Local authentication with Bluetooth enabled mobile devices

被引:0
|
作者
Dellutri, F [1 ]
Me, GL [1 ]
Strangio, MA [1 ]
机构
[1] Univ Roma Tor Vergata, Dept Comp Sci Syst & Prod, Rome, Italy
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
As the processing power of mobile devices such as PDAs and smartphones increase the-v constitute the target platforms for new value-added services and applications and excellent candidates for Personal Trusted Devices (PTDs). Furthermore, handheld devices are increasingly networked and thus provide a natural and ubiquitous token for authentication purposes. This paper presents a framework and prototype system for exploiting these facts. A Bluetooth enabled smartphone is used to protect a laptop from unauthorised access with an approach that improves convenience and usability from the user's perspective. The main building blocks are a Diffie-Hellmann based two-party key agreement protocol with authentication mechanisms based on Java midlets and low-entropy human memorable passwords. The results are readily extended to other environments such as payment transactions, remote control Of appliances and services, transactions on unattended dispensers of goods such as parking meters, petrol stations, etc.
引用
收藏
页码:447 / 452
页数:6
相关论文
共 50 条
  • [41] Flexible and Transparent User Authentication for Mobile Devices
    Clarke, Nathan
    Karatzouni, Sevasti
    Furnell, Steven
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 1 - 12
  • [42] Comprehensive analysis of continuous authentication for mobile devices
    Dagar, Aishani
    Singh, Karan
    Khan, Tayyab
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (07): : 2007 - 2024
  • [43] Behaviour Profiling for Transparent Authentication for Mobile Devices
    Li, Fudong
    Clarke, Nathan
    Papadaki, Maria
    Dowland, Paul
    PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 307 - 314
  • [44] Efficiency of Paid Authentication Methods for Mobile Devices
    Jeong Yeon Kim
    Wireless Personal Communications, 2017, 93 : 543 - 551
  • [45] LEARNING ON A BUDGET FOR USER AUTHENTICATION ON MOBILE DEVICES
    Kolosnjaji, Bojan
    Huefner, Antonia
    Eckert, Claudia
    Zarras, Apostolis
    2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2018, : 2042 - 2046
  • [46] Efficiency of Paid Authentication Methods for Mobile Devices
    Kim, Jeong Yeon
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 93 (02) : 543 - 551
  • [47] A survey on touch dynamics authentication in mobile devices
    Teh, Pin Shen
    Zhang, Ning
    Teoh, Andrew Beng Jin
    Chen, Ke
    COMPUTERS & SECURITY, 2016, 59 : 210 - 235
  • [48] SECURE AUTHENTICATION AND AUTHORIZATION SCHEME FOR MOBILE DEVICES
    Wang, Jian
    Jiang, Nan
    PROCEEDINGS OF 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND APPLICATIONS, 2009, : 207 - +
  • [49] A Continuous User Authentication Scheme for Mobile Devices
    Smith-Creasey, Max
    Rajarajan, Muttukrishnan
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [50] Exploiting Bluetooth on Android Mobile Devices for Home Security Application
    Potts, Josh
    Sukittanon, Somsak
    2012 PROCEEDINGS OF IEEE SOUTHEASTCON, 2012,