메뉴 건너뛰기




Volumn 13, Issue 3, 2008, Pages 136-150

Spontaneous mobile device authentication based on sensor data

Author keywords

Authentication; Device pairing; Mobile computing; Spontaneous interaction; Ubiquitous computing

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; BLUETOOTH; CELLULAR TELEPHONE SYSTEMS; LOCAL AREA NETWORKS; MOBILE COMPUTING; MOBILE DEVICES; OBJECT RECOGNITION; PORTABLE EQUIPMENT; SENSORS; TELECOMMUNICATION EQUIPMENT; UBIQUITOUS COMPUTING; USER INTERFACES; WIRELESS LOCAL AREA NETWORKS (WLAN); WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 55749104368     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.istr.2008.10.005     Document Type: Article
Times cited : (10)

References (38)
  • 3
    • 38149059722 scopus 로고    scopus 로고
    • Key generation based on acceleration data of shaking processes
    • Proceedings of UbiComp 2007: ubiquitous computing, Springer-Verlag
    • Bichler D., Stromberg G., Huemer M., and Löw M. Key generation based on acceleration data of shaking processes. Proceedings of UbiComp 2007: ubiquitous computing. LNCS vol. 4717 (September 2007), Springer-Verlag 304-317
    • (2007) LNCS , vol.4717 , pp. 304-317
    • Bichler, D.1    Stromberg, G.2    Huemer, M.3    Löw, M.4
  • 6
    • 55749094164 scopus 로고    scopus 로고
    • Eronen P, Tschofenig H. RFC4279: Pre-shared key ciphersuites for transport layer security (TLS); December 2005.
    • Eronen P, Tschofenig H. RFC4279: Pre-shared key ciphersuites for transport layer security (TLS); December 2005.
  • 8
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • Gehrmann C., Mitchell C.J., and Nyberg K. Manual authentication for wireless devices. RSA Cryptobytes 7 1 (2004) 29-37
    • (2004) RSA Cryptobytes , vol.7 , Issue.1 , pp. 29-37
    • Gehrmann, C.1    Mitchell, C.J.2    Nyberg, K.3
  • 10
    • 55749108517 scopus 로고    scopus 로고
    • Dominique Guinard, Sara Streng, Hans Gellersen. Relategateways: a user interface for spontaneous mobile interaction with pervasive services. In: CHI 2007 workshop on mobile spatial interaction; 2007.
    • Dominique Guinard, Sara Streng, Hans Gellersen. Relategateways: a user interface for spontaneous mobile interaction with pervasive services. In: CHI 2007 workshop on mobile spatial interaction; 2007.
  • 13
  • 15
    • 0142156649 scopus 로고    scopus 로고
    • Secure spontaneous device association
    • Springer-Verlag
    • Kindberg T., and Zhang K. Secure spontaneous device association. Proceedings of UbiComp 2003 (October 2003), Springer-Verlag 124-131
    • (2003) Proceedings of UbiComp 2003 , pp. 124-131
    • Kindberg, T.1    Zhang, K.2
  • 16
    • 35248872559 scopus 로고    scopus 로고
    • Validating and securing spontaneous associations between wireless devices
    • Springer-Verlag
    • Kindberg T., and Zhang K. Validating and securing spontaneous associations between wireless devices. Proceedings of ISC'03 (October 2003), Springer-Verlag 44-53
    • (2003) Proceedings of ISC'03 , pp. 44-53
    • Kindberg, T.1    Zhang, K.2
  • 18
    • 55749090207 scopus 로고    scopus 로고
    • Darko Kirovski, Mike Sinclair, David Wilson. The Martini synch. Technical report MSR-TR-2007-123, Microsoft Research; September 2007.
    • Darko Kirovski, Mike Sinclair, David Wilson. The Martini synch. Technical report MSR-TR-2007-123, Microsoft Research; September 2007.
  • 19
    • 33749543681 scopus 로고    scopus 로고
    • Sensing and visualizing spatial relations of mobile devices
    • ACM Press
    • Kortuem G., Kray C., and Gellersen H. Sensing and visualizing spatial relations of mobile devices. Proceedings of UIST 2005 (October 2005), ACM Press 93-102
    • (2005) Proceedings of UIST 2005 , pp. 93-102
    • Kortuem, G.1    Kray, C.2    Gellersen, H.3
  • 20
    • 55749088219 scopus 로고    scopus 로고
    • Krawczyk H, Bellare M, Canetti R. RFC2104:HMAC: keyed-hashing for message authentication; February 1997.
    • Krawczyk H, Bellare M, Canetti R. RFC2104:HMAC: keyed-hashing for message authentication; February 1997.
  • 21
    • 35048881618 scopus 로고    scopus 로고
    • "Are you with me? " - using accelerometers to determine if two devices are carried by the same person
    • Springer-Verlag
    • Lester J., Hannaford B., and Borriello G. "Are you with me? " - using accelerometers to determine if two devices are carried by the same person. Proceedings of Pervasive 2004 (April 2004), Springer-Verlag 33-50
    • (2004) Proceedings of Pervasive 2004 , pp. 33-50
    • Lester, J.1    Hannaford, B.2    Borriello, G.3
  • 23
    • 38149061345 scopus 로고    scopus 로고
    • The candidate key protocol for generating secret shared keys from similar sensor data streams
    • Proceedings of ESAS 2007: fourth European workshop on security and privacy in ad hoc and sensor networks, Springer-Verlag
    • Mayrhofer R. The candidate key protocol for generating secret shared keys from similar sensor data streams. Proceedings of ESAS 2007: fourth European workshop on security and privacy in ad hoc and sensor networks. LNCS vol. 4572 (July 2007), Springer-Verlag 1-15
    • (2007) LNCS , vol.4572 , pp. 1-15
    • Mayrhofer, R.1
  • 25
    • 38049075710 scopus 로고    scopus 로고
    • Shake well before use: authentication based on accelerometer data
    • Proceedings of Pervasive 2007: fifth international conference on Pervasive Computing, Springer-Verlag
    • Mayrhofer R., and Gellersen H. Shake well before use: authentication based on accelerometer data. Proceedings of Pervasive 2007: fifth international conference on Pervasive Computing. LNCS vol. 4480 (May 2007), Springer-Verlag 144-161
    • (2007) LNCS , vol.4480 , pp. 144-161
    • Mayrhofer, R.1    Gellersen, H.2
  • 27
    • 38149135757 scopus 로고    scopus 로고
    • Security by spatial reference: using relative positioning to authenticate devices for spontaneous interaction
    • Proceedings of UbiComp 2007: ninth international conference on ubiquitous computing, Springer-Verlag
    • Mayrhofer R., Gellersen H., and Hazas M. Security by spatial reference: using relative positioning to authenticate devices for spontaneous interaction. Proceedings of UbiComp 2007: ninth international conference on ubiquitous computing. LNCS vol. 4717 (September 2007), Springer-Verlag 199-216
    • (2007) LNCS , vol.4717 , pp. 199-216
    • Mayrhofer, R.1    Gellersen, H.2    Hazas, M.3
  • 28
    • 18944395197 scopus 로고    scopus 로고
    • Securing passive objects in mobile ad-hoc peer-to-peer networks
    • Focardi R., and Zavattaro G. (Eds), Elsevier Science
    • Mayrhofer R., Ortner F., Ferscha A., and Hechinger M. Securing passive objects in mobile ad-hoc peer-to-peer networks. In: Focardi R., and Zavattaro G. (Eds). Electronic notes in theoretical computer science vol. 85.3 (June 2003), Elsevier Science
    • (2003) Electronic notes in theoretical computer science , vol.85 3
    • Mayrhofer, R.1    Ortner, F.2    Ferscha, A.3    Hechinger, M.4
  • 29
    • 34548146342 scopus 로고    scopus 로고
    • A human-verifiable authentication protocol using visible laser light
    • IEEE CS Press [Track WAIS 2007: first international workshop on advances in information security]
    • Mayrhofer R., and Welch M. A human-verifiable authentication protocol using visible laser light. Proceedings of ARES 2007: second international conference on availability, reliability and security (April 2007), IEEE CS Press 1143-1147 [Track WAIS 2007: first international workshop on advances in information security]
    • (2007) Proceedings of ARES 2007: second international conference on availability, reliability and security , pp. 1143-1147
    • Mayrhofer, R.1    Welch, M.2
  • 31
    • 33745926210 scopus 로고    scopus 로고
    • LoKey: leveraging the SMS network in decentralized, end-to-end trust establishment
    • Springer-Verlag
    • Nicholson A.J., Smith I.E., Hughes J., and Noble B.D. LoKey: leveraging the SMS network in decentralized, end-to-end trust establishment. Proceedings of Pervasive 2006 (May 2006), Springer-Verlag 202-219
    • (2006) Proceedings of Pervasive 2006 , pp. 202-219
    • Nicholson, A.J.1    Smith, I.E.2    Hughes, J.3    Noble, B.D.4
  • 32
    • 0142187729 scopus 로고    scopus 로고
    • A 2-way laser-assisted selection scheme for handhelds in a physical environment
    • Springer-Verlag
    • Patel S.N., and Abowd G.D. A 2-way laser-assisted selection scheme for handhelds in a physical environment. Proceedings of UbiComp 2003 (October 2003), Springer-Verlag 200-207
    • (2003) Proceedings of UbiComp 2003 , pp. 200-207
    • Patel, S.N.1    Abowd, G.D.2
  • 33
    • 55749090781 scopus 로고    scopus 로고
    • Ringwald M. Spontaneous interaction with everyday devices using a PDA. In: Proceedings of workshop on supporting spontaneous interaction in ubiquitous computing settings; September 2002.
    • Ringwald M. Spontaneous interaction with everyday devices using a PDA. In: Proceedings of workshop on supporting spontaneous interaction in ubiquitous computing settings; September 2002.
  • 34
    • 84976825099 scopus 로고
    • How to expose an eavesdropper
    • Rivest R.L., and Shamir A. How to expose an eavesdropper. Commununications of ACM 27 4 (1984) 393-394
    • (1984) Commununications of ACM , vol.27 , Issue.4 , pp. 393-394
    • Rivest, R.L.1    Shamir, A.2
  • 37
    • 33744908245 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • Springer-Verlag
    • Vaudenay S. Secure communications over insecure channels based on short authenticated strings. Proceedings of CRYPTO 2005 (August 2005), Springer-Verlag
    • (2005) Proceedings of CRYPTO 2005
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.