
Lastpage
1292
Abstract
Authentication and authorization are two of the most important security features for mobile transaction systems. Most commonly, these schemes depend on three factors: what you know (secret), what you have (token), and what you are (biometrics). In this paper, we propose a location-based authentication and authorization scheme for mobile transactions using smart phones. The paper first describes the distinguished features and the architecture of our proposed solution. Second, the core of our design, including three parts: location registration, authentication and authorization as well as location verification, are described.
Keywords
authorisation; mobile computing; smart phones; transaction processing; location registration; location verification; location-based authentication scheme; location-based authorization scheme; mobile transaction systems; security features; smart phones; Authentication; Authorization; Mobile communication; Protocols; Servers; Smart phones; authentication; authorization; location; mobile;
fLanguage
English
Publisher
ieee
Conference_Titel
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location
Liverpool
Print_ISBN
978-1-4673-2172-3
Type
conf
DOI
10.1109/TrustCom.2012.198
Filename
6296127
Link To Document