[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.4108/ICST.MOBIQUITOUS2008.3936guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article
Free access

Tangible security for mobile devices

Published: 21 July 2008 Publication History

Abstract

Existing measures to secure the internal data on mobile devices can generally fall into two categories: passwords and biometrics. Neither is satisfactory, for different reasons. We propose a new scheme, analogous to using physical keys to unlock doors or a plug-in security dongle to unlock software. The user wears one or more security tokens whose presence in the close proximity of the user's cell phone allows the secrets on the phone to be unlocked. As long as the thief is unable to steal both the token and the cell phone, security is mostly guaranteed. We call this approach tangible security. This preliminary paper describes how such a system could be built and used.

References

[1]
Spoofing and Anti-Spoofing Measures. Schuckers, S. A. C. 4, 2002, Information Security Technical Report, Vol. 7, pp. 56--62.
[2]
Electronic Frontier Foundation (EFF). Biometrics: Who's Watching You? {Online} September 2003. http://www.eff.org/wp/biometrics-whos-watching-you.
[3]
Zero-Interaction Authentication. Corner, Mark D. and Noble, Brian D. Atlanta, Georgia, USA: ACM Press, 2002. MobiCom '02: Proceedings of the 8th Annual International Coference on Mobile Computing and Networking. pp. 1--11.
[4]
Personal Area Networks: Near-field Intrabody communication. Zimmerman, T. G. 3&4, 1996, IBM Systems Journal, Vol. 35, pp. 606--617.
[5]
Security in Near Field Communication (NFC), Strengths and Weaknesses,". Haselsteiner, E. and Breitfuß, K. Graz: s.n., July 12--14, 2006. Workshop on RFID Security 2006.
[6]
NIST. Announcing the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197. s.l.: National Institute of Standards and Technology, November 26, 2001.
[7]
Florêncio, D. and Herley, C. One-Time Password Access without Changing the Server. Microsoft Research. s.l.: Microsoft Research, 2007. Technical Report. 65.
[8]
Jansen, Wayne, Gavrrila, Serban and Korolev, Vlad. Proximity Beacons and Mobile Device Authentication: An Overview and Implementation. NIST. 2005.
[9]
Kent, J. Malaysia car thieves steal finger. Kuala Lumpur, Malaysia: BBC News, March 31, 2005.
[10]
iButton Overview. {Online} Maxim Integrated Products. http://www.maxim-ic.com/products/ibutton/ibuttons/.
[11]
Karygiannis, T et al. Guidelines for Securing Radio Frequency Identification (RFID) Systems. NIST. Gaithersburg, MD 20899-8930: s.n., 2007. 800--98.

Cited By

View all
  • (2020)3D-Auth: Two-Factor Authentication with Personalized 3D-Printed ItemsProceedings of the 2020 CHI Conference on Human Factors in Computing Systems10.1145/3313831.3376189(1-12)Online publication date: 21-Apr-2020
  • (2017)ShakeUnlockIEEE Transactions on Mobile Computing10.1109/TMC.2016.258248916:4(1163-1175)Online publication date: 1-Apr-2017

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
Mobiquitous '08: Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services
July 2008
437 pages
ISBN:9789639799271

Sponsors

  • ICST

Publisher

ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)

Brussels, Belgium

Publication History

Published: 21 July 2008

Author Tags

  1. AES
  2. NFC
  3. RFID
  4. encryption
  5. mobile devices
  6. security
  7. tokens

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)24
  • Downloads (Last 6 weeks)4
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2020)3D-Auth: Two-Factor Authentication with Personalized 3D-Printed ItemsProceedings of the 2020 CHI Conference on Human Factors in Computing Systems10.1145/3313831.3376189(1-12)Online publication date: 21-Apr-2020
  • (2017)ShakeUnlockIEEE Transactions on Mobile Computing10.1109/TMC.2016.258248916:4(1163-1175)Online publication date: 1-Apr-2017

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media