{"id":"https://openalex.org/W2150435289","doi":"https://doi.org/10.1109/pccc.2008.4745118","title":"Location Authentication Methods for Wireless Network Access Control","display_name":"Location Authentication Methods for Wireless Network Access Control","publication_year":2008,"publication_date":"2008-12-01","ids":{"openalex":"https://openalex.org/W2150435289","doi":"https://doi.org/10.1109/pccc.2008.4745118","mag":"2150435289"},"language":"en","primary_location":{"id":"doi:10.1109/pccc.2008.4745118","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pccc.2008.4745118","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 IEEE International Performance, Computing and Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090662473","display_name":"Lichun Bao","orcid":null},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Lichun Bao","raw_affiliation_strings":["Computer Science Department, Donald Bren School of ICS, University of California, Irvine, CA, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Donald Bren School of ICS, University of California, Irvine, CA, USA","institution_ids":["https://openalex.org/I204250578"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5090662473"],"corresponding_institution_ids":["https://openalex.org/I204250578"],"apc_list":null,"apc_paid":null,"fwci":0.678,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.74913058,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"160","last_page":"167"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.8169827461242676},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8100411295890808},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5595890283584595},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5290588140487671},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.508960485458374},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.5068824887275696},{"id":"https://openalex.org/keywords/authentication-server","display_name":"Authentication server","score":0.48366889357566833},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4828908443450928},{"id":"https://openalex.org/keywords/network-access-device","display_name":"Network Access Device","score":0.4710806608200073},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4338507652282715},{"id":"https://openalex.org/keywords/computer-access-control","display_name":"Computer access control","score":0.42976823449134827},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2981567978858948},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.20510181784629822},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1437874138355255}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8169827461242676},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8100411295890808},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5595890283584595},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5290588140487671},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.508960485458374},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.5068824887275696},{"id":"https://openalex.org/C2777331311","wikidata":"https://www.wikidata.org/wiki/Q784561","display_name":"Authentication server","level":3,"score":0.48366889357566833},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4828908443450928},{"id":"https://openalex.org/C184533269","wikidata":"https://www.wikidata.org/wiki/Q16977811","display_name":"Network Access Device","level":4,"score":0.4710806608200073},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4338507652282715},{"id":"https://openalex.org/C44415380","wikidata":"https://www.wikidata.org/wiki/Q17008721","display_name":"Computer access control","level":3,"score":0.42976823449134827},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2981567978858948},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.20510181784629822},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1437874138355255},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/pccc.2008.4745118","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pccc.2008.4745118","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 IEEE International Performance, Computing and Communications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.144.5950","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.144.5950","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.ics.uci.edu/~lbao/publications/BaoIPCCC2008.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7200000286102295,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W1484437324","https://openalex.org/W1520914943","https://openalex.org/W1526361168","https://openalex.org/W1563315162","https://openalex.org/W1570439748","https://openalex.org/W1572228849","https://openalex.org/W1637905077","https://openalex.org/W1833746972","https://openalex.org/W1916709771","https://openalex.org/W1972386273","https://openalex.org/W2037716001","https://openalex.org/W2042959266","https://openalex.org/W2047925852","https://openalex.org/W2070301163","https://openalex.org/W2086042811","https://openalex.org/W2105543555","https://openalex.org/W2110004054","https://openalex.org/W2110099156","https://openalex.org/W2112737587","https://openalex.org/W2120188575","https://openalex.org/W2131123432","https://openalex.org/W2133925300","https://openalex.org/W2137949826","https://openalex.org/W2146973388","https://openalex.org/W2147982144","https://openalex.org/W2148575440","https://openalex.org/W2156186849","https://openalex.org/W2160293370","https://openalex.org/W2164947865","https://openalex.org/W2165491783","https://openalex.org/W2167930752","https://openalex.org/W2168371280","https://openalex.org/W2168927703","https://openalex.org/W2170320703","https://openalex.org/W2282481803","https://openalex.org/W2965432086","https://openalex.org/W4256367071","https://openalex.org/W4299402001","https://openalex.org/W6633790316","https://openalex.org/W6681956964","https://openalex.org/W7024580046"],"related_works":["https://openalex.org/W2127216601","https://openalex.org/W2001534453","https://openalex.org/W2526209010","https://openalex.org/W2375261751","https://openalex.org/W1996683534","https://openalex.org/W176006387","https://openalex.org/W4285197270","https://openalex.org/W2184054418","https://openalex.org/W2136061724","https://openalex.org/W2376086785"],"abstract_inverted_index":{"Location-based":[0],"service":[1,10],"provisioning":[2],"is":[3],"of":[4,23,94,165],"great":[5],"interests":[6],"to":[7,40,58,69,113,125,156,168],"wireless":[8,96],"Internet":[9],"providers.":[11],"However,":[12],"the":[13,21,37,91,116,130,148,158,169,175],"essential":[14],"mechanism,":[15],"location":[16,42,53,79,92,138],"authentication,":[17],"can":[18,135],"easily":[19],"become":[20],"target":[22],"network":[24,38,45,60,140],"hackers":[25],"for":[26,34,44,102],"free-riding":[27],"and":[28,51,55,81,98,161,174,180],"attacks.":[29],"We":[30],"identify":[31],"two":[32,133],"aspects":[33],"improvements":[35],"at":[36,121],"providers":[39],"enforce":[41,59,137],"authentication":[43,80],"access":[46,61,129,141],"control":[47,62],"location-based":[48],"key":[49],"distribution":[50],"run-time":[52],"verification,":[54],"propose":[56],"solutions":[57],"based":[63,84,139],"on":[64,85,150],"location,":[65],"which":[66,88],"we":[67,76,107],"refer":[68],"as":[70],"LENA":[71,146],"(Location-Enforced":[72],"Network":[73],"Access).":[74],"First,":[75],"designed":[77],"a":[78,109,163],"authorization":[82],"protocol":[83,112],"Diffie-Hellman":[86],"algorithm,":[87],"securely":[89],"authenticates":[90],"claims":[93],"mobile":[95,117,159],"devices,":[97,160],"distributes":[99],"shared":[100],"keys":[101],"data":[103],"encryption":[104],"purpose.":[105],"Secondly,":[106],"employ":[108],"mobility":[110],"management":[111],"guarantee":[114],"that":[115],"devices":[118,153],"are":[119,178],"physically":[120],"where":[122],"they":[123,128],"claim":[124],"be":[126,144],"when":[127],"network.":[131],"These":[132],"steps":[134],"separately":[136],"control,":[142],"or":[143],"combined.":[145],"climinates":[147],"dependence":[149],"expensive":[151],"hardware":[152],"in":[154],"order":[155],"localize":[157],"solves":[162],"couple":[164],"possible":[166],"attacks":[167],"system.":[170],"The":[171],"computations,":[172],"communication,":[173],"memory":[176],"requirement":[177],"evaluated":[179],"validated":[181],"using":[182],"simulations.":[183]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":4}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
