• DocumentCode
    568508
  • Title

    Location-Based Authentication and Authorization Using Smart Phones

  • Author

    Zhang, Feng ; Kondoro, Aron ; Muftic, Sead

  • Author_Institution
    Sch. of Inf. & Commun. Technol., R. Inst. of Technol. (KTH), Stockholm, Sweden
  • fYear
    2012
  • fDate
    25-27 June 2012
  • Firstpage
    1285
  • Lastpage
    1292
  • Abstract
    Authentication and authorization are two of the most important security features for mobile transaction systems. Most commonly, these schemes depend on three factors: what you know (secret), what you have (token), and what you are (biometrics). In this paper, we propose a location-based authentication and authorization scheme for mobile transactions using smart phones. The paper first describes the distinguished features and the architecture of our proposed solution. Second, the core of our design, including three parts: location registration, authentication and authorization as well as location verification, are described.
  • Keywords
    authorisation; mobile computing; smart phones; transaction processing; location registration; location verification; location-based authentication scheme; location-based authorization scheme; mobile transaction systems; security features; smart phones; Authentication; Authorization; Mobile communication; Protocols; Servers; Smart phones; authentication; authorization; location; mobile;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
  • Conference_Location
    Liverpool
  • Print_ISBN
    978-1-4673-2172-3
  • Type

    conf

  • DOI
    10.1109/TrustCom.2012.198
  • Filename
    6296127