Location based authentication scheme using BLE for high performance digital content management system

Certain Internet services are designed to be accessible to a limited location/an institutions/or a specified area affiliated computer services only, depending on their nature. Thus, in general, based on the IP address to access the service uses the IP-based filtering techniques that limit the delivery of the service. We offer a novel location based authentication method by convenient and correct way to take advantage of the Bluetooth BLE Beacon technology using smart mobile devices or laptop devices. In this research, digital content manager initiates and broadcasts BLE beacon signal for checking the presence of users near a specified area/location. We make use of the BLE Sensor Tag device as the location identification method. In this work, a publisher wants to identify whether a user is from a certain institution subscribed as site license for a period of time or not. Until now, the publisher depends on only IP filtering technique to discriminate users. The IP filtering technique allows the publisher to exclude certain IP ranges from accessing the content. So, the publisher wants to leverage users or readers to pay for accessing a technical paper by credit card. In this research, a "token" is HMACSHA1 generated by a Beacon based on UUID and Time. The MAC is provided only to a person who is closed to a specified location. If a member has the "token", our system will connect and report to the server that the users/students are attended the class or near the manager. If the member does not have the "token", our system will report to the server that the users/students are not attended the class or not near the manager. By this way a publisher can easily check the readers/users has the right to access the contents.

[1]  Gernot Heiser,et al.  An Analysis of Power Consumption in a Smartphone , 2010, USENIX Annual Technical Conference.

[2]  Prabhat Verma,et al.  A framework to integrate speech based interface for blind web users on the websites of public interest , 2013, Human-centric Computing and Information Sciences.

[3]  Chatschik Bisdikian,et al.  An overview of the Bluetooth wireless technology , 2001, IEEE Commun. Mag..

[4]  Robin Heydon,et al.  Bluetooth Low Energy: The Developer's Handbook , 2012 .

[5]  Pravin Bhagwat,et al.  Industry Report: Bluetooth: Technology for Short-Range Wireless Apps , 2001, IEEE Internet Comput..

[6]  Simon Fong,et al.  Designing an Efficient and Secure Credit Cardbased Payment System with Web Services Based on the ANSI X9.59-2006 , 2012, J. Inf. Process. Syst..

[7]  Kyung Sup Kwak,et al.  An overview of IEEE 802.15.6 standard , 2010, 2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010).

[8]  Guandong Xu,et al.  Improving Recommendations by the Clustering of Tag Neighbours , 2012 .

[9]  Yueming Lu,et al.  RESTful web service composition: Extracting a process model from Linear Logic theorem proving , 2011, 2011 7th International Conference on Next Generation Web Services Practices.

[10]  N. Gunasekaran,et al.  Bluetooth in wireless communication , 2002 .

[11]  Prashant Doshi,et al.  Towards Automated RESTful Web Service Composition , 2009, 2009 IEEE International Conference on Web Services.

[12]  Erina Ferro,et al.  Bluetooth and Wi-Fi wireless protocols: a survey and a comparison , 2005, IEEE Wireless Communications.

[13]  Nick Hunn Essentials of Short-Range Wireless , 2010 .

[14]  Md. Imdadul Islam,et al.  Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic , 2011, J. Inf. Process. Syst..