2015
DOI: 10.5626/jok.2015.42.8.979
|View full text |Cite
|
Sign up to set email alerts
|

BLE-OTP Authorization Mechanism for iBeacon Network Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2017
2017

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 1 publication
0
1
0
Order By: Relevance
“…In particular for BLE, the focus of most security research is on the development of authentication or message authorisation mechanisms, e.g. based on one-time passwords [12]. What is typically overlooked in the literature is that BLE, beyond being a communication protocol, is also an enabler of high-accuracy indoor localisation.…”
Section: Introductionmentioning
confidence: 99%
“…In particular for BLE, the focus of most security research is on the development of authentication or message authorisation mechanisms, e.g. based on one-time passwords [12]. What is typically overlooked in the literature is that BLE, beyond being a communication protocol, is also an enabler of high-accuracy indoor localisation.…”
Section: Introductionmentioning
confidence: 99%