Proximity-based authentication of mobile devices

被引:24
|
作者
Scannell, Adin [1 ]
Varshavsky, Alexander [2 ]
LaMarca, Anthony [3 ]
de Lara, Eyal [1 ]
机构
[1] Department of Computer Science, University of Toronto, 40 St. George Street, Toronto, ON M5S 2E4, Canada
[2] AT and T Labs Research, 180 Park Ave., Florham Park, NJ 07932, United States
[3] Intel Research Seattle, 1100 NE 45th St., Seattle, WA 98105, United States
关键词
Mobile security;
D O I
10.1504/IJSN.2009.023422
中图分类号
学科分类号
摘要
Securing interactions between devices that do not know each other a priori is an important and challenging task. We present Amigo, a technique to authenticate co-located devices using knowledge of their shared radio environment as proof of physical proximity. We present evaluation results that show that our technique is robust against a range of passive and active attacks. The key advantages of our technique are that it does not require any additional hardware to be present on the devices beyond the radios that are already used for communication, it does not require user involvement to verify the validity of the authentication process, and it is not vulnerable to eavesdropping. Copyright © 2009, Inderscience Publishers.
引用
下载
收藏
页码:4 / 16
相关论文
共 50 条
  • [21] A privacy-aware continuous authentication scheme for proximity-based access control
    Agudo, Isaac
    Rios, Ruben
    Lopez, Javier
    COMPUTERS & SECURITY, 2013, 39 : 117 - 126
  • [22] Delivery of User Intentionality between Computer and Wearable for Proximity-based Bilateral Authentication
    Jo, Jaeseong
    Lee, Eun-Kyu
    Jo, Junghee
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (10) : 768 - 777
  • [23] SmartMagnet: Proximity-Based Access Control for IoT Devices With Smartphones and Magnets
    Zhang, Yan
    Han, Dianqi
    Li, Ang
    Li, Jiawei
    Li, Tao
    Zhang, Yanchao
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (07) : 4266 - 4278
  • [24] Context-Aware Community Construction in Proximity-Based Mobile Networks
    Yu, Na
    Han, Qi
    MOBILE INFORMATION SYSTEMS, 2015, 2015
  • [25] A proximity-based path compression protocol for mobile ad hoc networks
    Saito, M
    Aida, H
    Tobe, Y
    Tokuda, H
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (09) : 2484 - 2492
  • [26] On Proximity-Based Information Delivery
    Namiot, Dmitry
    Sneps-Sneppe, Manfred
    DISTRIBUTED COMPUTER AND COMMUNICATION NETWORKS (DCCN 2018), 2018, 919 : 83 - 94
  • [27] Context-aware user authentication -: Supporting proximity-based login in pervasive computing
    Bardram, JE
    Kjær, RE
    Pedersen, MO
    UBICOMP 2003: UBIQUITOUS COMPUTING, 2003, 2864 : 107 - 123
  • [28] FMS-AMS: Secure Proximity-based Authentication for Wireless Access in Internet of Things
    Heo, Jeongyoon
    Yoo, Yongjae
    Suh, Jihwan
    Park, Woojin
    Paek, Jeongyeup
    Bahk, Saewoong
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2020, 22 (04) : 338 - 347
  • [29] Proximity-Based Opinion Retrieval
    Gerani, Shima
    Carman, Mark J.
    Crestani, Fabio
    SIGIR 2010: PROCEEDINGS OF THE 33RD ANNUAL INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH DEVELOPMENT IN INFORMATION RETRIEVAL, 2010, : 403 - 410
  • [30] On a Proximity-Based Tolerant Inclusion
    Bose, Patrick
    HadjAli, Allel
    Pivert, Olivier
    NEW DIMENSIONS IN FUZZY LOGIC AND RELATED TECHNOLOGIES, VOL II, PROCEEDINGS, 2007, : 343 - 350