skip to main content
10.1145/1387269.1387281acmconferencesArticle/Chapter ViewAbstractPublication PagesicpsConference Proceedingsconference-collections
short-paper

A pervasive identification service for physical access control

Published: 06 July 2008 Publication History

Abstract

In pervasive environments managing people access control to physical places through their digital identity and simple, uniform, non-invasive yet secure mechanisms, is certainly an important issue. We face this problem by proposing a new secure one-time-password approach with peculiar features of efficiency making it very suitable for the considered application. This aspect is indeed particularly important in pervasive setting, where portable devices are used at any time and anywhere, making the power consumption aspect strongly critical.

References

[1]
F. Buccafurri and G. Lax. A low power number-generation scheme for secure authentication. Technical Report 02, CS-Laboratory, DIMET, Univ. of Reggio Calabria, 2008, available from authors.
[2]
ECMA. ECMA-182: Data Interchange on 12,7,mm 48-Track Magnetic Tape Cartridges - DLT1 Format. Dec. 1992.
[3]
N. Haller. The s/key one-time password system. In Proceedings of the ISOC Symposium on Network and Distributed System Security, pages 151--157, 1994.
[4]
N. Haller, C. Metz, P. Nesser, and M. Straw. A one-time password system. RFC 2289, February 1998.
[5]
J. R. Hill. A table driven approach to cyclic redundancy check calculations. SIGCOMM Comput. Commun. Rev., 9(2):40--60, 1979.
[6]
L. Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770--772, Nov. 1981.
[7]
D. L. McDonald, R. J. Atkinson, and C. Metz. One-time passwords in everything (opie): Experiences with building and using strong authentication. In Proceedings of the 5th USENIX UNIX Security Symposium, 1995.
[8]
W. Peterson. Error-correcting codes. M.I.T. Press and John Wiley & Sons, 1961.
[9]
R. L. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communication of ACM., 21(2):120--126, 1978.
[10]
A. Rubin and N. Wright. Off-line generation of limited-use credit card numbers. In Proceedings of the Fifth International Conference on Financial Cryptography, pages 165--175, 2001.
[11]
A. D. Rubin. Independent one-time passwords. In USENIX Journal of Computer Systems, 1996.

Cited By

View all
  • (2009)An efficient k-anonymous localization technique for assistive environmentsProceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments10.1145/1579114.1579116(1-8)Online publication date: 9-Jun-2009

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICPS '08: Proceedings of the 5th international conference on Pervasive services
July 2008
202 pages
ISBN:9781605581354
DOI:10.1145/1387269
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 July 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. authentication
  2. one-time-password
  3. people tracking

Qualifiers

  • Short-paper

Conference

ICPS08
Sponsor:

Acceptance Rates

Overall Acceptance Rate 23 of 34 submissions, 68%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2009)An efficient k-anonymous localization technique for assistive environmentsProceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments10.1145/1579114.1579116(1-8)Online publication date: 9-Jun-2009

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media