Abstract
In the paper new method of secure data transmission between mobile devices is proposed. Already existing applications demand on the user to care about secure issues himself or herself. Derived method focuses on secure channel creation using well known QR codes technology, which allows prevent the eavesdropper from interception transmitted data during connection establishing process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Zhang, Y., Hong, J., Cranor, L.: Cantina: a content-based approach to detecting phishing web sites. In: Proceedings of the 16th International Conference on World Wide Web, pp. 639–648. ACM (2007)
Vidas, T., Votipka, D., Christin, N.: All your droid are belong to us: A survey of current android attacks. In: Proceedings of the 5th USENIX WOOT, p. 10. USENIX Association (2011)
Vidas, T., Owusu, E., Wang, S., Zeng, C., Cranor, L.F., Christin, N.: QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks. In: Adams, A.A., Brenner, M., Smith, M. (eds.) FC 2013. LNCS, vol. 7862, pp. 52–69. Springer, Heidelberg (2013)
Tamir, C.: AVG (AU/NZ) Cautions: Beware of Malicious QR Codes. PCWorld (June 2011)
Nikiforakis, N., Meert, W., Younan, Y., Johns, M., Joosen, W.: Sessionshield: lightweight protection against session hijacking. In: Erlingsson, Ú., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. LNCS, vol. 6542, pp. 87–100. Springer, Heidelberg (2011)
Adid, B.: Sessionlock: securing web sessions against eavesdropping. In: Proceedings of the 17th International Conference on World Wide Web, pp. 517–524 (2008)
Lin, H.: The study and implementation of the wireless network data security model. In: Fifth International Conference on Machine Vision (ICMV 12). International Society for Optics and Photonics (2013)
Al-Haiqi, A., Jumari, K., Ismail, M.: Insider Threats+Disruptive Smart Phone Technology = New Challenges to Corporate Security. Research Journal of Applied Sciences 8(3), 161–166 (2013)
Ryan, M.: Bluetooth: with low energy comes low security. Presented as part of the 7th USENIX Workshop on Offensive Technologies, USENIX (2013)
Ahuja, M.S.: A Review of Security Weaknesses in Bluetooth. International Journal of Computers & Distributed Systems 1(3), 50–53 (2012)
Haataja, K., Hyppönen, K., Pasanen, S., Toivanen, P.: Reasons for Bluetooth Network Vulnerabilities. In: Bluetooth Security Attacks, Springer, Heidelberg (2013)
Sriram, V., Sahoo, G.: A Mobile Agent Based Architecture for Securing WLANs. International Journal of Recent Trends in Engineering (2009)
Huang, J.: A study of the security technology and a new security model for WiFi network. In: Fifth International Conference on Digital Image Processing. International Society for Optics and Photonics (2013)
BS ISO/IEC 18004:2006. Information technology. Automatic identification and data capture techniques. QR Code 2005 bar code symbology specification
Khang, S., Hong, T., Chin, T., Wang, S.: Wireless Mobile-Based Shopping Mall Car Parking System (WMCPS). In: IEEE Asia-Pacific Services Computing Conferences (APSCC), pp. 573–577 (2010)
Lee, Y.S., Kim, N.H., Lim, H., Jo, H.K., Lee, H.J.: Online banking authentication system using mobile-OTP with QR-code. In: 2010 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), pp. 644–648 (2011)
Al-Khalifa, H.S.: Utilizing QR code and mobile phones for blinds and visually impaired people. In: Miesenberger, K., Klaus, J., Zagler, W.L., Karshmer, A.I. (eds.) ICCHP 2008. LNCS, vol. 5105, pp. 1065–1069. Springer, Heidelberg (2008)
Hłobaż, A.: Security of measurement data transmission – message encryption method with concurrent hash counting. Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne 80(1), 13–15 (2007) (in Polish)
Hłobaż, A.: Security of measurement data transmission – modifications of the message encryption method along with concurrent hash counting. Przegląd Włókienniczy – Włókno, Odzież, 39–42 (2008) (in Polish)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Hłobaż, A., Podlaski, K., Milczarski, P. (2014). Applications of QR Codes in Secure Mobile Data Exchange. In: Kwiecień, A., Gaj, P., Stera, P. (eds) Computer Networks. CN 2014. Communications in Computer and Information Science, vol 431. Springer, Cham. https://doi.org/10.1007/978-3-319-07941-7_28
Download citation
DOI: https://doi.org/10.1007/978-3-319-07941-7_28
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07940-0
Online ISBN: 978-3-319-07941-7
eBook Packages: Computer ScienceComputer Science (R0)