{"id":"https://openalex.org/W4398130859","doi":"https://doi.org/10.1145/3643833.3656113","title":"UWB-Auth: A UWB-based Two Factor Authentication Platform","display_name":"UWB-Auth: A UWB-based Two Factor Authentication Platform","publication_year":2024,"publication_date":"2024-05-20","ids":{"openalex":"https://openalex.org/W4398130859","doi":"https://doi.org/10.1145/3643833.3656113"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3643833.3656113","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076535069","display_name":"Yifeng Cao","orcid":"https://orcid.org/0000-0003-2279-9047"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yifeng Cao","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, China"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, China","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073611411","display_name":"Ashutosh Dhekne","orcid":"https://orcid.org/0000-0001-6272-8521"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ashutosh Dhekne","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011035030","display_name":"Mostafa Ammar","orcid":"https://orcid.org/0000-0003-2803-300X"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mostafa Ammar","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.555,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.886497,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":83,"max":92},"biblio":{"volume":null,"issue":null,"first_page":"185","last_page":"195"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9936,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9936,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12024","display_name":"Ultra-Wideband Communications Technology","score":0.993,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9868,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.57926047},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.51099193},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26446095}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3643833.3656113","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.49}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":25,"referenced_works":["https://openalex.org/W1989085188","https://openalex.org/W2034171435","https://openalex.org/W2059980308","https://openalex.org/W2127785555","https://openalex.org/W2131906261","https://openalex.org/W2132870739","https://openalex.org/W2132903355","https://openalex.org/W2404167293","https://openalex.org/W2601292847","https://openalex.org/W2874356750","https://openalex.org/W2896384017","https://openalex.org/W2898790271","https://openalex.org/W2910405595","https://openalex.org/W2934786869","https://openalex.org/W2942905300","https://openalex.org/W2945441410","https://openalex.org/W3170696348","https://openalex.org/W3176379779","https://openalex.org/W3208472616","https://openalex.org/W32836451","https://openalex.org/W4235012804","https://openalex.org/W4312255212","https://openalex.org/W4312500805","https://openalex.org/W4367046397","https://openalex.org/W95608104"],"related_works":["https://openalex.org/W4396701345","https://openalex.org/W4396696052","https://openalex.org/W4395014643","https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2382290278","https://openalex.org/W2376932109","https://openalex.org/W2358668433","https://openalex.org/W2001405890"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"an":[3,78],"ultra-wideband":[4],"(UWB)":[5],"based":[6],"two-factor":[7],"authentication":[8,57,133,146],"(2FA)":[9],"platform,":[10],"called":[11],"UWB-Auth,":[12],"designed":[13],"as":[14],"carriable":[15],"or":[16,84,161],"wearable":[17],"devices.":[18],"UWB-Auth":[19,50,96,116,142,184],"eliminates":[20],"various":[21],"social":[22],"engineering":[23],"attacks,":[24],"including":[25],"phishing":[26],"attack,":[27,29],"2FA-fatigue":[28],"co-located":[30],"attack":[31,186],"etc.,":[32],"on":[33],"existing":[34],"2FA":[35],"solutions":[36],"like":[37],"Duo":[38],"and":[39,42,91,127,151,190],"reveals":[40],"simple":[41],"fast":[43],"user":[44],"interaction.":[45],"The":[46],"key":[47],"innovation":[48],"of":[49,55,69,139],"is":[51,65,159],"a":[52,62,118,121,128,164,175],"novel":[53],"combination":[54],"location":[56],"via":[58,188],"UWB,":[59],"checking":[60],"whether":[61],"legitimate":[63],"token":[64,158],"in":[66,100,148],"the":[67,70,88,98,102,137,144,157,170,182],"vicinity":[68],"login":[71,171],"device":[72],"with":[73,123,130],"centimeter-level":[74],"accuracy,":[75],"followed":[76],"by":[77],"abstraction":[79],"layer":[80],"allowing":[81],"different":[82],"knowledge-based":[83],"biometric-based":[85],"authentication,":[86],"ensuring":[87],"user's":[89],"identity":[90],"intent":[92],"to":[93,135,181],"login.":[94],"Moreover,":[95],"reverses":[97],"sequence":[99],"which":[101],"two":[103],"factors":[104],"are":[105],"verified,":[106],"providing":[107],"robust":[108],"defences":[109],"against":[110],"data":[111],"breach.":[112],"We":[113],"develop":[114],"3":[115],"prototypes:":[117],"key-chain":[119],"token,":[120,183],"smartwatch":[122],"commercial":[124],"knowledge/biometric":[125,132],"factor,":[126],"smartring":[129],"customized":[131],"algorithm":[134],"demonstrate":[136],"effectiveness":[138],"UWB-Auth.":[140],"Overall,":[141],"completes":[143],"whole":[145],"process":[147],"4":[149],"seconds,":[150],"completely":[152],"rejects":[153],"malicious":[154,176],"requests":[155],"when":[156,174],"20cm":[160],"10^\\circ":[162],"outside":[163],"small":[165],"valid":[166],"physical":[167,179],"area":[168],"near":[169],"device.":[172],"Even":[173],"entity":[177],"gains":[178],"access":[180],"stops":[185],"attempts":[187],"knowledge":[189],"biometric":[191],"authentication.":[192]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4398130859","counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-01-19T23:13:01.008985","created_date":"2024-05-21"}