Local authentication with Bluetooth enabled mobile devices

被引:0
|
作者
Dellutri, F [1 ]
Me, GL [1 ]
Strangio, MA [1 ]
机构
[1] Univ Roma Tor Vergata, Dept Comp Sci Syst & Prod, Rome, Italy
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
As the processing power of mobile devices such as PDAs and smartphones increase the-v constitute the target platforms for new value-added services and applications and excellent candidates for Personal Trusted Devices (PTDs). Furthermore, handheld devices are increasingly networked and thus provide a natural and ubiquitous token for authentication purposes. This paper presents a framework and prototype system for exploiting these facts. A Bluetooth enabled smartphone is used to protect a laptop from unauthorised access with an approach that improves convenience and usability from the user's perspective. The main building blocks are a Diffie-Hellmann based two-party key agreement protocol with authentication mechanisms based on Java midlets and low-entropy human memorable passwords. The results are readily extended to other environments such as payment transactions, remote control Of appliances and services, transactions on unattended dispensers of goods such as parking meters, petrol stations, etc.
引用
收藏
页码:447 / 452
页数:6
相关论文
共 50 条
  • [1] Bluetooth enabled mobile robot
    Fai, YC
    Amin, SHM
    Fisal, NB
    Bakar, JA
    IEEE ICIT' 02: 2002 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY, VOLS I AND II, PROCEEDINGS, 2002, : 903 - 908
  • [2] Security for Bluetooth enabled devices using BlipTrack Bluetooth Detector
    Kumar, Monu
    Gupta, B. K.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 155 - 158
  • [3] Intrusion Detection in Bluetooth Enabled Mobile Phones
    Nair, Kishor Krishnan
    Helberg, Albert
    Van der Merwe, Johan
    2015 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE ISSA 2015 CONFERENCE, 2015,
  • [4] User Authentication for Mobile Devices
    Rogowski, Marcin
    Saeed, Khalid
    Rybnik, Mariusz
    Tabedzki, Marek
    Adamski, Marcin
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 47 - 58
  • [5] ECG Authentication for Mobile Devices
    Arteaga-Falconi, Juan Sebastian
    Al Osman, Hussein
    El Saddik, Abdulmotaleb
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2016, 65 (03) : 591 - 600
  • [6] Banknote Authentication with Mobile Devices
    Lohweg, Volker
    Hoffmann, Jan Leif
    Doerksen, Helene
    Hildebrand, Roland
    Gillich, Eugen
    Hofmann, Juerg
    Schaede, Johannes
    MEDIA WATERMARKING, SECURITY, AND FORENSICS 2013, 2013, 8665
  • [7] Biometric Authentication on Mobile Devices
    Mayron, Liam M.
    IEEE SECURITY & PRIVACY, 2015, 13 (03) : 70 - 73
  • [8] Bluetooth Enabled Mobile Phone Remote Control for PC
    Qadeer, Mohammed A.
    Agrawal, Rahul
    Singhal, Amit
    Umar, Sarosh
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 747 - +
  • [9] Case Study on the Bluetooth Vulnerabilities in Mobile Devices
    Solon, A. J.
    Callaghan, M. J.
    Harkin, J.
    McGinnity, T. M.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (04): : 125 - 129
  • [10] Scalable Control System for Bluetooth Mobile Devices
    Corbellini, Giorgio
    Kuster, Lukas
    Gross, Thomas R.
    2016 12TH ANNUAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES (WONS), 2016, : 112 - 115