{"id":"https://openalex.org/W4280583160","doi":"https://doi.org/10.1109/wcnc51071.2022.9771745","title":"ABLE: Zero-effort Two-factor Authentication Exploiting BLE Co-location","display_name":"ABLE: Zero-effort Two-factor Authentication Exploiting BLE Co-location","publication_year":2022,"publication_date":"2022-04-10","ids":{"openalex":"https://openalex.org/W4280583160","doi":"https://doi.org/10.1109/wcnc51071.2022.9771745"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc51071.2022.9771745","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc51071.2022.9771745","pdf_url":null,"source":{"id":"https://openalex.org/S4363607776","display_name":"2022 IEEE Wireless Communications and Networking Conference (WCNC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088464769","display_name":"Yaxi He","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yaxi He","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,State Key Laboratory of Information Security","School of Cyber Security, University of Chinese Academy of Sciences","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,State Key Laboratory of Information Security","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100391924","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0002-2772-4856"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,State Key Laboratory of Information Security","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,State Key Laboratory of Information Security","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003117032","display_name":"Yajun Teng","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yajun Teng","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,State Key Laboratory of Information Security","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences","School of Cyber Security, University of Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,State Key Laboratory of Information Security","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011886723","display_name":"Qiongxiao Wang","orcid":"https://orcid.org/0000-0002-8012-8295"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiongxiao Wang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,State Key Laboratory of Information Security","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences","School of Cyber Security, University of Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,State Key Laboratory of Information Security","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100420894","display_name":"Mingyue Wang","orcid":"https://orcid.org/0000-0002-2649-1819"},"institutions":[{"id":"https://openalex.org/I187380120","display_name":"Agricultural Bank of China","ror":"https://ror.org/015g9sa94","country_code":"CN","type":"other","lineage":["https://openalex.org/I187380120"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingyue Wang","raw_affiliation_strings":["Agricultural Bank of China,Science Technology and Product Management Department","Science Technology and Product Management Department, Agricultural Bank of China"],"affiliations":[{"raw_affiliation_string":"Agricultural Bank of China,Science Technology and Product Management Department","institution_ids":["https://openalex.org/I187380120"]},{"raw_affiliation_string":"Science Technology and Product Management Department, Agricultural Bank of China","institution_ids":["https://openalex.org/I187380120"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036002145","display_name":"Jingqiang Lin","orcid":"https://orcid.org/0000-0003-1508-4879"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]},{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]},{"id":"https://openalex.org/I207169309","display_name":"Cyber University","ror":"https://ror.org/038sdcw17","country_code":"JP","type":"education","lineage":["https://openalex.org/I207169309"]}],"countries":["CN","JP"],"is_corresponding":false,"raw_author_name":"Jingqiang Lin","raw_affiliation_strings":["University of Science and Technology of China,School of Cyber Security","School of Cyber Security, University of Science and Technology of China","Beijing Institute, University of Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology of China,School of Cyber Security","institution_ids":["https://openalex.org/I207169309"]},{"raw_affiliation_string":"School of Cyber Security, University of Science and Technology of China","institution_ids":["https://openalex.org/I126520041"]},{"raw_affiliation_string":"Beijing Institute, University of Science and Technology of China","institution_ids":["https://openalex.org/I92403157","https://openalex.org/I126520041"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5088464769"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.5194,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.61538462,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"992","last_page":"997"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9326000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9326000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9325000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9190000295639038,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.618488609790802},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.551232635974884},{"id":"https://openalex.org/keywords/factor","display_name":"Factor (programming language)","score":0.5261882543563843},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.46532151103019714},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40131059288978577}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.618488609790802},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.551232635974884},{"id":"https://openalex.org/C2781039887","wikidata":"https://www.wikidata.org/wiki/Q1391724","display_name":"Factor (programming language)","level":2,"score":0.5261882543563843},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.46532151103019714},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40131059288978577},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcnc51071.2022.9771745","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc51071.2022.9771745","pdf_url":null,"source":{"id":"https://openalex.org/S4363607776","display_name":"2022 IEEE Wireless Communications and Networking Conference (WCNC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2912135041"],"abstract_inverted_index":{"Two-factor":[0],"authentication":[1,34,139,194],"(2FA)":[2],"offers":[3],"very":[4],"important":[5],"security":[6],"enhancement":[7],"to":[8,27,41,51,87,89,116,170,188,201],"traditional":[9],"username-password":[10],"authentication,":[11],"while":[12],"in":[13,152],"many":[14],"cases":[15],"incurring":[16],"undesirable":[17],"user":[18,85,164],"burdens":[19,44],"(e.g.,":[20,36],"entering":[21],"a":[22,28,61,80,90,109,162],"one-time":[23],"verification":[24],"code":[25],"sent":[26],"phone":[29],"via":[30],"SMS).":[31],"Some":[32],"zero-effort":[33,62,193],"techniques":[35],"Sound-Proof)":[37],"have":[38],"been":[39],"proposed":[40],"relieve":[42],"such":[43],"without":[45],"degrading":[46],"security,":[47],"but":[48,204],"are":[49,126],"vulnerable":[50],"prediction":[52],"attacks":[53,189],"and":[54,93,107,136],"co-existence":[55],"attacks.":[56],"This":[57],"paper":[58],"proposes":[59],"ABLE,":[60],"2FA":[63],"approach":[64],"based":[65,144],"on":[66,82,145],"co-location":[67],"detection":[68],"leveraging":[69],"environmental":[70,112,157],"Bluetooth":[71],"Low":[72],"Energy":[73],"(BLE)":[74],"signal":[75,114,158],"characteristics.":[76],"In":[77],"this":[78],"approach,":[79],"laptop":[81],"which":[83,99,160],"the":[84,94,103,117,123,130,133,138,146,179],"tries":[86],"authenticate":[88],"web":[91],"server,":[92,104],"user&#x2019;s":[95],"smartphone":[96],"placed":[97],"nearby":[98],"is":[100,142,183,197],"trusted":[101],"by":[102,128],"both":[105],"collect":[106],"send":[108],"record":[110],"of":[111,132],"BLE":[113,180],"characteristics":[115],"server.":[118],"The":[119],"server":[120],"decides":[121],"whether":[122],"two":[124,134,150],"devices":[125,151],"co-located":[127],"evaluating":[129],"similarity":[131],"records,":[135],"makes":[137],"decision.":[140],"ABLE":[141,182,196],"constructed":[143],"fact":[147],"that":[148,190],"only":[149,199],"close":[153],"proximity":[154],"share":[155],"similar":[156],"characteristics,":[159],"distinguishes":[161],"legitimate":[163],"device":[165],"from":[166],"potential":[167],"adversaries.":[168],"Due":[169],"its":[171],"location-sensitive":[172],"nature,":[173],"combining":[174],"favorable":[175],"features":[176],"brought":[177],"with":[178,185],"protocol,":[181],"gifted":[184],"good":[186],"resistance":[187],"threaten":[191],"existing":[192],"schemes.":[195],"not":[198],"immune":[200],"remote":[202],"attackers,":[203],"also":[205],"achieves":[206],"an":[207],"accuracy":[208],"over":[209],"90%":[210],"even":[211],"against":[212],"co-present":[213],"attackers.":[214]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
