Location-based Authentication Protocols for Mobile User Environments
碩士 === 國立臺灣科技大學 === 資訊管理系 === 104 === With the increasing popularity of mobile devices, services can be accessed via wireless networks anytime and anywhere. However, the wireless environment has more security threats than wired networks. Therefore, this thesis is concerned with the mobility of mobil...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2016
|
Online Access: | http://ndltd.ncl.edu.tw/handle/42712704702185575255 |
id |
ndltd-TW-104NTUS5396005 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-104NTUS53960052017-10-29T04:34:40Z http://ndltd.ncl.edu.tw/handle/42712704702185575255 Location-based Authentication Protocols for Mobile User Environments 行動使用者環境下的位置導向身分鑑別協定 Ting-Hsuan Tseng 曾亭媗 碩士 國立臺灣科技大學 資訊管理系 104 With the increasing popularity of mobile devices, services can be accessed via wireless networks anytime and anywhere. However, the wireless environment has more security threats than wired networks. Therefore, this thesis is concerned with the mobility of mobile devices and security threats in wireless networks, such as unauthorized access, data integrity, etc. We proposed an authentication and authorization mechanism for mobile devices in various environments. The application environments can be divided into household and public location environments with the household environment combined with IPTV to provide mobile IPTV personalized services for authorized users. In this thesis, we proposed three authentication protocols by using face recognition and mobile devices in household-based and public location environments, which can be used for new business models. The first is the household-based authentication protocol used for the domestic environment. The second and third are the location-based authentication protocol and location-based ECC (Elliptic curve cryptography) authentication protocol for the public location environment. The authenticated user can be permitted to use the personalized services by the IPTV providers offered in the household environment. In the public location environment, service providers can use different regions with different mechanisms which allows users to enjoy personalized services, thereby increasing profits. The experiments and analysis show that the proposed mechanisms can meet the security requirements and provide great system usability, deploy ability and service scalability for personalized services. Nai-Wei Lo 羅乃維 2016 學位論文 ; thesis 76 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣科技大學 === 資訊管理系 === 104 === With the increasing popularity of mobile devices, services can be accessed via wireless networks anytime and anywhere. However, the wireless environment has more security threats than wired networks. Therefore, this thesis is concerned with the mobility of mobile devices and security threats in wireless networks, such as unauthorized access, data integrity, etc. We proposed an authentication and authorization mechanism for mobile devices in various environments. The application environments can be divided into household and public location environments with the household environment combined with IPTV to provide mobile IPTV personalized services for authorized users.
In this thesis, we proposed three authentication protocols by using face recognition and mobile devices in household-based and public location environments, which can be used for new business models. The first is the household-based authentication protocol used for the domestic environment. The second and third are the location-based authentication protocol and location-based ECC (Elliptic curve cryptography) authentication protocol for the public location environment. The authenticated user can be permitted to use the personalized services by the IPTV providers offered in the household environment. In the public location environment, service providers can use different regions with different mechanisms which allows users to enjoy personalized services, thereby increasing profits. The experiments and analysis show that the proposed mechanisms can meet the security requirements and provide great system usability, deploy ability and service scalability for personalized services.
|
author2 |
Nai-Wei Lo |
author_facet |
Nai-Wei Lo Ting-Hsuan Tseng 曾亭媗 |
author |
Ting-Hsuan Tseng 曾亭媗 |
spellingShingle |
Ting-Hsuan Tseng 曾亭媗 Location-based Authentication Protocols for Mobile User Environments |
author_sort |
Ting-Hsuan Tseng |
title |
Location-based Authentication Protocols for Mobile User Environments |
title_short |
Location-based Authentication Protocols for Mobile User Environments |
title_full |
Location-based Authentication Protocols for Mobile User Environments |
title_fullStr |
Location-based Authentication Protocols for Mobile User Environments |
title_full_unstemmed |
Location-based Authentication Protocols for Mobile User Environments |
title_sort |
location-based authentication protocols for mobile user environments |
publishDate |
2016 |
url |
http://ndltd.ncl.edu.tw/handle/42712704702185575255 |
work_keys_str_mv |
AT tinghsuantseng locationbasedauthenticationprotocolsformobileuserenvironments AT céngtíngxuān locationbasedauthenticationprotocolsformobileuserenvironments AT tinghsuantseng xíngdòngshǐyòngzhěhuánjìngxiàdewèizhìdǎoxiàngshēnfēnjiànbiéxiédìng AT céngtíngxuān xíngdòngshǐyòngzhěhuánjìngxiàdewèizhìdǎoxiàngshēnfēnjiànbiéxiédìng |
_version_ |
1718558229741436928 |