Daniel DeBruno, Kyle Moissinac, Joseph Severt, Abdelrahman Elleithy
{"title":"Radio-Factor Authentication: Identity Management over the 900MHz Band","authors":"Daniel DeBruno, Kyle Moissinac, Joseph Severt, Abdelrahman Elleithy","doi":"10.1109/UEMCON51285.2020.9298110","DOIUrl":null,"url":null,"abstract":"Highly sensitive information systems need a simple and secure method of authentication. To supplement standard login procedures, we can implement multiple variations of two-factor authentication through radio waves, based on specific use cases. This allows us to enforce a proximity-based authentication system allowing for a physical separation of users at work and home. We can also ensure fine-grained access control for systems requiring a small number of privileged users. We will demonstrate two possible implementations, both using forms of public-key cryptography. The first scheme broadcasts a time-synchronized token to all available computers in a geographic area, and the second scheme uses public and private key pairs for digitally signed access request over-the-air.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UEMCON51285.2020.9298110","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Highly sensitive information systems need a simple and secure method of authentication. To supplement standard login procedures, we can implement multiple variations of two-factor authentication through radio waves, based on specific use cases. This allows us to enforce a proximity-based authentication system allowing for a physical separation of users at work and home. We can also ensure fine-grained access control for systems requiring a small number of privileged users. We will demonstrate two possible implementations, both using forms of public-key cryptography. The first scheme broadcasts a time-synchronized token to all available computers in a geographic area, and the second scheme uses public and private key pairs for digitally signed access request over-the-air.