Open Access
Subscription Access
Open Access
Subscription Access
Proximity-Based Authentication – The Future of Security for Mobile Devices
Subscribe/Renew Journal
Securing interactions between devices that do not know each other is an important and challenging task. We present how to authenticate co-located devices using knowledge of their shared radio environment as proof of physical proximity. We present evaluation results that show that our technique is robust against a range of passive and active attacks. The key advantages of our technique are that it does not require any additional hardware to be present on the devices beyond the radios that are already used for communication; it does not require user involvement to verify the validity of the authentication process, and it is not vulnerable to eavesdropping.
Keywords
Eavesdropping, Proximity, Radio Environment.
User
Subscription
Login to verify subscription
Font Size
Information
Abstract Views: 212
PDF Views: 4