Issue No. 03 - July-September (2012 vol. 11)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MPRV.2011.42
D. Singelee , Katholieke Univ. Leuven, Leuven, Belgium
R. Peeters , Katholieke Univ. Leuven, Leuven, Belgium
B. Preneel , Katholieke Univ. Leuven, Leuven, Belgium
Conventional access control mechanisms, relying on a single security token to authenticate remote users, introduce a single point of failure and are vulnerable to relay attacks. A threshold-based distance-bounding protocol that distributes a user's private key among various personal devices improves system security and reliability.
reliability, authorisation, cryptographic protocols, mobile computing, public key cryptography, system reliability improvement, access control, remote user authentication, security token, relay attack failures, relay attack vulnerability, threshold-based distance-bounding protocol, user private key distribution, personal devices, system security improvement, Protocols, Logic gates, Access control, Public key, Remote monitoring, RFID, access control, threshold cryptography, distance bounding protocols
D. Singelee, R. Peeters and B. Preneel, "Toward More Secure and Reliable Access Control," in IEEE Pervasive Computing, vol. 11, no. , pp. 76-83, 2012.