This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Toward More Secure and Reliable Access Control
July-September 2012 (vol. 11 no. 3)
pp. 76-83
D. Singelee, Katholieke Univ. Leuven, Leuven, Belgium
R. Peeters, Katholieke Univ. Leuven, Leuven, Belgium
B. Preneel, Katholieke Univ. Leuven, Leuven, Belgium
Conventional access control mechanisms, relying on a single security token to authenticate remote users, introduce a single point of failure and are vulnerable to relay attacks. A threshold-based distance-bounding protocol that distributes a user's private key among various personal devices improves system security and reliability.
Index Terms:
reliability,authorisation,cryptographic protocols,mobile computing,public key cryptography,system reliability improvement,access control,remote user authentication,security token,relay attack failures,relay attack vulnerability,threshold-based distance-bounding protocol,user private key distribution,personal devices,system security improvement,Protocols,Logic gates,Access control,Public key,Remote monitoring,RFID,access control,threshold cryptography,distance bounding protocols
Citation:
D. Singelee, R. Peeters, B. Preneel, "Toward More Secure and Reliable Access Control," IEEE Pervasive Computing, vol. 11, no. 3, pp. 76-83, July-Sept. 2012, doi:10.1109/MPRV.2011.42
Usage of this product signifies your acceptance of the Terms of Use.