Show simple item record

dc.contributor.authorAdeka, Muhammad I.*
dc.contributor.authorShepherd, Simon J.*
dc.contributor.authorAbd-Alhameed, Raed A.*
dc.date.accessioned2016-10-07T14:25:00Z
dc.date.available2016-10-07T14:25:00Z
dc.date.issued2013
dc.identifier.citationAdeka MI, Shepher SJ and Abd-Alhameed RA (2013) Extending The Security Perimeter Through A Web of Trust: The Impact of GPS Technology on Location-based Authentication Techniques . In: The Proceedings of the 5th International Conference on Internet Technologies & Applications (ITA13) 10-13 Sep 2013, Wrexham, North Wales, UK.
dc.identifier.urihttp://hdl.handle.net/10454/9593
dc.descriptionNo
dc.description.abstractSecurity is a function of the trust that is associated with the active variables in a system. Thus, the human factor being the most critical element in security systems, the security perimeter could be defined in relation to the human trust level. Trust level could be measured via positive identification of the person/device on the other side of the interaction medium, using various authentication schemes; location-based being one of the latest. As for the location-based services, the identity of a customer remains hazy as long as his location is unknown; he virtually remains a ghost in the air, with implications on trust. This paper reviews the various location-based authentication techniques with a focus on the role that GPS could play in optimising this authentication approach. It advocates the urgent need to make all transmission devices GPS-compliant as a way forward, despite the privacy issues that might arise.
dc.subjectGlobal positioning system: Security perimeter; GPS; Location based services; Social networking online; Critical elements; Authentication techniques; Interaction mediums; GPS compliant; Authentication; Transmission devices; GPS technologies; Web of trust; Authentication scheme; Telecommunication services; Mobile security
dc.titleExtending the security perimeter through a web of trust: the impact of GPS technology on location-based authentication techniques
dc.status.refereedYes
dc.typeConference Paper
dc.type.versionNo full-text in the repository


Item file(s)

Thumbnail
Name:
adeka_et_al_ita13.pdf
Size:
563.5Kb
Format:
PDF
Description:
Keep suppressed - no permission ...

This item appears in the following Collection(s)

Show simple item record