Daniel DeBruno, Kyle Moissinac, Joseph Severt, Abdelrahman Elleithy
{"title":"无线电因素认证:900MHz频段上的身份管理","authors":"Daniel DeBruno, Kyle Moissinac, Joseph Severt, Abdelrahman Elleithy","doi":"10.1109/UEMCON51285.2020.9298110","DOIUrl":null,"url":null,"abstract":"Highly sensitive information systems need a simple and secure method of authentication. To supplement standard login procedures, we can implement multiple variations of two-factor authentication through radio waves, based on specific use cases. This allows us to enforce a proximity-based authentication system allowing for a physical separation of users at work and home. We can also ensure fine-grained access control for systems requiring a small number of privileged users. We will demonstrate two possible implementations, both using forms of public-key cryptography. The first scheme broadcasts a time-synchronized token to all available computers in a geographic area, and the second scheme uses public and private key pairs for digitally signed access request over-the-air.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Radio-Factor Authentication: Identity Management over the 900MHz Band\",\"authors\":\"Daniel DeBruno, Kyle Moissinac, Joseph Severt, Abdelrahman Elleithy\",\"doi\":\"10.1109/UEMCON51285.2020.9298110\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Highly sensitive information systems need a simple and secure method of authentication. To supplement standard login procedures, we can implement multiple variations of two-factor authentication through radio waves, based on specific use cases. This allows us to enforce a proximity-based authentication system allowing for a physical separation of users at work and home. We can also ensure fine-grained access control for systems requiring a small number of privileged users. We will demonstrate two possible implementations, both using forms of public-key cryptography. The first scheme broadcasts a time-synchronized token to all available computers in a geographic area, and the second scheme uses public and private key pairs for digitally signed access request over-the-air.\",\"PeriodicalId\":433609,\"journal\":{\"name\":\"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)\",\"volume\":\"58 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/UEMCON51285.2020.9298110\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UEMCON51285.2020.9298110","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Radio-Factor Authentication: Identity Management over the 900MHz Band
Highly sensitive information systems need a simple and secure method of authentication. To supplement standard login procedures, we can implement multiple variations of two-factor authentication through radio waves, based on specific use cases. This allows us to enforce a proximity-based authentication system allowing for a physical separation of users at work and home. We can also ensure fine-grained access control for systems requiring a small number of privileged users. We will demonstrate two possible implementations, both using forms of public-key cryptography. The first scheme broadcasts a time-synchronized token to all available computers in a geographic area, and the second scheme uses public and private key pairs for digitally signed access request over-the-air.