Open Access Open Access  Restricted Access Subscription or Fee Access

Proximity-Based Authentication – The Future of Security for Mobile Devices

C. Chandralekha, R. Balachandar

Abstract


Securing interactions between devices that do not know each other is an important and challenging task. We present how to authenticate co-located devices using knowledge of their shared radio environment as proof of physical proximity. We present evaluation results that show that our technique is robust against a range of passive and active attacks. The key advantages of our technique are that it does not require any additional hardware to be present on the devices beyond the radios that are already used for communication; it does not require user involvement to verify the validity of the authentication process, and it is not vulnerable to eavesdropping.

Keywords


Eavesdropping, Proximity, Radio Environment,malicious third party

Full Text:

PDF

References


F. Bennett, T. Richardson, and A. Harter. Teleporting – Making Applications Mobile. In Proceedings of the IEEE Workshop on Mobile Computer Systems and Applications, pages82–84, Los Alamitos, CA, USA, 1994. IEEE CS Press.

Ward, A. Jones, and A. Hopper. A new location technique for the active office. IEEE Personal Communication Magazine, 4(5):42–47, October 1997.

B. Brumitt, B. Meyers, J. Krumm, A. Kern, and S. Shafer. EasyLiving: Technologies for Intelligent Environments. In P. Thomas and H.W. Gellersen, editors, Proceedings of Handheld and Ubiquitous Computing, HUC 2000, volume 1927 of Lecture Notes in Computer Science, pages 12–29, Bristol, UK, Sept. 2000. Springer Verlag.

Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory, 644–654 (1976)

Rivest, R.L., Shamir, A.: How to expose an eavesdropper. Commun. ACM 27(4),393–394 (1984)

SWAP-CA. Shared Wireless Access Protocol (Cordless Access) Specification (SWAP-CA), Revision 1.0, The HomeRF Technical Committee (17 December 1998)

Shaked, Y., Wool, A.: Cracking the bluetooth pin. In: Proc. of Mobisys (2005)

Nicholson, A.J., Smith, I.E., Hughes, J., Noble, B.D.: Lokey: Leveraging the sms network in decentralized, end-to-end trust establishment. (2006)

Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.W.:Smart-its friends: A technique for users to easily establish connections between smart artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) Ubicomp 2001: Ubiquitous Computing. LNCS, vol. 2201, Springer, Heidelberg (2001)

Near field communication (nfc), http://www.nfc-forum.org/resources/faqs


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.