Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Computer Locking Using Bluetooth Device Proximity


Affiliations
1 Vidyavardhaka College of Engineering, Mysuru, India
     

   Subscribe/Renew Journal


Providing computer security using Bluetooth is a new type of security system where in a registered Bluetooth device itself acts as a key to the locked system. Nowadays, most common type of locking our computers is either with passwords or PINs. But these can be easily cracked by a professional attacker. In this security system, the computer doesn’t prompt for the password at all but requires Bluetooth in order to perform the locking and unlocking. Initially, the original user has to add his own Bluetooth smartphone device as registered/trusted device by pairing with them and he also has to set a password in the smartphone application in order to gain access to the system. The software automatically marks the MAC address of those smartphones as trusted. Next time when the computer boots up, this security system runs in the background and it checks for those registered devices. If any of those registered devices are present within the range of the computer, then the application in the smartphone prompts for the password and if the password is correct, computer is unlocked and the user has all access to the files in it. But if an unregistered Bluetooth device is found within the range of the computer, then the computer stays locked. This is done in order to increase the security as the computer stays locked in the presence of unregistered Bluetooth device. This software can be further locked with passwords, email integration etc. for more security.


Keywords

Bluetooth, Range, Address, Pairing.
User
Subscription Login to verify subscription
Notifications
Font Size

  • https://en.wikipedia.org/wiki/Bluetooth#cite_note-3
  • http://www.dealerscope.com/post/trends-report-bluetooth-booming/
  • https://www.ijecs.in/index.php/ijecs/article/download/1495/1378
  • http://inpressco.com/wp-content/uploads/2015/02/Paper71397-400.pdf
  • https://www.bluetooth.com/
  • https://en.wikipedia.org/wiki/Bluetooth
  • Pharaoh Chaka, Hilton Chikwiriro, Clive Nyasondo, Improving the windows password policies using the mobile Bluetooth and rijndael encryption, IJCSMC vol.3 issue 3, 2014
  • http://www.aircccj.org/cscp/volume2/csit2417.pdf
  • Identification of Wearable Devices with Bluetooth by Hidayet Aksu; A. Selcuk Uluagac; Elizabeth Bentley.
  • On the suitability of Bluetooth 5 for the Internet of Things: Performance and scalability analysis by Stefan Böcker; Christian Arendt; Christian Wietfeld
  • https://www.pbs.org/newshour/science/unbreakable-quantum-password
  • https://d3i6fh83elv35t.cloudfront.net/newshour/app/uploads/2015/08/statistic_id273550_cyber-crime_-number-of-breaches-and-records-exposed-2005-2014.png
  • https://www.statisa.com/

Abstract Views: 219

PDF Views: 3




  • Computer Locking Using Bluetooth Device Proximity

Abstract Views: 219  |  PDF Views: 3

Authors

Sumanth Hegde
Vidyavardhaka College of Engineering, Mysuru, India
B. S. Sachin
Vidyavardhaka College of Engineering, Mysuru, India
H. L. Gururaj
Vidyavardhaka College of Engineering, Mysuru, India

Abstract


Providing computer security using Bluetooth is a new type of security system where in a registered Bluetooth device itself acts as a key to the locked system. Nowadays, most common type of locking our computers is either with passwords or PINs. But these can be easily cracked by a professional attacker. In this security system, the computer doesn’t prompt for the password at all but requires Bluetooth in order to perform the locking and unlocking. Initially, the original user has to add his own Bluetooth smartphone device as registered/trusted device by pairing with them and he also has to set a password in the smartphone application in order to gain access to the system. The software automatically marks the MAC address of those smartphones as trusted. Next time when the computer boots up, this security system runs in the background and it checks for those registered devices. If any of those registered devices are present within the range of the computer, then the application in the smartphone prompts for the password and if the password is correct, computer is unlocked and the user has all access to the files in it. But if an unregistered Bluetooth device is found within the range of the computer, then the computer stays locked. This is done in order to increase the security as the computer stays locked in the presence of unregistered Bluetooth device. This software can be further locked with passwords, email integration etc. for more security.


Keywords


Bluetooth, Range, Address, Pairing.

References