Friendly Authentication and Communication Experience (FACE) for Ubiquitous Authentication on Mobile Devices
نویسنده
چکیده
Current wireless personal area network (WPAN) standards provide no method for two previously unacquainted parties to authenticate to one another in a trusted manner upon first encounter. The paper details the research leading up to the development of Friendly Authentication and Communication Experience (FACE). The FACE methodology will be developed to be independent of wirelessly enabled mobile device types, such as smartphones, personal multimedia devices, personal digital assistants (PDAs), and mobile gaming platforms. FACE will enable individuals that have never met before to communicate in a trusted manner on the first attempt. FACE development will advance human interaction via wirelessly enabled mobile devices.
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملThe Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independent, mobile devices, no a priori information is available for authentication purposes. However, traditional approaches based on manual password input or verification of key fingerprints do not scale to tens to hundred...
متن کاملA Transparent and Continuous Biometric Authentication Framework for User-Friendly Secure Mobile Environments
Copyright is held by the author/owner(s). UbiComp ’13 Adjunct, Sept 8-12, 2013, Zurich, Switzerland. ACM 978-1-4503-2139-6/13/09...$15.00. Abstract Personal mobile devices (PMDs) have become ubiquitous technology. Their, steadily increasing computational and storage capabilities have enabled them to offer an increasingly large set of services. Considering their significance, it’s necessary to e...
متن کاملRole and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کامل