Open Access Open Access  Restricted Access Subscription or Fee Access

Computer Locking Using Bluetooth Device Proximity

Sumanth Hegde, B. S. Sachin, H. L. Gururaj

Abstract


Providing computer security using Bluetooth is a new type of security system where in a registered Bluetooth device itself acts as a key to the locked system. Nowadays, most common type of locking our computers is either with passwords or PINs. But these can be easily cracked by a professional attacker. In this security system, the computer doesn’t prompt for the password at all but requires Bluetooth in order to perform the locking and unlocking. Initially, the original user has to add his own Bluetooth smartphone device as registered/trusted device by pairing with them and he also has to set a password in the smartphone application in order to gain access to the system. The software automatically marks the MAC address of those smartphones as trusted. Next time when the computer boots up, this security system runs in the background and it checks for those registered devices. If any of those registered devices are present within the range of the computer, then the application in the smartphone prompts for the password and if the password is correct, computer is unlocked and the user has all access to the files in it. But if an unregistered Bluetooth device is found within the range of the computer, then the computer stays locked. This is done in order to increase the security as the computer stays locked in the presence of unregistered Bluetooth device. This software can be further locked with passwords, email integration etc. for more security.


Keywords


Bluetooth, Range, Address, Pairing

Full Text:

PDF

References


https://en.wikipedia.org/wiki/Bluetooth#cite_note-3

http://www.dealerscope.com/post/trends-report-bluetooth-booming/

https://www.ijecs.in/index.php/ijecs/article/download/1495/1378

http://inpressco.com/wp-content/uploads/2015/02/Paper71397-400.pdf

https://www.bluetooth.com/

https://en.wikipedia.org/wiki/Bluetooth

Pharaoh Chaka, Hilton Chikwiriro, Clive Nyasondo, Improving the windows password policies using the mobile Bluetooth and rijndael encryption, IJCSMC vol.3 issue 3, 2014

http://www.aircccj.org/cscp/volume2/csit2417.pdf

Identification of Wearable Devices with Bluetooth by Hidayet Aksu; A. Selcuk Uluagac; Elizabeth Bentley.

On the suitability of Bluetooth 5 for the Internet of Things: Performance and scalability analysis by Stefan Böcker; Christian Arendt; Christian Wietfeld

https://www.pbs.org/newshour/science/unbreakable-quantum-password

https://d3i6fh83elv35t.cloudfront.net/newshour/app/uploads/2015/08/statistic_id273550_cyber-crime_-number-of-breaches-and-records-exposed-2005-2014.png

https://www.statisa.com/


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.