{"id":"https://openalex.org/W3130706842","doi":"https://doi.org/10.1109/comsnets51098.2021.9352930","title":"CI2FA: Continuous Indoor Two-factor Authentication Based On Trilateration System","display_name":"CI2FA: Continuous Indoor Two-factor Authentication Based On Trilateration System","publication_year":2021,"publication_date":"2021-01-05","ids":{"openalex":"https://openalex.org/W3130706842","doi":"https://doi.org/10.1109/comsnets51098.2021.9352930","mag":"3130706842"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets51098.2021.9352930","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets51098.2021.9352930","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083471183","display_name":"Ali Abdullah S. AlQahtani","orcid":"https://orcid.org/0000-0002-8225-4180"},"institutions":[{"id":"https://openalex.org/I129510320","display_name":"University of Wisconsin\u2013Green Bay","ror":"https://ror.org/05hbexn54","country_code":"US","type":"education","lineage":["https://openalex.org/I129510320"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ali Abdullah S. AlQahtani","raw_affiliation_strings":["University of Wisconsin,Computer Science,Green Bay,Wisconsin,USA","Computer Science, University of Wisconsin, Green Bay, Wisconsin, USA"],"affiliations":[{"raw_affiliation_string":"University of Wisconsin,Computer Science,Green Bay,Wisconsin,USA","institution_ids":["https://openalex.org/I129510320"]},{"raw_affiliation_string":"Computer Science, University of Wisconsin, Green Bay, Wisconsin, USA","institution_ids":["https://openalex.org/I129510320"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083865852","display_name":"Hosam Alamleh","orcid":"https://orcid.org/0000-0003-3455-6616"},"institutions":[{"id":"https://openalex.org/I153901656","display_name":"University of North Carolina Wilmington","ror":"https://ror.org/02t0qr014","country_code":"US","type":"education","lineage":["https://openalex.org/I153901656"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hosam Alamleh","raw_affiliation_strings":["University of North Carolina Wilmington,Computer Science,Wilmington,North Carolina,USA","Computer Science, University of North Carolina Wilmington, Wilmington, North Carolina, USA"],"affiliations":[{"raw_affiliation_string":"University of North Carolina Wilmington,Computer Science,Wilmington,North Carolina,USA","institution_ids":["https://openalex.org/I153901656"]},{"raw_affiliation_string":"Computer Science, University of North Carolina Wilmington, Wilmington, North Carolina, USA","institution_ids":["https://openalex.org/I153901656"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030932838","display_name":"Jean Gourd","orcid":null},"institutions":[{"id":"https://openalex.org/I93320256","display_name":"University of Tampa","ror":"https://ror.org/007h1g065","country_code":"US","type":"education","lineage":["https://openalex.org/I93320256"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jean Gourd","raw_affiliation_strings":["University of Tampa,Computer Science,Tampa,Florida,USA","Computer Science, University of Tampa, Tampa, Florida, USA"],"affiliations":[{"raw_affiliation_string":"University of Tampa,Computer Science,Tampa,Florida,USA","institution_ids":["https://openalex.org/I93320256"]},{"raw_affiliation_string":"Computer Science, University of Tampa, Tampa, Florida, USA","institution_ids":["https://openalex.org/I93320256"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5083471183"],"corresponding_institution_ids":["https://openalex.org/I129510320"],"apc_list":null,"apc_paid":null,"fwci":0.5014,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.62462731,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10326","display_name":"Indoor and Outdoor Localization Technologies","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10326","display_name":"Indoor and Outdoor Localization Technologies","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trilateration","display_name":"Trilateration","score":0.9132866859436035},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8337787389755249},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.6002023220062256},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5900577902793884},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5730403661727905},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.5410714149475098},{"id":"https://openalex.org/keywords/factor","display_name":"Factor (programming language)","score":0.5329711437225342},{"id":"https://openalex.org/keywords/mac-address","display_name":"MAC address","score":0.524779736995697},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.4809369444847107},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.47399628162384033},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.42853373289108276},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21635383367538452},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11134663224220276},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08194282650947571}],"concepts":[{"id":"https://openalex.org/C20832178","wikidata":"https://www.wikidata.org/wiki/Q1146298","display_name":"Trilateration","level":3,"score":0.9132866859436035},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8337787389755249},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.6002023220062256},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5900577902793884},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5730403661727905},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.5410714149475098},{"id":"https://openalex.org/C2781039887","wikidata":"https://www.wikidata.org/wiki/Q1391724","display_name":"Factor (programming language)","level":2,"score":0.5329711437225342},{"id":"https://openalex.org/C2777321455","wikidata":"https://www.wikidata.org/wiki/Q20484","display_name":"MAC address","level":2,"score":0.524779736995697},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.4809369444847107},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.47399628162384033},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.42853373289108276},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21635383367538452},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11134663224220276},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08194282650947571},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comsnets51098.2021.9352930","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comsnets51098.2021.9352930","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1508651263","https://openalex.org/W1544279955","https://openalex.org/W2017741286","https://openalex.org/W2045467487","https://openalex.org/W2064449929","https://openalex.org/W2583689681","https://openalex.org/W2611445911","https://openalex.org/W2769919814","https://openalex.org/W2961612815","https://openalex.org/W3010662330","https://openalex.org/W3013320212","https://openalex.org/W3022237288","https://openalex.org/W3028492322","https://openalex.org/W3089737823","https://openalex.org/W3114680312","https://openalex.org/W6788085054"],"related_works":["https://openalex.org/W1707434239","https://openalex.org/W3130929031","https://openalex.org/W2248192341","https://openalex.org/W2790716548","https://openalex.org/W2085095272","https://openalex.org/W2337616151","https://openalex.org/W2761350175","https://openalex.org/W2091347175","https://openalex.org/W4251070852","https://openalex.org/W4256457918"],"abstract_inverted_index":{"Beacon":[0],"frame":[1,7],"is":[2,9,77,188],"a":[3,29,56,74,138,155,161,166],"type":[4],"of":[5,20,28,58,73,137,170],"management":[6],"that":[8,78,125,154,160],"transmitted":[10,106],"periodically":[11],"by":[12,133],"Wi-Fi":[13],"Access":[14],"Points":[15],"(APs)":[16],"for":[17],"the":[18,26,37,48,53,81,87,97,130,143,177],"purpose":[19],"establishing":[21],"connections;":[22],"also,":[23],"it":[24],"announces":[25],"existence":[27],"network,":[30],"allowing":[31],"devices":[32,65,79,127,140],"to":[33,41,51,83,93,96,108,129],"find":[34],"and":[35,39,85,164],"identify":[36],"network":[38,49],"subsequently":[40],"request":[42],"access.":[43],"It":[44],"contains":[45],"information":[46],"about":[47],"needed":[50],"make":[52],"request.":[54],"Within":[55],"range":[57],"different":[59],"radio":[60],"frequency":[61],"(RF)":[62],"technologies,":[63],"Wi-Fi-capable":[64],"can":[66,123],"sense":[67],"beacon":[68],"frames.":[69],"The":[70,147,180],"primary":[71],"advantage":[72],"broadcast":[75],"message":[76],"have":[80],"ability":[82],"read":[84],"process":[86],"enclosed":[88],"data":[89,103],"with":[90,118],"no":[91],"need":[92],"be":[94],"connected":[95],"corresponding":[98],"network.":[99],"Our":[100],"research":[101],"utilizes":[102],"within":[104],"these":[105],"messages":[107],"perform":[109],"two-factor":[110],"authentication":[111],"(2FA)":[112],"scheme":[113,172],"that,":[114],"unlike":[115],"existing":[116],"methods,":[117],"minimal":[119],"user":[120,132,156,162],"involvement.":[121],"We":[122],"ensure":[124],"both":[126,136],"belong":[128],"original":[131],"determining":[134],"if":[135],"user's":[139,178],"are":[141],"in":[142,176,185],"same":[144],"physical":[145],"area.":[146],"proposed":[148],"method":[149,183],"relies":[150],"on":[151,192],"an":[152,158,174],"object":[153,159,175],"knows,":[157],"owns,":[163],"-":[165,173],"significant":[167],"presented":[168,184],"contribution":[169],"this":[171,186],"environment.":[179],"newly":[181],"designed":[182],"study":[187],"empirically":[189],"evaluated":[190],"based":[191],"real":[193],"login":[194],"attempts.":[195]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
