The active badge location system
ACM Transactions on Information Systems (TOIS)
Biometrics: A New Era in Security
Computer
A Multi-View Facial Analysis Technique for Identity Authentication
IEEE Pervasive Computing
RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Authentication Method with Impersonal Token Cards
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
A Security Policy Based upon Hardware Encryption
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 7 - Volume 7
Pervasive Authentication Domains for Automatic Pervasive Device Authorization
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
A Context-centric Security Middleware for Service Provisioning in Pervasive Computing
SAINT '05 Proceedings of the The 2005 Symposium on Applications and the Internet
Fingerprint Authentication Device Based on Optical Characteristics Inside a Finger
CVPRW '06 Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop
Analysis of the RFID Security Protocol for Secure Smart Home Network
ICHIT '06 Proceedings of the 2006 International Conference on Hybrid Information Technology - Volume 02
Physically Unclonable Function-Based Security and Privacy in RFID Systems
PERCOM '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
Design principles for tamper-resistant smartcard processors
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Wireless LAN security and IEEE 802.11i
IEEE Wireless Communications
Preparing smartcard for the future: from passive to active
IEEE Transactions on Consumer Electronics
Hi-index | 0.00 |
The proliferation of mobile devices and wireless technologies pave the ground to new scenarios that attract the interest of service providers and business operators. However, to let mobile users able to receive the same services independently from the context in which they operate, several open issues need to be solved. One of these issues is related to the current levels of security that often require mobile users to exchange secret credentials with the network operators or an authentication server. This constraint limits mobile users who wish to access wireless services anywhere without caring for configuration of used devices.This paper proposes a new device that enables a mobile user to access wireless services in a seamless and automatic way using a context-aware approach in ubiquitous/nomadic computing environments. This device implements a Bluetooth personal identification badge that automatically authenticates and authorizes a mobile user to access services independently of the mobile terminal used. Any user's terminal can retrieve proper credentials in order to authenticate and gain access to different network access points. The design and implementation of a prototype of such a device is presented.