2014 International Conference on Smart Communications in Network Technologies (SaCoNeT) 2014
DOI: 10.1109/saconet.2014.6867775
|View full text |Cite
|
Sign up to set email alerts
|

IMAKA-Tate: Secure and efficient privacy preserving for Indoor Positioning applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…Our previous work in IMAKA-Tate [4] defines a novel protocol for mutual authentication and key agreement by using used cryptographic Tate pairing ternary field F 3 509 [2]. In this work, we proved that our protocol is suitable to mitigate various threats, as well as preserve the privacy in the constrained nature of Wireless Indoor Positioning (WIP) applications.…”
Section: Related Workmentioning
confidence: 80%
“…Our previous work in IMAKA-Tate [4] defines a novel protocol for mutual authentication and key agreement by using used cryptographic Tate pairing ternary field F 3 509 [2]. In this work, we proved that our protocol is suitable to mitigate various threats, as well as preserve the privacy in the constrained nature of Wireless Indoor Positioning (WIP) applications.…”
Section: Related Workmentioning
confidence: 80%
“…Pseudo-certificates in [34] rely on trusted third parties (Certificate Authorities) for their protocol. The IMAKA-Tate method [16] is built upon a three-way handshake, using encrypted public keys exchanged between each side. In the OTPri method [50], the user's mobile locally computes its location with an oblivious transfer.…”
Section: B On Devicementioning
confidence: 99%
“…IMAKA-Tate [13] is our prior work which aims at providing novel security and privacy method tailored to tackle the security and privacy challenges in Wireless Indoor Positioning (WIP) system. Particularly, we demonstrated that our method provide security and privacy solution that is feasible for the constrained nature of WIP.…”
Section: Related Workmentioning
confidence: 99%
“…To tackle the specific challenges in smart RFID system, IMAKA-Tate [13] early establishes encryption even before the authentication is started. In this context, the entire communication data including the RFID tag identity are transported in encrypted payload.…”
Section: Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation