Small, mobile devices or infrastructure devices without user interfaces, such as Bluetooth headsets, wireless LAN access points, or printers, often need to communicate securely over wireless networks. Active attacks can only be prevented by authenticating wireless communication, which is problematic when devices do not have any a priori information about each other. In this article, we describe three different authentication methods for device-to-device authentication based on sensor data from various physical out-of-band channels: shaking devices together, authentication based on spatial reference, and transmission via visible laser
We demonstrate how the multitude of sensors on a smart-phone can be used to construct a reliable har...
A Security Manager Device 16 employs a transmitter (22, fig. 2) requiring close proximity to a clien...
Access to thesis permanently restricted to Ball State community only.Millions of smart mobile device...
Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate...
We propose and demonstrate a method to establish a secure communication session between two devices ...
ABSTRACT—Security can only be guaranteed as long as the hardware and other key parameters, including...
The proliferation of electronic devices supporting sensing, actuation, and wireless communication en...
Secure device pairing is especially di?cult for spontaneous interaction in ubiquitous computing envi...
Manual authentication techniques have been designed to enable wireless devices to authenticate one a...
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computin...
mobile computing, security, spontaneous associations A key problem in mobile and ubiquitous computin...
Abstract—Integration of NFC radios into smartphones is expediting the adoption of mobile devices as ...
The paper presents a novel cryptographic authentication scheme that makes use of the presence of ele...
Despite the availability of biometrics like face recognition and finger print scanners passwords are...
Abstract—A challenge in facilitating spontaneous mobile interactions is to provide pairing methods t...
We demonstrate how the multitude of sensors on a smart-phone can be used to construct a reliable har...
A Security Manager Device 16 employs a transmitter (22, fig. 2) requiring close proximity to a clien...
Access to thesis permanently restricted to Ball State community only.Millions of smart mobile device...
Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate...
We propose and demonstrate a method to establish a secure communication session between two devices ...
ABSTRACT—Security can only be guaranteed as long as the hardware and other key parameters, including...
The proliferation of electronic devices supporting sensing, actuation, and wireless communication en...
Secure device pairing is especially di?cult for spontaneous interaction in ubiquitous computing envi...
Manual authentication techniques have been designed to enable wireless devices to authenticate one a...
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computin...
mobile computing, security, spontaneous associations A key problem in mobile and ubiquitous computin...
Abstract—Integration of NFC radios into smartphones is expediting the adoption of mobile devices as ...
The paper presents a novel cryptographic authentication scheme that makes use of the presence of ele...
Despite the availability of biometrics like face recognition and finger print scanners passwords are...
Abstract—A challenge in facilitating spontaneous mobile interactions is to provide pairing methods t...
We demonstrate how the multitude of sensors on a smart-phone can be used to construct a reliable har...
A Security Manager Device 16 employs a transmitter (22, fig. 2) requiring close proximity to a clien...
Access to thesis permanently restricted to Ball State community only.Millions of smart mobile device...