This Article 
 Bibliographic References 
 Add to: 
Toward More Secure and Reliable Access Control
July-September 2012 (vol. 11 no. 3)
pp. 76-83
D. Singelee, Katholieke Univ. Leuven, Leuven, Belgium
R. Peeters, Katholieke Univ. Leuven, Leuven, Belgium
B. Preneel, Katholieke Univ. Leuven, Leuven, Belgium
Conventional access control mechanisms, relying on a single security token to authenticate remote users, introduce a single point of failure and are vulnerable to relay attacks. A threshold-based distance-bounding protocol that distributes a user's private key among various personal devices improves system security and reliability.
Index Terms:
reliability,authorisation,cryptographic protocols,mobile computing,public key cryptography,system reliability improvement,access control,remote user authentication,security token,relay attack failures,relay attack vulnerability,threshold-based distance-bounding protocol,user private key distribution,personal devices,system security improvement,Protocols,Logic gates,Access control,Public key,Remote monitoring,RFID,access control,threshold cryptography,distance bounding protocols
D. Singelee, R. Peeters, B. Preneel, "Toward More Secure and Reliable Access Control," IEEE Pervasive Computing, vol. 11, no. 3, pp. 76-83, July-Sept. 2012, doi:10.1109/MPRV.2011.42
Usage of this product signifies your acceptance of the Terms of Use.